This paper led emphasis over the automatic parking system. The reason behind this research work is to eradicate the traffic problem arise during the rush hours in day time. Implementation of intelligent parking also helpful in security purpose this research paper is based on RFID based technology along with IR communication. The main governing body is microcontroller. RFID means radio frequency identification, this technology has been used for since last two decades, reason behind this technology is quite straight as it is capable of providing new services and convenience in retail environment. This technology is very reliable as well as very user friendly. This also ease the security purpose, this also reduced time consumption of user. This research involved following components (a) IR based communication, (b) RFID Module, (c) Microcontroller ATmega328.
Tracking police man using rf proximity cardAlbert Jose
Security is the important cause in the modern world. Now a day so many schemes have
announced by the banks which very attractive and the people are saving money in banks. At this
point protecting the banks is the main duty of police. Hence police are appointed securities to the
banks and make them to patrol during nights. . They have to go to every banks and streets and
sign the books kept in their places .But some police people forgot their duty and will sleep in a
vacant place and in the morning they get up and in a hurry go to these banks and put a fake time
and date and the signature .To avoid this and to provide more security our proposed system is
giving solution for tracking police man using RF proximity card. A RF proximity card reader with a
microcontroller will be designed and will be placed in every bank. During the patrol time, when a
police man swipe the card it will read the card number and will store it with date and time. The
data can be retrieved by connecting the machine to PC and giving appropriate commands.
Tracking police man using RF proximity card embedded system project explains about
new method for bank officials for checking their security of the bank by implementing accurate
method to control police officials. In present scenario banks are playing important role in providing
security for people for saving their money, gold..Etc. So banks are taking serious steps to
maintain security like hiring police officials at night time for patrolling banks, but there are chances
in irregularity of police officials so this method will provide card system for every police official
who should scratch his card. Data and time is stored inside system which can connect to
computer and analyze details of his attendance
This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product,which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system ar e RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system,RFID ta g and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details.
Parking Lot Security System using RFID Technologyijtsrd
Radio Frequency Identification RFID technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. In this paper, the Parking Lot Security System using RFID technology and embedded technology is presented. In conventional parking system, manual entrance system is applied that permission must be requested from the security guard to access the premise. Therefore, a security guard has to be hired to monitor the premise. In addition, the security guards need to monitor all movement of the vehicle that enters or leave the premise. As a result, the unauthorized vehicle can easily access the premise. To address this problem, the proposed system which can control a vehicle's movement that enters or leave the specific area or place by scanning the RFID tag has been implemented. The potential benefit is it can improve security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve traffic flow and reduce traffic jams. Dr. Thida Aung "Parking Lot Security System using RFID Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26512.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26512/parking-lot-security-system-using-rfid-technology/dr-thida-aung
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Tracking police man using rf proximity cardAlbert Jose
Security is the important cause in the modern world. Now a day so many schemes have
announced by the banks which very attractive and the people are saving money in banks. At this
point protecting the banks is the main duty of police. Hence police are appointed securities to the
banks and make them to patrol during nights. . They have to go to every banks and streets and
sign the books kept in their places .But some police people forgot their duty and will sleep in a
vacant place and in the morning they get up and in a hurry go to these banks and put a fake time
and date and the signature .To avoid this and to provide more security our proposed system is
giving solution for tracking police man using RF proximity card. A RF proximity card reader with a
microcontroller will be designed and will be placed in every bank. During the patrol time, when a
police man swipe the card it will read the card number and will store it with date and time. The
data can be retrieved by connecting the machine to PC and giving appropriate commands.
Tracking police man using RF proximity card embedded system project explains about
new method for bank officials for checking their security of the bank by implementing accurate
method to control police officials. In present scenario banks are playing important role in providing
security for people for saving their money, gold..Etc. So banks are taking serious steps to
maintain security like hiring police officials at night time for patrolling banks, but there are chances
in irregularity of police officials so this method will provide card system for every police official
who should scratch his card. Data and time is stored inside system which can connect to
computer and analyze details of his attendance
This paper represents the RFID and GSM technology. The main objective of the system is to uniquely identify and to make security for a person. This requires a unique product,which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system ar e RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system,RFID ta g and RFID reader used are operating at 125 KHz. The microcontroller internal memory is used for storing the details.
Parking Lot Security System using RFID Technologyijtsrd
Radio Frequency Identification RFID technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. In this paper, the Parking Lot Security System using RFID technology and embedded technology is presented. In conventional parking system, manual entrance system is applied that permission must be requested from the security guard to access the premise. Therefore, a security guard has to be hired to monitor the premise. In addition, the security guards need to monitor all movement of the vehicle that enters or leave the premise. As a result, the unauthorized vehicle can easily access the premise. To address this problem, the proposed system which can control a vehicle's movement that enters or leave the specific area or place by scanning the RFID tag has been implemented. The potential benefit is it can improve security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve traffic flow and reduce traffic jams. Dr. Thida Aung "Parking Lot Security System using RFID Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26512.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26512/parking-lot-security-system-using-rfid-technology/dr-thida-aung
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Fingerprint Attendance System - the hand-held device for classroom attendancemohamedbasheerkp
Fingerprint attendance system is a hand-held device which aims to automate entire attendance procedure of classroom using biometric technology. The device can be carried to the classroom and can be passed to the students. The hand-held device can take attendance without the intervention of teacher. This device would operate from a rechargeable Li-ion battery. The GUI application would help the teacher to manage the device through a host PC.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4ijtsrd
The ongoing progress in the field of Internet of Things IoT permits to embed security system as a part of it. In order to deal with security, authentication of legit users and in turn warning of unauthorized person plays an essential task. This report proposes to design an intelligent entrance control system based on biometric train in terms of fingerprint which also incorporates IoT functionality for indication of illegitimate users. The ongoing progress in the field of Internet of Things IoT permits to embed security system as a part of it. In order to deal with security, authentication of legit users and in turn warning of unauthorized person plays an essential task. This report proposes to design an intelligent entrance control system based on biometric train in terms of fingerprint which also incorporates IoT functionality for indication of illegitimate users. Prof. S. D. Lavange | Mr Girish Goalit | Mr. Sachin Kshirsagar | Mr Prasad Barhate "IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30271.pdf Paper Url :https://www.ijtsrd.com/engineering/electrical-engineering/30271/iot-assisted-fingerprint-based-door-security-system-using-raspberry-pi-4/prof-s-d-lavange
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
Introduction To Multilevel Association Rule And Its MethodsIJSRD
Association rule mining is a popular and well researched method for discovering interesting relations between variables in large databases. In this paper we introduce the concept of Data mining, Association rule and Multilevel association rule with different algorithm, its advantage and concept of Fuzzy logic and Genetic Algorithm. Multilevel association rules can be mined efficiently using concept hierarchies under a support-confidence framework.
Performance & emission characteristics of Two Cylinder Diesel Engine Using D...IJMER
With modernization and increase in the number of automobiles worldwide, the consumption of
diesel and gasoline has enormously increased. As petroleum is non renewable source of energy and the
petroleum reserves are scarce nowadays, there is a need to search for alternative fuels for automobiles.
Work has been done in using a lot of bio-fuels, the fuels obtained from plant to be used in IC engines
which have an even added advantage of lower emissions compared to that of diesel and gasoline. In the
present investigation Pine has been experimented in a direct injection diesel engine under homogeneous
charge compression ignition compression combustion mode
Fingerprint Attendance System - the hand-held device for classroom attendancemohamedbasheerkp
Fingerprint attendance system is a hand-held device which aims to automate entire attendance procedure of classroom using biometric technology. The device can be carried to the classroom and can be passed to the students. The hand-held device can take attendance without the intervention of teacher. This device would operate from a rechargeable Li-ion battery. The GUI application would help the teacher to manage the device through a host PC.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4ijtsrd
The ongoing progress in the field of Internet of Things IoT permits to embed security system as a part of it. In order to deal with security, authentication of legit users and in turn warning of unauthorized person plays an essential task. This report proposes to design an intelligent entrance control system based on biometric train in terms of fingerprint which also incorporates IoT functionality for indication of illegitimate users. The ongoing progress in the field of Internet of Things IoT permits to embed security system as a part of it. In order to deal with security, authentication of legit users and in turn warning of unauthorized person plays an essential task. This report proposes to design an intelligent entrance control system based on biometric train in terms of fingerprint which also incorporates IoT functionality for indication of illegitimate users. Prof. S. D. Lavange | Mr Girish Goalit | Mr. Sachin Kshirsagar | Mr Prasad Barhate "IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30271.pdf Paper Url :https://www.ijtsrd.com/engineering/electrical-engineering/30271/iot-assisted-fingerprint-based-door-security-system-using-raspberry-pi-4/prof-s-d-lavange
This Project focuses onto implement RF TX and RF RX based Banking Security System. This system is implemented using an embedded microcontroller. The embedded microcontroller used here is PIC 16F887
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
Introduction To Multilevel Association Rule And Its MethodsIJSRD
Association rule mining is a popular and well researched method for discovering interesting relations between variables in large databases. In this paper we introduce the concept of Data mining, Association rule and Multilevel association rule with different algorithm, its advantage and concept of Fuzzy logic and Genetic Algorithm. Multilevel association rules can be mined efficiently using concept hierarchies under a support-confidence framework.
Performance & emission characteristics of Two Cylinder Diesel Engine Using D...IJMER
With modernization and increase in the number of automobiles worldwide, the consumption of
diesel and gasoline has enormously increased. As petroleum is non renewable source of energy and the
petroleum reserves are scarce nowadays, there is a need to search for alternative fuels for automobiles.
Work has been done in using a lot of bio-fuels, the fuels obtained from plant to be used in IC engines
which have an even added advantage of lower emissions compared to that of diesel and gasoline. In the
present investigation Pine has been experimented in a direct injection diesel engine under homogeneous
charge compression ignition compression combustion mode
A Technical Review Paper on Use of WTO (Waste Transformer Oil)-Diesel Blends ...IJSRD
Pollution from the petroleum oil increases day by day in terms of CO2, CO, NOx, PM and many other gases and particles. Price difference and economy leads people toward the use of alternative fuels. These problems indicate that the initiatives to replace gasoline and diesel fuel, due to the impact of fossil fuel crisis, hike in oil price and stringent emission norms, must be taken. Solution to long term energy problem will come only through research and developments in the field of alternative energy sources. Waste to energy is the recent trend in the selection of alternate fuels. One such fuel is WTO (waste transformer oil), which can be obtained from waste as an alternative fuel. By using WTO as a replacement of Diesel, both the above stated problems can be solved at great extent. From literature review it comes clear Fuels additives have become essential tool not only improve the performance and also produce lower emissions (NOx) of diesel engines. A variety of additives (metal based, oxygenated, antioxidants, lubricity improvers, cetane number improvers, and cold flow improvers) are used in biodiesel fuel to meet the international emission standards. Prime objective of this work is to find out an alternative fuel that can be used as a replacement of diesel and analyses the performance and reduce emission parameters. To fulfill the prime objective, Diesel engine, fuelled with Waste transformer Oil (WTO) - Diesel blends with Additive should be used to be operated at different blend ration with different concentration of Additives.
An Experimental Analysis of Performance, Combustion and Emission Characteris...IJMER
The use of biodiesel, the methyl esters of vegetable oils are becoming popular due to their
low environmental impact and potential as a green alternative fuel for diesel engine. With this objective,
the present work has focused on the performance and emission characteristics of diesel engine using
rice bran oil and its blends with diesel. In this investigation, the blends of varying proportions of rice
bran biodiesel with diesel (RB20, RB40, RB60, RB80 & RB100) were prepared, analyzed, and compared
the performance and exhaust emission with diesel using 5.2 kW Single cylinder, 4stroke diesel engine.
The performance and emission characteristics of blends are evaluated at variable loads and constant
rated speed of 1500 rpm and found that the performance of RB20 blend of rice bran oil gives result, that
is near to the diesel and also found that the emission CO, CO2, HC, smoke & NOX of this blend is less
than the diesel.
Evaluation of Biodiesel as an Alternate Fuel to Compression Ignition Engine a...IJMER
To meet increasing energy requirements, there has been growing interest in alternate fuels like biodiesel to provide a suitable diesel oil substitute for internal combustion engines. Biodiesel offer a very promising alternate to diesel oil since they are renewable and have similar properties. Further it can be used with/without any modifications to the engine. It is an oxygenated fuel and emissions of carbon monoxide are less unlike fossil fuels, the use of biodiesel does not contribute to global warming as CO2 emitted is once again absorbed by the plants grown for vegetable oil/biodiesel production, thus CO2 balance is maintained. In the present work the Honge and Jatropha Curcas oil (Biodiesel) at various blends is used with pure diesel to study its effect on performance and emission characteristics of the engine. The performance of the engine under different operating conditions and blends are compared by calculating the brake thermal efficiency and brake specific fuel consumption by using pure diesel and adding various blends of Honge and Jatropha Curcas oil to diesel. The exhaust gas analyzers and smoke meters are used to find the percentage of carbon monoxide (CO), carbon dioxide (CO2), Hydrocarbons (HC) and oxides of nitrogen (NOx) emissions.
Performance and Emission Characteristics of Zirconia Coating on I.C Engine Us...Editor IJCATR
In this present world, the realization of the available of fossil fuels [diesel] is limited and hence it is necessary for the
efficient use of the fuel. The increasingly environmental regulations also make it necessary to improve the functioning of the diesel
engine in terms of their durability and efficiency. Thus, there is a high scope in engine technology to increase the engine ratings and
reduce fuel consumption.
For this purpose, the Thermal Barrier Coating (TBC) has been extensively used in engine technology. The T.B.C technology
has been applied on some parts of Diesel engine (piston crown and cylinder head) Plasma Spray technique was used for spraying
process. The piston crown and Cylinder head of the diesel engine were coated for a thickness of 0.25mm. Callophyllum oil was
converted into biodiesel by two stage Transesterification process using NaOH as a catalyst.
Several tests have been carried out to examine properties, performance and emission characteristics for different blends such
as [B100, B20, B30, B40 and B100] in comparison with pure diesel for varying injection pressures like 160 bar, 180 bar and 200 bar
pressure. These tests were conducted on a single cylinder, 4 stroke, water cooled, direct injection computerized compression ignition
engine.
Study of Performance of Different Blends of Biodiesel Prepared From Waste Co...IJMER
The use of biodiesel is rapidly expanding around the world, making it imperative to fully
understand the impacts of biodiesel on the diesel engine combustion process and pollutant formation.
Biodiesel was made by the well-known transesterification process. Waste cottonseed oil was selected for
biodiesel production. Three different blends of biodiesel were prepared i.e. B10, B20 and B30. These three
blends were fuelled in a compression ignition (C.I.) engine. A maximum of 77% biodiesel was produced
with 20% methanol in presence of 0.5% sodium hydroxide. Different parameters for the optimization of
biodiesel production were investigated in the first phase of this study, while in the next phase of the study
performance test of a diesel engine with neat diesel fuel and biodiesel mixtures are to be carried out. The
performance characteristics like brake power (B.P.), brake specific fuel consumption (BSFC) and brake
thermal efficiency. This performance was then compared with that of petro diesel.
Performance evaluation and emission analysis of 4 s, i.c. engine using ethan...eSAT Journals
Abstract Environment air pollution and global warming are alarming concern worldwide. Increasing air pollution, rapid growth of industrialization and the global trend of urbanization have totally disturbed the eco balance of resources on earth. The present study was done to visualize the potential of ethanol and biodiesel as an alternative fuel in C.I. engine. The salient features of the investigation include: (i) The study of basic fuel properties of ethanol, biodiesel and their blends with diesel for C.I. engine. (ii) To evaluate the potential of using biodiesel, ethanol and their blends with diesel for C.I, engine. (iii) Study of the engine performance and exhaust emission characteristics for various blends. Experiment set up was developed to carryout engine performance and emission characteristic studies on selected fuel blends at different load conditions. The present work has resulted in giving a good insight into the performance and emission characteristics of the C.I. engine using ethanol, biodiesel, diesel fuel blends. As fuel property point of view density and pour point of all the fuel blends are under the standard limits for diesel fuel. Heat of combustion of all blends is found to be lower than that of diesel fuel alone. D70B20E10 give lower CO and HC emission and slightly higher thermal efficiency than other blends Keywords: Heat exchanger, Flow induced vibration, TEMA, HTRI
Design and implementation of microcontroller in fpga for io tIJARIIT
One of the buzz words in the Information Technology is the Internet of Things (IoT). In coming years, IoT will
transform the objects which are present in the real world into virtual objects. IoT keep us informed about the status of objects
and controls of things in a sensor network. Sensor node comprises of the sensor, microcontroller and RF transceiver. A
microcontroller is an integrated circuit which basically performs one task and executes a particular application. It contains
programmable in/out peripherals, memory, and processor. Microcontrollers are mostly designed in view of embedded and are
used to automatically controllable systems. In digital system design microcontrollers and field programmable gate arrays
(FPGAs), both are widely used. Microcontroller based devices are becoming increasingly widespread. On one hand, high speed,
power, and falling prices make them an obvious choice whereas fast growing popularity of FPGAs, the availability of powerful
development tools and the increase in speed and high density have made FPGA based systems an alternative choice. Sensor node
controller is going to develop using VHDL with behavioral modeling which is an abstract model of the controller and breaks
down of the system into subcomponents and functional blocks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The smart home automated control system is an integrated system to facilitate elderly and disabled people with an easy-to-use home automation system that can be fully operated based on android application. The system is portable and constructed in a way that is easy to install, configure, run, and maintain. A typical wireless smart home automation system allows one to control house hold appliances centralize control unit which is wireless.
RFID based smart shopping cart and billing systemlaharipothula
To make the shopping easy by automated billing at the shopping mall/ super maeket. This module mainly cocnsists of Arduino, RFID tags & reader and zigbee module.
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
The data in real world applications is distributed at multiple locations, and the owner of the databases may be different people. Thus to perform mining task, the data needs to be kept at central location which causes threat to the privacy of corporate data. Hence the key challenge is to applying mining on distributed source data with preserving privacy of corporate data. The system addresses the problem of incrementally mining frequent itemsets in dynamic environment. The assumption made here is that, after initial mining the source undergoes into small changes in each time. The privacy of data should not be threatened by an adversary i.e. the miner and target database owner should not be able to recover original data from transformed data.
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions.
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal.
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail.
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM.
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Keystroke Dynamics Authentication with Project Management SystemIJSRD
Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making.
Diagnosing lungs cancer Using Neural NetworksIJSRD
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages.
A Survey on Sentiment Analysis and Opinion MiningIJSRD
In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis.
A Defect Prediction Model for Software Product based on ANFISIJSRD
Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system.
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD).
Product Quality Analysis based on online ReviewsIJSRD
Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way.
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques.
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages.
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
In case of friction stir welding, the maximum temperature along the weld line within appropriate range at tool workpiece interface is responsible for quality of welded joint. Through this paper, an attempt is made to establish a relationship between the input process parameters and the maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. The design of pre-experimental simulation has been performed in accordance with full factorial technique. The simulation of friction stir welding has been performed by varying input parameters, tool rotational speed and welding speed. The analysis of variance (ANOVA) is used to investigate the effect of input parameters on maximum temperature during friction stir welding. A correlation was established between input parameters and maximum temperature by multiple regression lines. This study indicates that the tool rotational speed is the main input parameter that has high statistical influence on maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075.
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator,
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
A crime is an act which is against the laws of a country or region. The technique which is used to find areas on a map which have high crime intensity is known as crime hotspot prediction. The technique uses the crime data which includes the area with crime rate and predict the future location with high crime intensity. The motivation of crime hotspot prediction is to raise people’s awareness regarding the dangerous location in certain time period. It can help for police resource allocation for creating a safe environment. The paper presents survey of different types of data mining techniques for crime hotspots prediction.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
1.4 modern child centered education - mahatma gandhi-2.pptx
Rotary RFID Parking Management Solution Controlled By Microcontroller
1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 921
Rotary RFID Parking Management Solution Controlled By
Microcontroller
Pradeep Rajput1
Dr. Namit Gupta2
1
P.G. Scholar 2
Assistant Professor and Head
1,2
Department of Electronics and Instrumentation
1,2
Shri Vaishnav Institute of Technology and Science, Indore (Madhya Pradesh), India.
Abstract— This paper led emphasis over the automatic
parking system. The reason behind this research work is to
eradicate the traffic problem arise during the rush hours in
day time. Implementation of intelligent parking also helpful
in security purpose this research paper is based on RFID
based technology along with IR communication. The main
governing body is microcontroller. RFID means radio
frequency identification, this technology has been used for
since last two decades, reason behind this technology is
quite straight as it is capable of providing new services and
convenience in retail environment. This technology is very
reliable as well as very user friendly. This also ease the
security purpose, this also reduced time consumption of
user. This research involved following components (a) IR
based communication, (b) RFID Module, (c)
Microcontroller ATmega328.
Key words: RFID, ATmega328 microcontroller, IR
Communication system, EM-18 RF Reader, LED screen
16x2, L293D Motor driver, DC gear motor, Drive chain and
wheel
I. INTRODUCTION
The requirements of technologies are increasing day by day.
Technology pay an important role in our daily life for every
field, that’s why expectations for technology are also
extend. Innovation in technology is very useful to making
our life easier, faster and advanced. Due to high rise of
globalization traffic problem is increasing day by day. Our
project is a smart idea to handling traffic situation and
Parking problem. Rotary RFID Parking Management
Solution Controlled by Microcontroller is the best solution
for this. This project is flexible in structure i.e. mobile by
nature. Along with the add of RFID technology this project
serve is the perfect solution for Malls and Offices which are
located in the crowd areas.
This is an innovative parking system, where we can
park many number of cars in a small space. Its a very fast,
flexible and efficient parking system. The advantages of this
project are fast in working, easy to operate, least trouble,
least noise & vibration, cheap running cost, secured with
RFID cards, easy to assembly, etc.
The structure of this system can be design as per
requirements. This project may be use as a portable parking
station, its depend on the structure of system. This research
is a some kind of intelligent idea which can provide many
features i.e. time saving, using small space for parking,
security, also provide safety to car because vehicles remain
safe in station. Fig.1 depict the subroutine of the
interconnection of the project.
Fig. 1: Mechanical structure
Fig. 2: Main working model
Fig.2 is the main working model of the project. It is
designed for the 8 cars. This prototype is suitable for the
parking of 8 car. It is enough to understand the idea of
research. We can minimize or maximize the number of
station while works structure.
II. HARDWARE USED
A. Mechanical Structure
In this section overall physical structure has been completed
successfully. For structure we use drive wheels, drive chain
and frames. Setup the Station (A space where we park the
car) according to the planned structure. Wheels are
connected to each other by a drive chain. And this system is
connected to the stations. The whole rotary structure is drive
by the motor. In this project we used 8 station, which are
2. Rotary RFID Parking Management Solution Controlled By Microcontroller
(IJSRD/Vol. 3/Issue 10/2015/205)
All rights reserved by www.ijsrd.com 922
suitable for parking of 8 cars. Signal system is also used for
safety and indication of red and green light.
B. Power Supply
The supply for ignition of the structure is given by 5 Volts
DC power supply and 12 Volts DC power supply to the DC
gear motor.
C. LCD Display
For showing the information and indication about status a
electronic display is used. The electronic display module
LCD 16x2 is a seven segment or multi segment LED
display. It has two lines and per line can display 16
characters. 16x2 LCD display has two registers, command
and data. The data register is store the data to be displayed
on the LCD. And another register store the command
instruction.
D. RFID Reader
The working principle of RFID reader is based on
transformation. RFID reader transfer energy to transponder
(RFID Card) by emitting electro-magnetic waves through
air. RFID Tags use Radio Frequency energy for charge up.
RFID Tags (Transponders) receives RF signal and responds
sequently. The reader receive response of tags and process
accordingly means of that data sent to be external device
(Host). Control line and computer read the action arises.
E. RFID Tags
These are small devices which store and send data to reader.
They are two types: Active tags and Passive tags. Active
tags contain internal battery, they are not required power
from reader. Passive tags are required power from reader
because then don’t have in built battery. They are small in
size and light in weight.
F. RF Module
A RF module is a small electronic circuit which is used to
receive, transmit or transceiver radio waves on one of a
number of carrier frequencies. Range between 30KHz to
300 GHz. RF module is used for low power wireless
communication purposes. In this project we are using EM-
18 RFID Reader Module. This is a low cost 2.4 GHz
transceiver designed. The circuit is designed for 2400-
2483.5 MHz frequency device
Fig. 3: RFID Reader and Tags
RFID technology is quite good for security purposes. It can
provide safely and comfortable system for the users. In
future we can make it more intelligent and advance with the
help of innovative technologies.
Fig. 4: Block diagram of system
G. Communication System
Infrared LED communication is a common technology. It is
easy to wireless comm. Technology. IR light is very similar
to visible light, but IR is undetectable of human eyes. IR
comm. Is a simply light that we cannot see by our eye,
which make IR great for communication. One common
modulation scheme of an IR comm. Is something called 30
KHz modulation. There are few natural sources that have
the regularity of 38 KHz signal, so an IR transmitter
sending data at that frequency would stand out among the
ambient IR.
When we press key on remote the transmitting IR
LED will blink very quickly for a data second, transmitting
encoded data to your appliance. We cannot see IR LED by
our eyes while radiation is outside of the visible spectrum.
Most cell phone cameras can detect glow of IR LED. Its
required low power, its has least and simple circuitry, high
speed of data communication up to 1 gbps, no effect on
human body, and security with all this advantages it is a
useful communication System.
H. Microcontroller
For controlling of whole system microcontroller
ATmega328 is used. ATmega328 is the brain of this project.
One of very high performance Atmel 8 bit AVR, RISC base
controller with 32 kb flash memory. ATmega328P is a 8 bit
microcontroller having 28 pins with 32 kb memory. The
operation read-while-write is true for this microcontroller.
Parameters of this processor are- 32 Kbytes flash memory, 8
bit AVR CPU, 28 Pins, 23 I/Os, maximum operating
frequency is 20 MHz, etc.
ATmega328 microcontroller has many features i.e.
High performance, low power consumption, advance RISC
structure, programming lock for software security, etc.
Operating voltage of this device is 1.8 to 5.5 Volts.
3. Rotary RFID Parking Management Solution Controlled By Microcontroller
(IJSRD/Vol. 3/Issue 10/2015/205)
All rights reserved by www.ijsrd.com 923
III. SOFTWARE USED
A. Arduino
For the programming of this project Arduino software is
used. Arduino software is quite simple to use for initiator
and also advanced for intelligent users. It can be run with
different operating system like Window, Linux and Mac.
Arduino software is useful for many applications and
projects. Arduino is based on simple to use software and
hardware. It is an open source prototype platform. It works
around on an input devices like sensors, switches and output
device like lights, motors, displays.
We can perform any action or operation what we
want by transmitting the set of instruction to the
microcontroller on the board. We can tell to our Arduino
whatever we want to do by typing the code in Arduino
programming language and using the Arduino development
environment. Arduino use 8 bit Atmel AVR
microcontrollers or 32 bit Atmel ARM processors. The
controller is uses universal serial bus (USB) serial port for
interfacing.
Arduino software provide an integrated
development environment (IDE) for the programming of
microcontroller based on the project. Most of Arduino PCB
fabricated n LED and load resister connected between pin
number 13 and ground. This system required 5 Volts power
to starts.
There are many advantages of Arduino i.e. Arduino
platforms are cheap in compare to other microcontroller
platforms. The software IDE can run on Linux, Window and
Mac operating system, while mostly controller systems are
limited to window. It provide flexibility and clear
programming atmosphere. It is an open source and brief
software. Arduino software is friendly for users and easy to
installation.
Fig. 5: Flow chart of the work [1]
Fig. 6: Flow chart of the work [2]
IV. RESULT AND CONCLUSION
The idea of Rotary Parking System is quite friendly and
reliable for today’s traffic system. It is totally based on
advance technology of RFID, Microcontroller and IR
Communication system. In today’s world number of
vehicles increasing day by day while spaces and lands are
converting in malls, home, shops, and roads. That’s why
traffic and parking problems are exponentially increasing
continuously. This research can be play an important role to
overcome the problems of traffic and parking. It is a flexible
and portable system. We can design it as per requirements.
This system is fast in working and easy to assemble. This
research would be use on a large scale in future, so its future
implementation will be useful.
REFERENCES
[1] Chandni Patel, Monalisa Swami, Priya Saxena, Sejal
Shah, “Rotary Automated Car Parking System”,
International Journal of Engineering Science and
Innovative Technology (IJESIT) Volume 4, Issue 2,
March 2015, ISSN: 2319-5967, ISO 9001:2008
Certified.
[2] Sawankumar G. Narone, Swapnil S. Chabukswar,
Shriharh A. Valyal, Ravikant B. Hirapure, Prof. V.R.
Solapure, “Vertical Car Parking –A Prototype”,
International Journal of Emerging Technology and
Advanced Engineering (IJETAE) Volume 5, Issue 4,
April 2015, ISSN: 2250-2459, ISO 9001:2008 Certified
Journal.
[3] Poorva Parkhi, Snehal Thakur, Sonakshi Chauhan,
“RFID Based Parking Management System”,
International Journal of Advanced Research in
Computer and Communication Engineering (IJARCCE)
Volume 3, Issue 2, February 2014, ISSN (Online):
2278-1021, ISSN (Print): 2319-5940.
[4] M.O. Reza, M.F. Ismail, A.A. Rokoni, M.A.R. Sarkar,
“Smart Parking System with Image Processing
Facility”, International Journal of Intelligent Systems
and Applications (IJISA) Volume 3, Issue 6, March
2012, 41-47.
[5] www.lagunabeachcity.net
4. Rotary RFID Parking Management Solution Controlled By Microcontroller
(IJSRD/Vol. 3/Issue 10/2015/205)
All rights reserved by www.ijsrd.com 924
[6] www.parkingimages.com
[7] microcontrollers htpp://www.nxp.com
[8] www.pacontrol.com
[9] www.digi.com
[10]www.arduino.cc
[11]www.atmel.com
[12]www.pantechproED.com
[13]www.unitronics.com