Embedded Systems (18EC62) - ARM - 32-Bit Microcontroller (Module 1)Shrishail Bhat
Lecture Slides for Embedded Systems (18EC62) – ARM – 32-Bit Microcontroller (Module 1) for VTU Students
Contents
Thumb-2 technology and applications of ARM, Architecture of ARM Cortex M3, Various Units in the architecture, Debugging support, General Purpose Registers, Special Registers, exceptions, interrupts, stack operation, reset sequence.
BY VIEWING THIS SLIDES YOU ABLE TO KNOW
-WHAT IS EMBEDDED SYSTEM?
-WHAT ARE PROS AND CONS OF EMBEDDED SYSTEM?
-WHERE IT IS USED?
-WHAT IS FGPA,MICROPROCESSOR,CRYPTOGRAPHY,JTAG,SPI, SERIAL AND PARALLEL COMMUNICATION?
AND MUCH MORE.
Embedded Systems (18EC62) - ARM Cortex-M3 Instruction Set and Programming (Mo...Shrishail Bhat
Lecture Slides for Embedded Systems (18EC62) - ARM Cortex-M3 Instruction set and Programming (Module 2) for VTU Students
Contents
Assembly basics, Instruction list and description, Thumb and ARM instructions, Special instructions, Useful instructions, CMSIS, Assembly and C language Programming
Arm processor architecture awareness session pi technologiesPiTechnologies
ARM processor is widely used in Embedded devices such as smart phones. Market share of ARM in embedded industry exceeds 90%.
This awareness presentation about ARM architecture presented by PiTechnologies Group www.PiTechnologies.net
Embedded Systems (18EC62) - ARM - 32-Bit Microcontroller (Module 1)Shrishail Bhat
Lecture Slides for Embedded Systems (18EC62) – ARM – 32-Bit Microcontroller (Module 1) for VTU Students
Contents
Thumb-2 technology and applications of ARM, Architecture of ARM Cortex M3, Various Units in the architecture, Debugging support, General Purpose Registers, Special Registers, exceptions, interrupts, stack operation, reset sequence.
BY VIEWING THIS SLIDES YOU ABLE TO KNOW
-WHAT IS EMBEDDED SYSTEM?
-WHAT ARE PROS AND CONS OF EMBEDDED SYSTEM?
-WHERE IT IS USED?
-WHAT IS FGPA,MICROPROCESSOR,CRYPTOGRAPHY,JTAG,SPI, SERIAL AND PARALLEL COMMUNICATION?
AND MUCH MORE.
Embedded Systems (18EC62) - ARM Cortex-M3 Instruction Set and Programming (Mo...Shrishail Bhat
Lecture Slides for Embedded Systems (18EC62) - ARM Cortex-M3 Instruction set and Programming (Module 2) for VTU Students
Contents
Assembly basics, Instruction list and description, Thumb and ARM instructions, Special instructions, Useful instructions, CMSIS, Assembly and C language Programming
Arm processor architecture awareness session pi technologiesPiTechnologies
ARM processor is widely used in Embedded devices such as smart phones. Market share of ARM in embedded industry exceeds 90%.
This awareness presentation about ARM architecture presented by PiTechnologies Group www.PiTechnologies.net
A brief idea on ARM Cortex-R series. Its comparison with Arm A and Arm M series processors.Applications of Arm Cortex R series in Texas Instruments microcontroller.
Presents features of ARM Processors, ARM architecture variants and Processor families. Further presents, ARM v4T architecture, ARM7-TDMI processor: Register organization, pipelining, modes, exception handling, bus architecture, debug architecture and interface signals.
OMAP (Open Multimedia Applications Platform) is a series of image/video processors developed by Texas Instruments. this ppt gives the overview of OMAP processor family
Comparison between RISC architectures: MIPS, ARM and SPARCApurv Nerlekar
Provides an overview about the three architectures, and if followed during any product design would lead us to choose a better architecture providing high performance of the product which ultimately means a leap in the market.
ARM 32-bit Microcontroller Cortex-M3 introductionanand hd
What is the ARM Cortex-M3 processor?
Architecture Versions,Processor naming, Instruction Set Development, The Thumb-2 Technology and Instruction Set Architecture, Cortex-M3 Processor Applications
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
A brief idea on ARM Cortex-R series. Its comparison with Arm A and Arm M series processors.Applications of Arm Cortex R series in Texas Instruments microcontroller.
Presents features of ARM Processors, ARM architecture variants and Processor families. Further presents, ARM v4T architecture, ARM7-TDMI processor: Register organization, pipelining, modes, exception handling, bus architecture, debug architecture and interface signals.
OMAP (Open Multimedia Applications Platform) is a series of image/video processors developed by Texas Instruments. this ppt gives the overview of OMAP processor family
Comparison between RISC architectures: MIPS, ARM and SPARCApurv Nerlekar
Provides an overview about the three architectures, and if followed during any product design would lead us to choose a better architecture providing high performance of the product which ultimately means a leap in the market.
ARM 32-bit Microcontroller Cortex-M3 introductionanand hd
What is the ARM Cortex-M3 processor?
Architecture Versions,Processor naming, Instruction Set Development, The Thumb-2 Technology and Instruction Set Architecture, Cortex-M3 Processor Applications
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
International Journal of Business and Management Invention (IJBMI) inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
RFID technology increases supply chain visibility, improves inventory management, quality control, and enhances relationships with suppliers and customers. It could enable small, agile businesses to compete with larger, more bureaucratic ones that may be slow to adopt this new technology. RFID could lead to great potential benefits for Operations and Supply chain management like long-term competitive advantages for more than one company in the supply chain.
RFID Research PaperTable of ContentsS.No.docxSUBHI7
RFID Research Paper
Table of Contents
S.No
Topic
Page No
1
Background Information
3
2
Introduction
4
3
Current RFID Technology Trends
4
4
RFID in Transport Industry
5
5
Conclusion
7
BACKGROUND INFORMATION
Radio Frequency Identification system was first used in the early 1930s. It was popular before Military camps that then participated in the Second World War. The RFID system was used in transmission of information in wars indicating a perfect time for “pulling the trigger”. RFID first application was developed during this same period and was mostly used by the same group of individuals (the military) (Juels, 2006). The RFID became more popular in the early 1980s where several states government used it in different fields like in tolling transportation routes majorly the roads. During this era, there was a quick advancement in technology that was taking place. This brought a diversity of ideas in how RFID technology can be applied in several other fields. This is when the development of electronic cards was developed that included money and gasoline cards.
After the success of a few products that came up as a result of RFID technology system, there was a successive development of even more technologies (Want, 2006). This increased not only the its spread but also the potentiality in technological advancement. This is to say, this technology system was able to blend in all kinds of technology that developed and its use became more profound and helpful (Want, 2006).
INTRODUCTION
In this research article, there is a complete development of information technology on RFID system and its standards in transport industry. Though, the development of this system in transportation begun way back in 1999, we are yet to understand its development in this industry with respect to the various standards. Besides, there will be a complete articulation of information in several other issues that include security which have led to the development of this system of technology in the transport system. This includes the explanation on how tracking of flow of goods is made possible through the same technology. There is also an inclusion of how RFID system has been trending in different other sectors and how those sectors relate to the transportation industry.
CURRENT RFID TECHNOLOGY TRENDS
There are several development factors that have led to the advancement of RFID system. There is a complete understanding of this flow in the aspect of the components involved it the performance of a RFID system (Want, 2006). This includes the basic components such as the microchip, antenna, battery and case. All of these components have developed in a way or the other. The functioning of a RFID system largely depends on the size of the antenna which determines the size of the whole component. The micro-chip also depends on the size of the antenna. This determines the frequency with which the RFID reads and records spatial data. The use of microchips has develop ...
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. 318
Radio Frequency Identification (RFID) Based Car Parking System
Muhammad Syamil Mazlan# , Isredza Rahmi A Hamid#, Hazalila Kamaludin#
#
Faculty Science Computer and Information Technology, Universiti Tun Hussein Onn, Malaysia
E-mail: walai2244@yahoo.com, rahmi@uthm.edu.my, hazalila@uthm.edu.my
Abstract— Radio Frequency Identification (RFID) technology is widely used in various applications such as attendance system,
tracking system, monitoring system or parking system. Currently, the existing parking system used manual entrance through security
guard to access the premise. Therefore, the company need to hire security guard to monitor the premise. In addition, the security
guards need to monitor all movement of vehicle or person that enter or leave the premise. As a result, unauthorized vehicle or person
can easily access the building. To address this problem, we proposed a parking system using RFID technology that can monitor
vehicle’s movement that enter or leave the specific area or place by scanning the RFID tag. The potential benefit is it can improve
security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve
traffic flow during peaks period. There are five modules in the proposed parking systems which are user registration, vehicle
registration, RFID tag, staff and report generation.
Keywords— Radio Frequency Identification (RFID), RFID tags, parking system.
I. INTRODUCTION
Various technologies have been introduced with the aim
of facilitating the user in daily life. This may indirectly
improve the productivity and efficiency in solving several
matters. Radio Frequency Identification (RFID) is a wireless
communication technology that able to uniquely identify
tagged objects or people. RFID systems have been widely
used in many application, such as inventory control, product
tracking through manufacturing and assembly, parking lot
access and control, container or pallet tracking,
Identification (ID) badges and access control, equipment or
personnel tracking in hospitals and others [1][2][4][12].
RFID use the electromagnetic fields to transfer data, for
the purposes of automatically identifying and tracking tags
attached to objects. RFID technology is applied in the
Intelligent Transportation Systems (ITS) to monitor the
traffic flow and control system for parking. The case study
for this project was conducted at Fujitsu, Parit Raja. Fujitsu
did not provide any parking system for their staff. Therefore,
staffs have to park their vehicle at their own risk. Besides,
this will not ensure that only the authorized person can
access the premise. Thus, the security guard plays an
important role to make sure only authorized person can
access the premise. They need to monitor vehicles or persons
movement entering or leaving the premise. As a result, we
proposed the parking system using RFID technology to
overcome these problems.
Our major contributions are summarized as follows:
1. to design a parking system for Fujitsu based on Radio
Frequency Identification (RFID) technology.
2. to develop a parking system that can monitor vehicle
that enter or leaving the premise.
3. to evaluate the proposed parking system in terms of
system functionality and usability testing.
The rest of the paper is organized as follows: Section II
describes the related work on parking system using RFID.
Section III presents the parking system methodology that is
Object-Oriented Software Development (OOSD). Section IV
discussed the development and implementation of parking
system for Fujitsu, Parit Raja. Finally, Section V concludes
the overall production results for the RFID based car parking
system
II. RELATED WORKS
This section gives review about RFID history, standard,
architecture, technical specification and related work on car
parking system.
A. RFID History
RFID technology is an emerging trend in many industries
worldwide over these decades. Table 1 shows the history of
RFID technology over decades [3].
INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION
VOL 2 (2018) NO 4 - 2
e-ISSN : 2549-9904
ISSN : 2549-9610
2. 319
TABLE I
THE DECADES OF RFID [3]
Decade Event
1940–1950 Radar refined and used major World War II
development effort. RFID invented in 1948
1950–1960 Early explorations of RFID technology, laboratory
experiments
1960–1970 Development of the theory of RFID. Start of
applications field trials
1970–1980 Explosion of RFID development. Tests of RFID
accelerate. Very early adopter implementations of
RFID
1980–1990 Commercial applications of RFID enter mainstream
1990–2000 Emergence of standards. RFID widely deployed
RFID becomes a part of everyday life
2000–now RFID explosion continues
B. RFID Standards
Table 2 shows RFID Standardization in International
Standard Organization (ISO) based on group, general title
and ISO standard [5]. As RFID evolves, standards are
showing an interest between cost and security. There are
various tag types are commercially available, including
passive, semi passive, active, semi active, Lower Frequency
(LF), High Frequency (HF), Ultra High Frequency (UHF),
microwave, onboard sensors, ruggedized housings and
implantable.
TABLE
RFID’S ISO [5]
Group General Title ISO
Standard
Sub Group 1 Data Protocol: Application Interface
Data Protocol: Data Encoding Rules
and Logical Memory Functions
ISO/IEC
15961
ISO/IEC
15962
Sub Group 2 Unique Identification for RF Tag IOS/IEC
15963
Sub Group 3 Part1: Reference Architecture and
Definition of Parameters
Part2: Parameters for Air Interface
Communications below 135kHz
Part3: Parameters for Air Interface
Communications at 13.56MHz
Part4: Parameters for Air Interface
Communications at 2.45GHz
Part6: Parameters for Air Interface
Communications at 860 - 960 MHz
Part7: Parameters for Air Interface
Communications at 433MHz
ISO/IEC
18000-1
ISO/IEC
18000-2
ISO/IEC
18000-3
ISO/IEC
18000-4
ISO/IEC
18000-6
ISO/IEC
18000-7
Application
Requirement
Profile
(ISO/IEC
TR 18000)
Implementation Guidelines – Part1:
RFID- Enabled Labels
Implementation
Guidelines – Part2: Recyclability of
RF Tags Implementation
Guidelines – Part3: RFID
Reader/Antenna Installation
ISO/IEC
24729-1
ISO/IEC
24729-2
ISO/IEC
24729-3
C. RFID System Infrastructure
RFID system infrastructure consists of three typical
components, which are RFID tags, RFID readers, and a
database that stores RFID data transferring between reader
and tags as shown in Figure 1 [7]
1) RFID Tags
RFID tags contain two major parts which are integrated
circuit and antenna. The integrated circuit is a
microprocessor chip whereas the antenna is responsible for
defining the reading range of the tag RFID tag is activated to
be read and written by the emission of radio signals from
antenna.
• Active RFID Tags: Active RFID tags have its own
power source and transmitter that enable the tag to broadcast
its signal. Active tags are capable to read longer ranges (100
meters or more) and have greater memory capacities
(128kb). To achieve a huge read range and larger memory, it
generates a greater power supply. Active tags usually are
powered by a long life battery.
Passive RFID Tags: Passive RFID tags did not have internal
power source. Passive tags consist of microchip and antenna.
Both microchip and antenna commonly referred as RFID
inlay. Passive tags need to wait for interrogating signal from
RFID reader. Thus, the antenna draws energy from the
electromagnetic waves. Once the microchip powered, it
transmit a signal.
Fig 1. Components of RFID system [7]
Table 3 shows the comparison between active RFID and
passive RFID tags based on its power, required signal
strength, communication range, range data storage, cost and
applications [8].
TABLE 3
COMPARISON OF RFID TAGS [8]
Description Active RFID Passive RFID
Power Have own power
source
No internal power
source
Required Signal
Strength
Low High
Communication
Range
Long range
(100m+)
Short range (3m)
Range Data Storage Large read/write
data (128kb)
Small read/write
data (128b)
Cost Applications Expensive Auto
Manufacturing,
asset tracking
Inexpensive
Electronic tolls,
item Level
tracking
2) RFID Reader
The RFID reader is an electronic device which includes
two basic parts: an antenna and a transceiver. The antenna is
designed to allow the open communication between the tags,
whilst the transceiver is responsible for acquiring the RFID
data. Moreover, the RFID reader has a function of reading
data from RFID tag and writing data to the RFID tag.
3. 320
3) RFID Database
RFID databases associate tag-identifying data with
arbitrary records. These records may contain product
information, tracking logs, sales data, or expiration dates.
Independent databases may be built throughout a supply
chain by unrelated users, or may be integrated in a
centralized or federated database system.
D. RFID Frequency Bands
RFID tags fall into three regions in respect to frequency:
Lower Frequency (LF), High Frequency (HF) and Ultra
High Frequency (UHF). Table 4 shows the comparison
between the RFID frequencies [9].
TABLE 4
RFID FREQUENCIES [9]
Description LF HF UHF
Frequency
Range
125 kHz –
134.2 kHz
13.56 MHz 860 MHz
- 960 MHz
Operating
Range
Less than 0.5m 1m 3-6m
Applications Animal Tags,
Vehicles
immobilisers
Item
Tracking,
Access
Control
Box and
Pallet
Tracking,
Logistics
Benefits Inexpensive,
good
penetration
(non-metal)
Medium
read range,
medium
speed
Long range,
high speed
Disadvantages Short read
range, slow
speed
Expensive
system
Need line of
sight to read
Initially, we consider selecting passive RFID tag for our
proposed system because it is cheaper and affordable.
Therefore, the communication range is 3 meter and the range
of data storage is 128b. The RFID based car parking system
use HF that has higher transmission rates and ranges than LF.
This parking system has similar frequency to Smart tags
which work at 13.56MHz.
We conducted an evaluation on the existing and proposed
system. The findings from the study will be used to improve
the proposed system. There are two existing systems that
have been considered which are Park-A-Lot [11] and
Intelligent Parking System [6]. The comparison between the
existing system and the proposed system is shown in Table 5
TABLE 5
COMPARISON BETWEEN EXISTING SYSTEM WITH PROPOSED SYSTEM
Details Park-A-
Lot[11]
Intelligent
Parking
System[6]
RFID Based
Parking System
User friendly Yes Yes Yes
Output display Yes Yes Yes
Database record Yes No Yes
Control
functionality
No No Yes
Security No No Yes
Technology use Arduino Ultrasonic sensor RFID
Detection object Vehicle Vehicle RFID tag on
vehicle
Premise access Everybody Everybody Authorized person
only
Programming
language
PHP Java Visual Basic
Our proposed RFID based parking system differs than
other system in such a way that, we used RFID technology
as a detection tools as compared to others. So, only
authorized person have access to the promise. Moreover, we
developed the proposed system using Visual Basic
programming.
III. SYSTEM METHODOLOGY
The methodology used in this study is Object-Oriented
Software Development (OOSD). Figure 2 shows seven
phases of OOSD model. The seven phases are requirement
specification phase, system analysis phase, system design
phase, implementation phase, testing phase, deployment
phase, maintenance phase [10].
Fig 2. Object Oriented Software Development process [10]
Figure 3 shows the activity diagram for RFID based car
parking system. First, admin need to login by using valid
username and password before accessing the car parking
system. The system will make sure either the input is valid
or not. If not, the admin need to register again with the valid
input. Then, admin can register new staff information,
register staff’s vehicle, scan tag ID, view staff’s detail and
view vehicle’s information in the system. Moreover, the
admin can view tag details, update staff and vehicle’s detail
and generate report.
Fig 3. Activity Diagram RFID based car parking system
4. 321
IV.PERFORMANCE ANALYSIS
This section focuses on the implementation of the actual
system. There are two main parts which are system design
and implementation and testing.
A. System Design
The system interface is designed to suit the needs and
requirements of the users which are users friendly and not
too complex. This system is developed using Visual Basic
and OOSD methodology.
1) Login interface
Figure 4 shows the admin login interface for the RFID
based car parking system. The admin needs to login using
valid username and password before accessing the system.
Fig 4. Login Interface
2) RFID based Parking System Main Page
Figure 5 shows the main page of RFID based car parking
system for Fujitsu. This page shows all admin modules such
as registration module, vehicle registration module, RFID
tag module, staff module and report module.
Fig 5. Admin main page
3) Registration Module
Figure 6 shows the registration form for new user. User
need to register before accessing the RFID car parking
system. So, user have to fill up personal details in the
registration form such as full name, identification number,
staff ID, email address, address, phone number, username,
password, security question and security answer.
4) Vehicle Registration Module
In order to access the premise, all vehicles should be
registered into the system. Figure 7 shows the vehicle
registration form that user need to fill up such as name,
identification number, type of user, type of vehicle, plat
number, model, vehicle colour and tag ID.
5) RFID Tag Interface
Figure 8 shows the RFID tag interface that consists of
Scan Tag ID and Show Tag Details. The Scan tag ID module
allow admin to scan users’ RFID tag that show the RFID’s
tag owner name, Tag ID, time in, time out and date as shown
in Figure 9.
Fig 6. Registration form
Fig 7. Vehicle Registration form
Fig 8. Scan RFID tag interface
Fig 9. Scan Tag ID menu
B. Implementation and Testing
The implementation of the actual system is based on the
analysis and design that has been carried out. Then, we
conduct the physical system and usability testing to
5. 322
guarantee that the RFID car parking system that has been
developed meets its requirements and users’ needs. The
questionnaire is prepared and delivered to target user to test
the proposed system. This is done to collect user’s feedback,
comments, bugs, and suggestions. The questionnaire is done
on 5 respondents. Figure 10 summarized the physical system
testing result which majority of the respondent agrees that
the system is easy to understand, strongly agree that each
button function as expected and agree that the system can
easily view the content.
Fig 10. Physical System Testing
Figure 11 shows the usability testing result where 3
respondents agree that the system works well. Besides, 4
respondents strongly agree that the RFID based car parking
system is a user friendly system. Furthermore, 3 respondents
agree that the system achieved its objectives.
Fig 11. Usability Testing
V. CONCLUSION
As a conclusion, the RFID car parking system has
successful been developed for Fujitsu and achieved the
project objectives. The system is built up using Object-
Oriented Software Development (OOSD) model with five
modules which are user registration, vehicle registration, RFID
tag, staff and report generation. We expect that this system will
inspire the designers and developers to develop the parking
systems with additional features and security elements.
The advantages of this system are:
i. Provide platform for Fujitsu to have a systematic
parking system.
ii. This system only allow authorized person to enter the
factory area.
iii. Improve traffic flow during peak period.
iv. Facilitate the security guard to guarding Fujitsu
entrance.
v. Allow admin to monitor staff and workers record by
referring to the database.
Although the advantages of this system mentioned, there
are also some weaknesses in the RFID Car Parking System
such as:
i. System cannot update username information.
ii. System can only monitor the while the vehicle entering
the premise.
iii. Any change of data must key in by the admin.
iv. Staff or workers cannot update their details by
themselves.
ACKNOWLEDGEMENT
The authors express appreciation to the Universiti Tun
Hussein Onn Malaysia (UTHM). This research is supported
by Short Term Grant vot number U653 and Gates IT
Solution Sdn. Bhd. under its publication scheme.
REFERENCES
[1] A. H. Isredza Rahmi, Comparative study on RFID, hotspot and car
plate scanning method : for intelligent parking management system.
Masters thesis, Universiti Teknologi MARA. 2005.
[2] M. Zheng. “Deriving Activity from RFID Detection Records in an
Assisted Living Context Table of Contents,” 2008.
[3] J. Landt, “The history of RFID,” pp. 8–11, 2005.
[4] Phillips, Tom Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn,
T. “Guidelines for Securing Radio Frequency Identification ( RFID )
Systems Recommendations of the National Institute”, 1–154. 2007.
[5] Phillips, T., Karygiannis, T., & Kuhn, R. “Security standards for the
RFID market”. IEEE Security and Privacy, 3, 85–89. 2005.
http://doi.org/10.1109/MSP.2005.157.
[6] Abhijith, S., Jajoo, S., Prasad, S. G. R., & Mungara, J. “Low cost
Intelligent Parking management and Guidance System”, 4(4), 11297–
11300.2015.
[7] Weis SA, “RFID (Radio Frequency Identification): Principles and
Applications”, MIT CSAIL, 2007.
[8] T. Telemetry, “RFID Tag Considerations,” pp. 1–38, 2012.
[9] C. Jechlitschek, “Radio Frequency IDentification - RFID,” pp. 1–13,
2013.
[10] Y. D. Liang, “Introduction to Java Programming,” vol. 6, pp. 1–47,
200.
[11] Yang, K., Alkadi, G., Gautam, B., Sharma, A., Amatya, D., Charchut,
S., & Jones, M. “Park-A-Lot : An Automated Parking Management
System”, 1(4), 276–279. 2013.
http://doi.org/10.13189/csit.2013.010406.
[12] M. Hairulnizam, K. Hazalila, S. RD Rohmat, O. Abdul Halim, K.
Shahreen, J. Junaidah. “The Application of RFID System in Water
Level Monitoring”. Vol.7 (2017) No. 4-2 . pp 1522-1527.2017