The document discusses fingerprint-based authentication for embedded systems security. It begins with an introduction describing how embedded systems are increasingly networked and vulnerable. It then discusses fingerprint identification and authentication techniques. The rest of the document describes the hardware and software requirements for a fingerprint authentication system, including a microcontroller, fingerprint module, LCD, power supply, and other components. Block diagrams and working principles are provided to explain how the system functions to authenticate users via fingerprint and control access.
RFID based smart shopping cart and billing systemlaharipothula
To make the shopping easy by automated billing at the shopping mall/ super maeket. This module mainly cocnsists of Arduino, RFID tags & reader and zigbee module.
This project is to develop a wheel chair for physically disabled people
The wheel chair is controlled by hand movement/hand gestures
The gestures are recognized by an accelerometer sensor
An ultrasonic sensor is used to detect the obstacles in front of the chair
The signals from the sensors are processed, and the wheel chair is controlled by Atmega-328 micro controller
it is a smart wheelchair which uses voice and bluetooth commands . Also consists of temperature and heartbeat sensors for continuous monitoring by the doctor.
RFID based smart shopping cart and billing systemlaharipothula
To make the shopping easy by automated billing at the shopping mall/ super maeket. This module mainly cocnsists of Arduino, RFID tags & reader and zigbee module.
This project is to develop a wheel chair for physically disabled people
The wheel chair is controlled by hand movement/hand gestures
The gestures are recognized by an accelerometer sensor
An ultrasonic sensor is used to detect the obstacles in front of the chair
The signals from the sensors are processed, and the wheel chair is controlled by Atmega-328 micro controller
it is a smart wheelchair which uses voice and bluetooth commands . Also consists of temperature and heartbeat sensors for continuous monitoring by the doctor.
Recently more & more hearing impaired people started using sign language. There are about 70 million people in the whole World that are not able to speak (dumb). A dumb person makes communication with other people using their motion of the hand or expressions. . Sign language helps the dumb people to make communication like normal people. The sign language translator which has been already developed uses a glove fitted with sensors that can interpret the 16 English letters in American Sign Language (ASL). Accelerometers and flex sensors are used in this system which increases its overall cost. We proposed a solution as a prototype called as “smart glove-for speech impaired people” which will translate sign language into text. It will help dump and deaf people to express their thoughts in more convenient way. As a sign language we have used traditional finger movements with contact switch wrapped around the user’s fingers. An IR transmitter receiver pair, HT12E and HT12D IC and, Arduino (Micro Controller) board helps transmitting data to PC. Moreover, use of contact switches reduces the system’s overall cost.
Keywords: - Arduino, HT12E IC & HT12D IC, IR transmitter receiver, contact switch.
Embedded systems, especially in-vehicle embedded systems, are ubiquitously related to our everyday life. The development of embedded systems greatly facilitates the comfort of people’s life, changes our view of things, and has a significant impact on society
Communication is the only channel by which we can share our feelings, opinions and conveys messages to others. But a person with a disability like dumb and deaf faces a lot of a problem and difficulty while communicating with normal people. It is estimated and observed by a survey that more than 10 billion of the population in the world are deaf and dumb. Generally, deaf and dumb people use sign language to communicate with others which is based on hand gestures and also on specific motions. But disable person faces a lot of problems while communicating with others because most normal people do not know about sign language and they do not understand it. Due to this fact, deaf and dumb people are not given many opportunities in our societies in different walks of life. So, there is always a communication barrier between deaf and dumb people with normal people. To remove this communication barrier we proposed our project which is a smart glove hand gesture vocalizer to help deaf and dumb people. The smart glove has the capability to convert hand gestures into certain sounds. So, it means by using smart gloves there will be no communication difference between deaf and dumb people with normal people. It is also one of the main aims and objectives of our project to help peoples and serve humanity.
Sign language is the only method and way the communication between the normal person and a dumb person, but most normal people can not understand sign language because they do not know anything about sign language. Due to this disabled person find very difficult in their life. So the main objective of our project is to make a very cost-effective system that will help dumb and deaf people to communicate with others. So our project, the smart glove will translate different hand gestures into sounds and convey the messages of disable persons to others. So by using a smart glove, there will be no communication barrier between the two communities and also this is our main objective of making this project to help people and serve humanity.
As we know that in India 50-60% of the population owns the two wheelers, In 2019 the domestic sells of the two wheelers were quite higher, since it is the most sold vehicle in India because of its low price, But now a days it is the most unsafe vehicle because of the reason of safety, As we know that accidents are increasing day by day, we can also notice that many laws and protocols are implemented by government in order to avoid this accidents. Accidents can be known as the unplanned event or the mistake that may occur causing in injury and sometimes it also leads to death. The accidents in case of two wheelers are more related to other vehicles. This may be avoided by wearing helmets and riding vehicles without consuming liquor. Since this survey is on smart helmet for accidence prevention and also we examining various related techniques. This research also helps us to understand IOT technology which is being developed now a days. Smart Helmet is the intelligent system that detects automatically whether the person is wearing the helmet and has nonalcoholic breath while driving. Here we have a transmitter on the helmet and the receiver on the bike. There is a switch used to assured the wearing of helmet on the head. The ON condition of the switch ensures the placing of the helmet in proper way. An alcohol sensor is placed near the mouth, the engine shouldn’t ON if any condition is violated, when the rider met with an accident and the helmet hits the ground then sensor sense and give the information to main controller it will activate the GSM Module which automatically sends the message to the family member.
Deaf and Dump Gesture Recognition SystemPraveena T
This presentation mainly tells about the problems of those people followed by solution and an overall view of various topics such as market overview,target customers,flow chart,technology used,cost analysis and finally future plans.
Liquor detection through Automatic Motor locking system pptPankaj Singh
The main purpose behind this project is “Drunken driving detection”. Now-a-days, many accidents are happening because of the alcohol consumption of the driver. Thus drunk driving is a major reason of accidents in almost all countries all over the world
Advanced driver assistance systems are designed to increase car safety more generally road safety.
Basically Advanced driver assists(ADS) systems helps the driver in the driving process and enables safe, relaxed driving. It makes sense to get your new car with driver assist features if you find it at a reasonable price as it helps you drive easily and safely in everyday use.
Recently more & more hearing impaired people started using sign language. There are about 70 million people in the whole World that are not able to speak (dumb). A dumb person makes communication with other people using their motion of the hand or expressions. . Sign language helps the dumb people to make communication like normal people. The sign language translator which has been already developed uses a glove fitted with sensors that can interpret the 16 English letters in American Sign Language (ASL). Accelerometers and flex sensors are used in this system which increases its overall cost. We proposed a solution as a prototype called as “smart glove-for speech impaired people” which will translate sign language into text. It will help dump and deaf people to express their thoughts in more convenient way. As a sign language we have used traditional finger movements with contact switch wrapped around the user’s fingers. An IR transmitter receiver pair, HT12E and HT12D IC and, Arduino (Micro Controller) board helps transmitting data to PC. Moreover, use of contact switches reduces the system’s overall cost.
Keywords: - Arduino, HT12E IC & HT12D IC, IR transmitter receiver, contact switch.
Embedded systems, especially in-vehicle embedded systems, are ubiquitously related to our everyday life. The development of embedded systems greatly facilitates the comfort of people’s life, changes our view of things, and has a significant impact on society
Communication is the only channel by which we can share our feelings, opinions and conveys messages to others. But a person with a disability like dumb and deaf faces a lot of a problem and difficulty while communicating with normal people. It is estimated and observed by a survey that more than 10 billion of the population in the world are deaf and dumb. Generally, deaf and dumb people use sign language to communicate with others which is based on hand gestures and also on specific motions. But disable person faces a lot of problems while communicating with others because most normal people do not know about sign language and they do not understand it. Due to this fact, deaf and dumb people are not given many opportunities in our societies in different walks of life. So, there is always a communication barrier between deaf and dumb people with normal people. To remove this communication barrier we proposed our project which is a smart glove hand gesture vocalizer to help deaf and dumb people. The smart glove has the capability to convert hand gestures into certain sounds. So, it means by using smart gloves there will be no communication difference between deaf and dumb people with normal people. It is also one of the main aims and objectives of our project to help peoples and serve humanity.
Sign language is the only method and way the communication between the normal person and a dumb person, but most normal people can not understand sign language because they do not know anything about sign language. Due to this disabled person find very difficult in their life. So the main objective of our project is to make a very cost-effective system that will help dumb and deaf people to communicate with others. So our project, the smart glove will translate different hand gestures into sounds and convey the messages of disable persons to others. So by using a smart glove, there will be no communication barrier between the two communities and also this is our main objective of making this project to help people and serve humanity.
As we know that in India 50-60% of the population owns the two wheelers, In 2019 the domestic sells of the two wheelers were quite higher, since it is the most sold vehicle in India because of its low price, But now a days it is the most unsafe vehicle because of the reason of safety, As we know that accidents are increasing day by day, we can also notice that many laws and protocols are implemented by government in order to avoid this accidents. Accidents can be known as the unplanned event or the mistake that may occur causing in injury and sometimes it also leads to death. The accidents in case of two wheelers are more related to other vehicles. This may be avoided by wearing helmets and riding vehicles without consuming liquor. Since this survey is on smart helmet for accidence prevention and also we examining various related techniques. This research also helps us to understand IOT technology which is being developed now a days. Smart Helmet is the intelligent system that detects automatically whether the person is wearing the helmet and has nonalcoholic breath while driving. Here we have a transmitter on the helmet and the receiver on the bike. There is a switch used to assured the wearing of helmet on the head. The ON condition of the switch ensures the placing of the helmet in proper way. An alcohol sensor is placed near the mouth, the engine shouldn’t ON if any condition is violated, when the rider met with an accident and the helmet hits the ground then sensor sense and give the information to main controller it will activate the GSM Module which automatically sends the message to the family member.
Deaf and Dump Gesture Recognition SystemPraveena T
This presentation mainly tells about the problems of those people followed by solution and an overall view of various topics such as market overview,target customers,flow chart,technology used,cost analysis and finally future plans.
Liquor detection through Automatic Motor locking system pptPankaj Singh
The main purpose behind this project is “Drunken driving detection”. Now-a-days, many accidents are happening because of the alcohol consumption of the driver. Thus drunk driving is a major reason of accidents in almost all countries all over the world
Advanced driver assistance systems are designed to increase car safety more generally road safety.
Basically Advanced driver assists(ADS) systems helps the driver in the driving process and enables safe, relaxed driving. It makes sense to get your new car with driver assist features if you find it at a reasonable price as it helps you drive easily and safely in everyday use.
Road Safety Powerpoint Presentation, Action plan for traffic safety. Road safety statistics, Steps to be taken to prevent road accidents etc.
road accident statistics road accident facts india ppt pps pdf powerpoint road accident video images photos
How to Make Awesome SlideShares: Tips & TricksSlideShare
Turbocharge your online presence with SlideShare. We provide the best tips and tricks for succeeding on SlideShare. Get ideas for what to upload, tips for designing your deck and more.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
Our day-to-day lives are filled with situations
where we need to prove who we are; may it be for personal
reasons or as part of your profession. Locks are to be opened,
e-mail accounts are to be accessed and purchases are to be
made – but only by the person correctly authorized to do so.
Real time model of a lock gate system upon fingerprint with microcontrollernooriasukmaningtyas
Safety is one of the most important things that we are keen to provide all aspects of our lives. Keyless lock gate with fingerprint access has many advantages over traditional systems such as passwords. Therefore, fingerprint identification represents the main part, which require that system is cheap, practical, easy to use and allows fast and securely. This paper discusses the design and implementation with real time model of a practical lock gate system for the achievement of high security by using fingerprint purification to control the mechanism of opening doors in banks, warehouses, laboratories and places of interest. In this paper, the microcontroller technology in the Ardonio board was used with an optical sensor to take the fingerprint, convert it into digital data, and insert it into a definition window to unify all input data and store it for use when compared to the system experience. After obtaining the result of the comparison, the appropriate commands are prepared for operating the servo of the lock mechanism for the doors used. In the testing of the system, the results are very accurate. The system also has other advantages such as small size and low power required for operation and ease of use.
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
"Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that we expect the user to be always connected to an internet source. In the Proposed system, authorized users faces will be trained and stored in a Database. Initially, when an unknown known person enters in the zone the camera module will capture the intruders face. The captured intruder's face will be compared with the trained faces in the database. If the person's face doesn't match, the micro controller will send an alert SMS to the recognized user and also the intruder's captured image will be E mailed to the user. The authorized user should acknowledge the SMS message. If he fails to acknowledge the message within a threshold time limit, an alert call will be made to the concerned user. By this the user gets intimated in real time. Keerthanna G. S | Praveen Kumar P | Vishnu Prasad K | Ms. S. Sri Heera ""A Modern Technique for Unauthorized Human Detection and Intimation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21659.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/21659/a-modern-technique-for-unauthorized-human-detection-and-intimation/keerthanna-g-s"
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Multiple features based fingerprint identification systemeSAT Journals
Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
The field of Artificial Intelligence is very fashionable today, especially neural networks that work well in various areas such as speech recognition and natural language processing. This Research Article briefly describes how deep learning models work and what different techniques are used in text recognition. It also describes the great progress that has been made in the field of medicine, the analysis of forensic documents, the recognition of license plates, banking, health and the legal industry. The recognition of handwritten characters is one of the research areas in the field of artificial intelligence. The individual character recognition has a higher recognition accuracy than the complete word recognition. The new method for categorizing Freeman strings is presented using four connectivity events and eight connectivity events with a deep learning approach.
A Survey Based on Fingerprint Matching SystemIJTET Journal
Abstract — Fingerprint is one of the biometric features mostly used for identification and verification. Latent fingerprints are conventionally recovered coming in to existence of crime scenes and are analyzed with active databases of well-known fingerprints for finding criminals. A bulk of matching algorithms with distant uniqueness has been developed in modern years and the algorithms are depending up on minutiae features. The detection of accepted systems tries to find which fingerprint in a database matches the fingerprint needs the matching of its minutiae against the input fingerprint. Since the detection complexity are more minutiae of other fingerprints. Therefore, fingerprint matching system is a higher than verification and detection systems. This paper discussed about the various novel techniques like Minutia Cylinder Code (MCC) algorithm, Minutia score matching and Graphic Processing Unit (GPU). The feature extraction anywhere in the extracted features is sovereign of shift and rotation of the fingerprint. Meanwhile, the matching operation is performed much more easily and higher accuracy.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...CSCJournals
A biometric security is a technique by means of which digital contents are protected by a cryptographic key generated from the biometric features of a person like Retina, Iris, Fingerprint, Face, Voice and so on. Normally the digital contents like documents are protected by a cryptographic key generated from a unique password. The process in irreversible, i.e the key can be generated from the password but not the vice versa. Passwords are relatively easy to hack as most of the users keep their personal information like date of birth as password and also password length has a limit as human beings cannot remember a password of significantly large length. Hence guessing the password of a user, whose significant information is available, is easier. Therefore off late lot of emphasis has been given to biometric features. Biometric features of no two people are same. For example the finger prints or the face of any two people differ. Hence if a template (alphanumeric or binary representation of features from a biometric data) is selected for the key generation than cracking them for accessing information becomes significantly difficult. But as with every advantage comes certain limitations also. The keys are not time invariant. Templates tends to change based on the data acquisition, or with time. For example the finger prints or palm prints changes with ages. Iris, retina and face features changes with change in light intensity during the acquisition phase. Fingerprint features changes with change in the orientation of the finger while scanning. In a classic authentication problem, such variability’s can be easily dealt with by keeping a threshold for the acceptance of the features. Such acceptance threshold is not applicable for the case of biometric templates. Even slightest of the variability in the templates changes the generated key, therefore causing a high false rejection rate. Hence in this work we analyze the most accepted biometric features and techniques for key generation and propose the most invariable technique in terms of data acquisition invariability. The work analyzes Iris, Face, Fingerprint and Palm prints for analysis of the biometric template generation and key generation form the templates. Further a unique benchmark analysis technique is proposed for quantifying the quality of a biometric model or features.
Similar to Finger print authentication for bikes (20)
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
Finger print authentication for bikes
1. Department Of ECE
1. INTRODUCTION
1.1 Introduction
Embedded systems plays a crucial role in critical infrastructure, which is
recognized as essential to national security, health and economy. There is an increasing
concern of security threats, as embedded systems are moving towards networked
applications. Model based approaches have proven to be an effective for embedded
system design. Security is the important aspect of embedded system design. The
characteristics of embedded system give rise to a number of novel vulnerabilities.
Network connectivity opens even more avenues for remote exploits. In response, security
solutions are being developed to provide robustness, protection from attacks, and
recovery capabilities.
Fingerprint identification is used in many ways, for identification and also for the
security purposes. In these days, somewhere sometimes bikes are stolen by the stranger’s
reason is that they don’t have security system. In the present generation we are using the
fingerprint based security system for door locking, EVM’s for any kind of the
identification.
1.2 Literature Survey
Biometrics is derived from Greek word “bios” means life and “metron” means
measure. It is the study of methods for uniquely recognizing human based upon one or
more physical or behavioral traits.
1.2.1 Fingerprint Authentication:
It refers to the automated method of verifying a match between two human
fingerprints.
Fingerprints are one of many forms of biometrics used to identify an individual
and verify their identity. This article touches two major classes of algorithms (minutia
and pattern) and four sensor designs (optical, ultrasonic, passive capacitance and active
capacitance).The simple fact is that passwords don’t work very well. Other authentication
mechanisms such as tokens, smart cards, etc. require you to carry something. This is
better than a password, but easies to lose. Think about losing your credit card or driving
1
SVS Institute Of Technology
2. Department Of ECE
license. Losing your corporate network access is a lot worse. Information is valuable and
harder to track than money.
Fingerprints can also acts as a simple, trusted and convenient user-interface to a
well thought security architecture. The two components need each other to provide truly
effective security. A user authenticated via fingerprints can take advantage of a solid
security system minimal education. Fingerprints have been used for identification for
over 100 years. They are the standard without question. In addition to signatures,
fingerprints are the only other form of identification that has a legal standing. A key issue
of trust is privacy. The best way to maintain that is to store a template of unique
fingerprint characteristics instead of entire print. This is sufficient for one to one or too
many matching and eliminates the need for a database of searchable fingerprints.
1.2.2 Biometric System:
The diagram below shows a simple block diagram of a biometric system. The
main operations a system can perform are enrollment and test. During the enrollment
biometric information of an individual are stored, during the test, and during the test
information are detected and compared with the stored information.
Fig 1.0: Biometric System
2
SVS Institute Of Technology
3. Department Of ECE
Biometric System Diagram:
The first block (sensor) is the interface between the real world (user) and our
system (biometric system), it has to acquire all the necessary data. Most of the time it is
an image acquisition system, but it can change according to the characteristics we want to
consider.
The second block performs all the necessary pre-processing; it has to remove
artifacts from the sensor, to enhance the input (e.g. remove some kind of noise.), to use
some kind of normalization, etc.
In third block we have to extract the features we need. This step is really
important; we have to choose which features it extract and how. Moreover we have to do
it with certain efficiency (it can’t take hours). After that, we can have a vector of numbers
or an image with particular properties: all those data are used to create the template.
A template is a synthesis of all the characteristics we could extract from the
source; it has to be as short as possible (to improve efficiency) but we can’t discard to
many details, thus losing discrimination.
Then if it is performing enrollment, then the template is simply stored somewhere
(it can be stored in on a card or within a database). If it is performing the matching phase,
the obtained template is passed to matcher that compares it with other existing templates,
estimating the distance between them using any algorithm (e.g. Hamming distance). The
decision matcher has taken is sent as output, so that it can be used for any purpose (e.g. it
can allow the entrance in restricted areas).
1.2.3 Patterns and Features:
The analysis of fingerprints for matching purposes generally requires the
comparison of several features of the print pattern. These include print patterns, which
are aggregate characteristics of ridges, and minutia points, which are unique features
found within patterns. It is also necessary to know the structure and properties of human
skin in order to successfully employ some of the imaging technologies.
Patterns:
There are three basic patterns of fingerprint ridges are the Arch, Loop, and Whorl.
3
SVS Institute Of Technology
4. Department Of ECE
Arch Pattern:
An arch is a pattern where the ridges enter from one side of a finger, rise in the
centre forming an arc, and them exit the other side of the finger.
Loop Pattern:
The loop pattern is a pattern where the ridges enter from one side of a finger, from
a curve, and tend to exit from the same side they enter.
Whorl Pattern:
In the whorl pattern, ridges form a circular pattern around a central point on the
finger. Scientists have found that of family members often share the same general
patterns, leading to the belief that these patterns are inherited.
Fig 1.1: Human Fingerprint Pattern
Features:
Minutia based feature:
The major minutia features of fingerprint ridges are: ridge ending, bifurcation and
short point ridge (or dot). The ridge ending is the point at which a ridge terminates.
Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or
dots) are the ridges which are significantly shorter than the average ridge length on the
fingerprint.
4
SVS Institute Of Technology
5. Department Of ECE
Sequential design based on the following modules: Segmentation, local ridge
orientation estimation (singularity and more detection), local ridge frequency estimation,
fingerprint enhancement, minutiae detection, and minutiae filtering and post-processing.
Ridge based feature:
Size and shape of fingerprint, number, type, and position of singularities (cores
and deltas), spatial relationship and geometrical attributes of the ridge lines, shape
features, global and local texture information, sweat pores, fractal features.
Fig 1.2: Ridge based feature
5
SVS Institute Of Technology
6. Department Of ECE
2.BLOCK DIAGRAM
+5v
Fig 2.1: BLOCK DIAGRAM
6
SVS Institute Of Technology
AT89C51 BUZZER
DRIVER RELAY
Bik
e
con
nec
tio
n
L.C.D
Max
232
FINGERPRINT
MODULE
POWER
SUPPLY (5V DC)
7. Department Of ECE
2.1 Block diagram description:
8051 MICROCONTROLLER:
The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller
with 4k bytes of Flash Programmable and erasable read only memory (EROM).AT89C51
has many functions and to this microcontroller many other various components are
connected for the functioning of their particular operations and to get the particular
required output. This is very necessary in each and every embedded project.
FINGERPRINT MODULE:
Fingerprint module is interconnected to 8051 microcontroller and this module is
used for the recognization and identification of the fingerprint and also to verify the
recognized fingerprint. So fingerprint module is necessary for identification.
MAX 232:
Max 232 is used as a voltage converter, as 8051 microcontroller need TTL
voltage level, as fingerprint module voltage is cmos voltage level ,but by using the
max232 we can convert one voltage level to the other voltage level.
LCD:
LCD is used to display the functioning of the project or particular operation, as
our project is needed to identify and also to recognize the fingerprint, the LCD shows it
on the screen and total verification depends on the LCD.
BIKE BATTERY:
Bike battery is connected to the 8051 microcontroller and it has the main
functioning of our project. In this bike battery the power supplies and the ignition key
lock on and off conditions totally depends on the bike battery.
7
SVS Institute Of Technology
8. Department Of ECE
POWER SUPPLY:
Power supply is needed for each and every IC and also the modules, so it supplies
the required amount of power to all the components and has major part the project, it
supplies a high power but by using the voltage regulator we can supply the required
amount of power to the components.
RELAY:
Relay is used as switch and when ever it gets the power it starts the vehicle and
when ever it doesn’t get any power until and unless it won’t starts the vehicle.
2.2 Schematic diagram
Fig 2.2: Schematic diagram
8
SVS Institute Of Technology
9. Department Of ECE
2.3 Working principle
The working principle of “fingerprint based vehicle access control system” is
switching (act as switch).
In our project, from the fingerprint module the wires are connected to the battery
of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get
the power, green wire is connected for earthing, red black is connected for the display
purpose the power from the battery generates from the black wire then the total display
will appear.
In the ignition lock there are certain conditions when the bike is on and as well as
off condition, in the on condition the green wire is shorted with black and white wire then
there is short circuit hence the bike doesn’t start and when there is open circuit with in the
green wire then the bike begins to start, at the starting moment of the bike fingerprint
module ask for the verification of the fingerprint impression if matches they can use
otherwise it gives a sound from the buzzer.
9
SVS Institute Of Technology
10. Department Of ECE
3. HARDWARE & SOFTWARE REQUIREMENTS
HARDWARE:
3.1 AT89C51:
A microcontroller is a general purpose device, but that is meant to read data,
perform limited calculations on that data and control its environment based on those
calculations. The prime use of a microcontroller is to control the operation of a machine
using a fixed program that is stored in ROM and that does not change over the lifetime of
the system.
The microcontroller design uses a much more limited set of single and double
byte instructions that are used to move data and code from internal memory to the ALU.
The microcontroller is concerned with getting data from and to its own pins, the
architecture and instruction set are optimized to handle data in bit and byte size.
The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller
with 4k bytes of Flash Programmable and erasable read only memory (EROM). The
device is manufactured using Atmel’s high-density nonvolatile memory technology and
is functionally compatible with the industry-standard 80C51 microcontroller instruction
set and pin out. By combining versatile 8-bit CPU with Flash on a monolithic chip, the
Atmel’s AT89c51 is a powerful microcomputer, which provides a high flexible and cost-
effective solution to many embedded control applications.
10
SVS Institute Of Technology
11. Department Of ECE
Pin Configuration of AT89c51 Microcontroller
Fig 3.1: Pin Configuration of AT89c51 Microcontroller
11
SVS Institute Of Technology
12. Department Of ECE
AT89C51 Block Diagram
Fig 3.2: AT89C51 Block Diagram
PIN DESCRIPTION:
VCC
Supply voltage
GND
Ground
Port 0
Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin
can sink eight TTL inputs. When 1’s are written to port 0 pins, the pins can be used as
high impedance inputs.
Port 0 can also be configured to be the multiplexed low order address/data bus
during access to external program and data memory.
12
SVS Institute Of Technology
13. Department Of ECE
Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The port 1output
buffers can sink/source four TTL inputs. When 1’s are written to port 1 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 1 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The port 2 output
buffers can sink/source four TTL inputs. When 1’s are written to port 2 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 2 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The port 3 output
buffers can sink/source four TTL inputs. When 1s are written to port 3 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 3 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 3 also receives some control signals for Flash Programming and verification.
Port pin Alternate Functions
P3.0 RXD(serial input port)
P3.1 TXD(serial input port)
P3.2 INT0(external interrupt 0)
P3.3 INT1(external interrupt 1)
P3.4 T0(timer 0 external input)
P3.5 T1(timer 1 external input)
P3.6 WR(external data memory write
strobe)
P3.7 RD(external data memory read
strobe)
Table 1.1: Pin Description of AT89C51
13
SVS Institute Of Technology
14. Department Of ECE
RST
Rest input A on this pin for two machine cycles while the oscillator is running
resets the device.
ALE/PROG:
Address Latch Enable is an output pulse for latching the low byte of the address
during access to external memory. This pin is also the program pulse input (PROG)
during Flash programming.
In normal operation ALE is emitted at a constant rate of 1/16 the oscillator
frequency and may be used for external timing or clocking purpose. Note, however, that
one ALE pulse is skipped during each access to external Data memory.
PSEN
Program Store Enable is the read strobe to external program memory when the
AT89c51 is executing code from external program memory PSEN is activated twice each
machine cycle, except that two PSEN activations are skipped during each access to
external data memory.
EA /VPP
External Access Enable (EA) must be strapped to GND in order to enable the
device to fetch code from external program memory locations starting at 0000h up to
FFFFH. Note, however, that if lock bit 1 is programmed EA will be internally latched on
reset. EA should be strapped to Vcc for internal program executions. This pin also
receives the 12-volt programming enable voltage (Vpp) during Flash programming when
12-volt programming is selected.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock
operating circuit.
XTAL 2
Output from the inverting oscillator amplifier.
14
SVS Institute Of Technology
15. Department Of ECE
OPERATING DESCRIPTION
The detail description of the AT89C51 included in this description is:
• Memory Map and Registers
• Timer/Counters
• Interrupt System
MEMORY MAP AND REGISTERS
Memory
The AT89C51 has separate address spaces for program and data memory. The
program and data memory can be up to 64K bytes long. The lower 4K program memory
can reside on-chip. The AT89C51 has 128 bytes of on-chip RAM.
The lower 128 bytes can be accessed either by direct addressing or by indirect
addressing. The lower 128 bytes of RAM can be divided into 3 segments as listed below
1. Register Banks 0-3:
Locations 00H through 1FH (32 bytes). The device after reset defaults to register
bank 0. To use the other register banks, the user must select them in software. Each
register bank contains eight 1-byte registers R0-R7. Reset initializes the stack point to
location 07H, and is incremented once to start from 08H, which is the first register of the
second register bank.
2. Bit Addressable Area:
16 bytes have been assigned for this segment 20H-2FH. Each one of the 128 bits
of this segment can be directly addressed (0-7FH). Each of the 16 bytes in this segment
can also be addressed as a byte.
3. Scratch Pad Area:
30H-7FH are available to the user as data RAM. However, if the data pointer has
been initialized to this area, enough bytes should be left aside to prevent SP data
destruction.
15
SVS Institute Of Technology
16. Department Of ECE
Fig 3.3: Memory Map & Registers
SPECIAL FUNCTION REGISTERS
The Special Function Registers (SFR's) are located in upper 128 Bytes direct
addressing area. The SFR Memory Map in shows that.
Not all of the addresses are occupied. Unoccupied addresses are not implemented
on the chip. Read accesses to these addresses in general return random data, and write
accesses have no effect. User software should not write 1’s to these unimplemented
locations, since they may be used in future microcontrollers to invoke new features. In
that case, the reset or inactive values of the new bits will always be 0, and their active
values will be 1.
The functions of the SFR’s are outlined in the following sections.
Accumulator (ACC)
ACC is the Accumulator register. The mnemonics for Accumulator-specific
instructions, however, refer to the Accumulator simply as A.
16
SVS Institute Of Technology
17. Department Of ECE
B Register (B)
The B register is used during multiply and divide operations. For other
instructions it can be treated as another scratch pad register.
Program Status Word (PSW)
The PSW register contains program status information.
Stack Pointer (SP)
The Stack Pointer Register is eight bits wide. It is incremented before data is
stored during PUSH and CALL executions. While the stack may reside anywhere in on
chip RAM, the Stack Pointer is initialized to 07H after a reset. This causes the stack to
begin at location 08H.
Data Pointer (DPTR)
The Data Pointer consists of a high byte (DPH) and a low byte (DPL). Its function
is to hold a 16-bit address. It may be manipulated as a 16-bit register or as two
independent 8-bit registers.
Serial Data Buffer (SBUF)
The Serial Data Buffer is actually two separate registers, a transmit buffer and a
receive buffer register. When data is moved to SBUF, it goes to the transmit buffer,
where it is held for serial transmission. (Moving a byte to SBUF initiates the
transmission.) When data is moved from SBUF, it comes from the receive buffer.
Timer Registers
Register pairs (TH0, TL0) and (TH1, TL1) are the 16-bit Counter registers for
Timer/Counters 0 and 1, respectively.
Control Registers
Special Function Registers IP, IE, TMOD, TCON, SCON, and PCON contain
control and status bits for the interrupt system, the Timer/Counters, and the serial port.
17
SVS Institute Of Technology
18. Department Of ECE
TIMER/COUNTERS
The IS89C51 has two 16-bit Timer/Counter registers: Timer 0 and Timer 1. All
two can be configured to operate either as Timers or event counters. As a Timer, the
register is incremented every machine cycle. Thus, the register counts machine cycles.
Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the
oscillator frequency.
As a Counter, the register is incremented in response to a 1-to-0 transition at its
corresponding external input pin, T0 and T1. The external input is sampled during S5P2
of every machine cycle. When the samples show a high in one cycle and a low in the next
Cycle, the count is incremented. The new count value appears in the register during S3P1
of the cycle following the one in which the transition was detected. Since two machine
cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum
count rate is 1/24 of the oscillator frequency. There are no restrictions on the duty cycle
of the external input signal, but it should be held for at least one full machine cycle to
ensure that a given level is sampled at least once before it changes.
INTERRUPT SYSTEM
An interrupt is an external or internal event that suspends the operation of micro
controller to inform it that a device needs its service. In interrupt method, whenever any
device needs its service, the device notifies the micro controller by sending it an interrupt
signal. Upon receiving an interrupt signal, the micro controller interrupts whatever it is
doing and serves the device. The program associated with interrupt is called as interrupt
service subroutine (ISR).Main advantage with interrupts is that the micro controller can
serve many devices.
Baud Rate
The baud rate in Mode 0 is fixed as shown in the following equation. Mode 0
Baud Rate = Oscillator Frequency /12 the baud rate in Mode 2 depends on the value of
the SMOD bit in Special Function Register PCON. If SMOD = 0 the baud rate is 1/64 of
the oscillator frequency. If SMOD = 1, the baud rate is 1/32 of the oscillator frequency.
18
SVS Institute Of Technology
19. Department Of ECE
Mode 2 Baud Rate = 2SMODx (Oscillator Frequency)/64.In the IS89C51, the Timer 1
overflow rate determines the baud rates in Modes 1 and 3.
NUMBER OF INTERRUPTS IN 89C51:
There are basically five interrupts available to the user. Reset is also considered as
an interrupt. There are two interrupts for timer, two interrupts for external hardware
interrupt and one interrupt for serial communication.
Memory location Interrupt name
0000H Reset
0003H External interrupt 0
000BH Timer interrupt 0
0013H External interrupt 1
001BH Timer interrupt 1
0023H Serial COM interrupt
Lower the vector, higher the priority. The External Interrupts INT0 and INT1 can
each be either level-activated or transition-activated, depending on bits IT0 and IT1 in
Register TCON. The flags that actually generate these interrupts are the IE0 and IE1 bits
in TCON. When the service routine is vectored, hardware clears the flag that generated
an external interrupt only if the interrupt was transition-activated. If the interrupt was
level-activated, then the external requesting source (rather than the on-chip hardware)
controls the request flag.
The Timer 0 and Timer 1 Interrupts are generated by TF0and TF1, which are set
by a rollover in their respective Timer/Counter registers (except for Timer 0 in Mode
3).When a timer interrupt is generated, the on-chip hardware clears the flag that is
generated.
The Serial Port Interrupt is generated by the logical OR of RI and TI. The service
routine normally must determine whether RI or TI generated the interrupt, and the bit
must be cleared in software.
All of the bits that generate interrupts can be set or cleared by software, with the
same result as though they had been set or cleared by hardware. That is, interrupts can be
generated and pending interrupts can be canceled in software.
19
SVS Institute Of Technology
20. Department Of ECE
Each of these interrupt sources can be individually enabled or disabled by setting
or clearing a bit in Special Function Register IE (interrupt enable) at address 0A8H.
There is a global enable/disable bit that is cleared to disable all interrupts or to set the
interrupts.
IE (Interrupt enable register):
Steps in enabling an interrupt:
Bit D7 of the IE register must be set to high to allow the rest of register to take
effect. If EA=1, interrupts are enabled and will be responded to if their corresponding bits
in IE are high. If EA=0, no interrupt will be responded to even if the associated bit in the
IE register is high.
Description of each bit in IE register:
D7 bit: Disable all interrupts. If EA =0, no interrupt is acknowledged, if EA=1 each
interrupt source is individually enabled or disabled by setting or clearing its enable bit.
D6 bit: Reserved.
D5 bit: Enables or disables timer 2 over flow interrupt (in 8052).
D4 bit: Enables or disables serial port interrupt.
D3 bit: Enables or disables timer 1 over flow interrupt.
D2 bit: Enables or disables external interrupt 1.
D1 bit: Enables or disables timer 0 over flow interrupt.
D0 bit: Enables or disables external interrupt 0.
Interrupt priority in 89C51:
There is one more SRF to assign priority to the interrupts which is named as
interrupt priority (IP). User has given the provision to assign priority to one interrupt.
Writing one to that particular bit in the IP register fulfils the task of assigning the priority.
20
SVS Institute Of Technology
21. Department Of ECE
Description of each bit in IP register:
D7 bit: Reserved.
D6 bit: Reserved.
D5 bit: Timer 2 interrupt priority bit (in 8052).
D4 bit: Serial port interrupt priority bit.
D3 bit: Timer 1 interrupt priority bit.
D2 bit: External interrupt 1 priority bit.
D1 bit: Timer 0 interrupt priority bit.
D0 bit: External interrupt 0 priority bit.
3.2 POWER SUPPLY
This term covers the power distribution system together with any other primary or
secondary sources of energy.
Fig 3.4: Power Supply
Introduction
Power supply is a reference to a source of electrical power. A device or system
that supplies electrical or other types of energy to an output load or group of loads is
called a power supply unit or PSU. The first section is the transformer. The transformer
steps up or steps down the input line voltage and isolates the power supply from the
power line. The rectifier section converts the alternating current input signal to a
pulsating direct current. A filter section is used to convert pulsating dc to a purer, more
21
SVS Institute Of Technology
22. Department Of ECE
desirable form of dc voltage. The final section is the regulator, it maintains the output of
the power supply at a constant level.
Each of the blocks are described below
1. Transformer - steps down high voltage AC mains to low voltage AC.
2. Rectifier - converts AC to DC, but the DC output is varying.
3. Smoothing - smoothes the DC from varying greatly to a small ripple.
4. Regulator - eliminates ripple by setting DC output to a fixed voltage.
3.3 Voltage Regulator:
A voltage regulator is an electrical regulator designed to automatically maintain a
constant voltage level. It may use an electromechanical mechanism, or passive or active
electronic components. Depending on the design, it may be used to regulate one or more
AC or DC voltages. There are two types of regulators they are:
Positive Voltage Series (78xx)
Negative Voltage Series (79xx)
78xx:’78’ indicate the positive series and ‘xx’indicates the voltage rating. Suppose 7805
produces the maximum 5V.’05’indicates the regulator output is 5V.
79xx:’78’ indicate the negative series and ‘xx’indicates the voltage rating. Suppose 7905
produces the maximum -5V.’05’indicates the regulator output is -5V.
These regulators consists the three pins there are
Pin1: It is used for input pin.
Pin2: This is ground pin for regulator
Pin3: It is used for output pin. Through this pin we get the output.
22
SVS Institute Of Technology
23. Department Of ECE
Fig 3.5: Voltage Regulator
3.4 MAX 232
Connection Diagram:
Fig 3.6: MAX 232 Connection Diagram
The MAX232 line drivers/receivers are designed for RS-232 and V.28
communications in harsh environments. Each transmitter output and receiver input is
protected against 15kV electrostatic discharge (ESD) shocks, without latchup.It can
operate from a Single +5V Power Supply.
23
SVS Institute Of Technology
24. Department Of ECE
It is an integrated circuit that converts signals from an RS-232 serial port to
signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a dual
driver/receiver and typically converts the RX, TX, CTS and RTS signals.
Fig 3.7: MAX232 line drivers/receivers
The drivers provide RS-232 voltage level outputs (approx. ± 7.5 V) from a single
+ 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for
implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V
to + 5 V range, as power supply design does not need to be made more complicated just
for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as
high as ± 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of
1.3 V, and a typical hysteresis of 0.5 V.
24
SVS Institute Of Technology
25. Department Of ECE
Voltage levels:
It is helpful to understand what occurs to the voltage levels. When a MAX232 IC
receives a TTL level to convert, it changes a TTL Logic 0 to between +3 and +15V, and
changes TTL Logic 1 to between -3 to -15V, and vice versa for converting from RS232
to TTL. This can be confusing when you realize that the RS232 Data Transmission
voltages at a certain logic state are opposite from the RS232 Control Line voltages at the
same logic state. To clarify the matter, see the table below.
Table 1.2:RS232 Voltage Levels
FUNCTION TABLE
Table 1.3:RS232 Function Table
25
SVS Institute Of Technology
26. Department Of ECE
LOGIC DIAGRAM: (POSITIVE LOGIC)
Fig 3.8:RS232 Logic Diagram
3.5 RS-232 Cable
RS-232 was created for one purpose, to interface between Data Terminal
Equipment (DTE) and Data Communications Equipment (DCE) employing serial binary
data interchange. So as stated the DTE is the terminal or computer and the DCE is the
modem or other communications device. RS-232 is most widely used serial input output
interfacing standards. This standards used in PCs and numerous types of equipment.
However, since the standards were set long before the advent of the TTL logic family, its
input and output levels are not TTL compatible. In RS 232, a 1 is represented by -3 to -25
volt, while 0 bit is +3 to +25 volt, making -3 to +3 undefined. For this reason, we must
use MAX 232 line driver to convert voltage level. It is compatible with PC.
26
SVS Institute Of Technology
27. Department Of ECE
Fig 3.9: RS232 cable
3-wire and 5-wire RS-232:
Minimal “3-wire” RS-232 connections consisting only of transmits data,
receive data, and ground, is commonly used when the full facilities of RS-232 are not
required. Even a two-wire connection (data and ground) can be used if the data flow is
one way (for example, a digital postal scale that periodically sends a weight reading, or a
GPS receiver that periodically sends position, if no configuration via RS-232 is
necessary). When only hardware flow control is required in addition to two-way data, the
RTS and CTS lines are added in a 5-wire version
DB9 CONNECTOR
The term "DB9" refers to a common connector type, one of the D-Subminiature or
D-Sub types of connectors. DB9 has the smallest "footprint" of the D-Subminiature
connectors, and houses 9 pins (for the male connector) or 9 holes (for the female
connector).
DB9 connectors were once very common on PCs and servers. DB9 connectors are
designed to work with the EIA/TIA 232 serial interface standard, which determined the
function of all nine pins as a standard, so that multiple companies could design them into
their products. DB9 connectors were commonly used for serial peripheral devices like
keyboards, mice, joysticks, etc. Today, the DB9 has mostly been replaced by more
modern interfaces such as USB, PS/2, Fire wire, and others. However, there are still
many legacy devices that use the DB9 interface for serial communication.
27
SVS Institute Of Technology
28. Department Of ECE
Fig 3.10: DB9 connector (male and female)
TYPES OF THE DB9 CONNECTOR:
In DB9 connector w have two types of connector
• Male connectors
• Female connectors
Male:
Fig 3.11: DB9 male connector
28
SVS Institute Of Technology
29. Department Of ECE
Female:
Fig 3.12:DB9 Female Connector
Pin Functions:
Data: TxD on pin 3, RxD on pin 2
Handshake: RTS on pin 7, CTS on pin 8, DSR on pin 6,
CD on pin 1, DTR on pin 4
Common: Common pin 5(ground)
Other: RI on pin 9
The method used by RS-232 for communication allows for a simple connection of
three lines: TX, Rx, and Ground. The three essential signals for 2 way RS-232
Communications are these:
TXD: carries data from DTE to the DCE.
RXD: carries data from DCE to the DTE
SG: signal ground
Pin Configuration:
The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature
connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial
connections, allowing for the asynchronous transmission of data as provided for by
standard RS-232 (RS-232C).
29
SVS Institute Of Technology
30. Department Of ECE
Fig 3.13: DB9male and female pins
Pin number Name
1 CD - Carrier Detect
2 RXD - Receive Data
3 TXD - Transmit Data
4 DTR - Data Terminal Ready
5 GND - Signal Ground
6 DSR - Data Set Ready
7 RTS - Request To Send
8 CTS - Clear To Send
9 RI - Ring Indicator
Table 1.4: DB9 Pin Configuration
30
SVS Institute Of Technology
31. Department Of ECE
3.6 LCD (Liquid Crystal Display)
Fig 3.14: LCD
General Description:
The Liquid Crystal Display (LCD) is a low power device (microwatts). Now a
days in most applications LCDs are using rather using of LED displays because of its
specifications like low power consumption, ability to display numbers and special
characters which are difficult to display with other displaying circuits and easy to
program. An LCD requires an external or internal light source. Temperature range of
LCD is 0ºC to 60ºC and lifetime is an area of concern, because LCDs can chemically
degrade these are manufactured with liquid crystal material (normally organic for LCDs)
that will flow like a liquid but whose molecular structure has some properties normally
associated with solids. .
LCD’s are classified as
1. Dynamic-scattering LCDs and
2. Field-effect LCDs
Field-effect LCDs are normally used in such applications where source of
energy is a prime factor (e.g., watches, portable instrumentation etc.).They absorb
considerably less power than the light-scattering type. However, the cost for field-effect
units is typically higher, and their height is limited to 2 inches. On the other hand, light-
scattering units are available up to 8 inches in height. Field-effect LCD is used in the
project for displaying the appropriate information.
31
SVS Institute Of Technology
32. Department Of ECE
RS (Command / Data):
This bit is to specify weather received byte is command or data. So that LCD can
recognize the operation to be performed based on the bit status.
RS = 0 => Command
RS = 1 => Data
RW (Read / Write):
RW bit is to specify weather controller wants READ from LCD or WRITE to
LCD. The READ operation here is just ACK bit to know weather LCD is free or not.
RW = 0 => Write
RW = 1 => Read
EN (Enable LCD):
EN bit is to ENABLE or DISABLE the LCD. Whenever controller wants to
write something into LCD or READ acknowledgment from LCD it needs to enable the
LCD.
EN = 0 => High Impedance
EN = 1 => Low Impedance
ACK (LCD Ready):
ACK bit is to acknowledge the MCU that LCD is free so that it can send new
command or data to be stored in its internal Ram locations
ACK = 1 => Not ACK
ACK = 0 => ACK
32
SVS Institute Of Technology
33. Department Of ECE
LCD diagram:
16 x 2 Char LCD
R1
R2
GND
Vcc
VfRSRWEN
D0 – D7
A K
D0
D7
ACK
Block Diagram
Fig 3.15: LCD Block Diagram
33
SVS Institute Of Technology
34. Department Of ECE
Hardware connections:
CONTROLER
PINS
LCD PINS PIN NAME WITH FEATURE
(P1.0) 4 RS (Control Pin)
(P1.1) 5 RW (Control pin )
(P1.2) 6 EN (Control pin)
Port 0 7 to 14 Data Port
40 15 & 2 Vcc
20 16 & 1 Gnd
Table 1.5: LCD Hardware Connections
3.7 Buzzer Circuit with Unique Functionality
Fig 3.16: Buzzer Circuit with Unique Functionality
Overview
The circuit was constructed using a few components to produce a unique buzzer
with adjustable buzzer tones.
Terminology
Buzzer – an electronic signaling device that produces light and buzzing sound
when activated or triggered
34
SVS Institute Of Technology
35. Department Of ECE
Single Pole Double Throw (SPDT)
An electromagnetic switch that has common, normally open and normally closed
connections; the common gets connected to the normally closed connection when the
relay coil is de-energized while the common gets connected to the normally open
connection when the relay coil is energized.
3.8 ULN2804
The eight NPN Darlington connected transistors in this family of arrays are
ideally suited for interfacing between low logic level digital circuitry (such as TTL,
CMOS or PMOS/NMOS) and the higher current/voltage requirements of lamps, relays,
printer hammers or other similar loads for a broad range of computer, industrial, and
consumer applications. All devices feature open–collector outputs and freewheeling
clamp diodes for transient suppression. The ULN2803 is designed to be compatible with
standard TTL families. While the ULN2804 is optimized for 6 to 15 volt high level
CMOS or PMOS
ULN2804 IC FORM
35
SVS Institute Of Technology
36. Department Of ECE
High-Voltage, High-Current Darlington
Fig 3.17: Pin diagram of ULN2804
Featuring continuous load current ratings to 500 mA for each of the drivers, the
ULN2804 high voltage, high-current Darlington arrays is ideally suited for interfacing
between low-level logic circuitry and multiple peripheral power loads. Typical power
loads totaling over 260 W (350 mA x 8, 95 V) can be controlled at an appropriate duty
cycle depending on ambient temperature and number of drivers turned on simultaneously.
Typical loads include relays, solenoids, stepping Motors, magnetic print hammers,
multiplexed LED and incandescent displays, and heaters. All devices feature open-
collector outputs with integral clamp diodes.
The ULN2003 has series input resistors selected for operation directly with 5 V
TTL or CMOS. These devices will handle numerous interface needs — particularly those
beyond the capabilities of standard logic buffers. The ULN2804 has series input resistors
for operation directly from 6 V to 15 V CMOS or PMOS logic outputs.
36
SVS Institute Of Technology
37. Department Of ECE
The ULN is the standard Darlington arrays. The outputs are capable of sinking
500 mA and will withstand at least 50 V in the off state. Outputs may be paralleled for
higher load current capability. The ULN2804 will withstand 95 V in the off state.
These Darlington arrays are furnished in 18-pin dual in-line plastic packages (suffix
‘A’) or 18-lead small-outline plastic packages (suffix ‘LW’). All devices are pinned with
outputs opposite inputs to facilitate ease of circuit board layout. Prefix ‘ULN’ devices are
rated for operation over the temperature range of -20°C to +85°C; prefix ‘ULQ’ devices
are rated for operation to -40°C.
1. Output Voltage, VCE
2. Input Voltage, VIN ..............................30 V
3. Continuous Output Current, IC .... 500 mA
4. Continuous Input Current, IIN ....... 25 mA
5. Power Dissipation, PD
6. (one Darlington pair) .................. 1.0 W
7. Storage Temperature Range….-55°C to +150°
3.9 Fingerprint module:
System parameter and interface
serial
number
Index Parameter Condition
1 Power supply 5V
2 Working current 170mA
3 Peak value current 200mA
4 Fingerprint input
time
<250ms
5 1:1 matching time <600ms
Matching features + matching
fingerprint
6
1:900 searching
time
<2s
7
Fingerprint
capacity
Max. 960
8 FAR(False
Acceptance Rate)
<0. 001
%
9 FRR
(False Rejection
Rate)
<1.5 %
10 Fingerprint
template size
512bytes
37
SVS Institute Of Technology
38. Department Of ECE
11 Outer interface UART
Commands / Datasheet format
Commands / datasheet:
Pack mark =01 Command
Pack mark=02 Data, and has Follow-up package
Pack mark=08 the last data pack, over
All data packets have to add: 0xEF01
Command packs format:
Byte 2bytes 4bytes
1
byte
2
bytes
1byte … …
2
bytes
Name
Pack
head
Chip
add
Pack
mark
Pack
length
command Parameter1 …
Parameter
n
Check
sum
Content 0xEF01 Xxxx 01 N=
Data pack format:
Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes
Name
Pack
head
Chip add
Pack
mark
Pack length Data
Check
sum
Content 0xEF01 xxxx 02
Over Pack format:
Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes
name
Pack
head
Chip add
Pack
mark
Pack length data
Check
sum
content 0xEF01 xxxx 08
Data packs cannot ingress into executive flow alone, it has to follow behind the
command pack or respond pack.
Upload or upload data pack are the same format.
Pack length = the total bytes of pack length to check sum (command, parameter or data)
including check sum, but excludes the bytes of pack length itself.
38
SVS Institute Of Technology
39. Department Of ECE
Check sum includes all the bytes of the pack mark to check sum, in excess of 2-
byte binary are ignored.
Chip address are default as 0xFFFFFFFF before created, once the host computer
through the command to generate the chip address, all packets must be generated in
accordance with the address to send and receive. Chip will refuse to address the wrong
packet.
Command response
Response is to report for the implementation of the orders and results execution.
Response includes all the parameter and the follow-up data packets, PC only confirm by
receiving the SOC response and order execution.
Response packet format:
2bytes 4bytes 1 byte 2 bytes 1 byte N bytes 2 bytes
0xEF01 Chips add.
Pack mark
07
Pack
length
Confirm
code
Return
parameter
Check sum
Table 1.6: Commands / Datasheet formats
Fig 3.18: Fingerprint Verification System
39
SVS Institute Of Technology
40. Department Of ECE
Application
NGE - OP 67 can be used on all fingerprint verification systems, such as
R&D, Embedded interface development.
Complicated door-guard system;
Fingerprint IC card Identification Terminal;
Fingerprint identification and verification system associated with PC or embedded
environment.
Developer can develop various fingerprint verification application systems based on the
technical data.
3.10 Bike battery:
Bike battery consists of four wires red ,green,black,black and white, from these
four wires green wire is used for earthing and red wire is the battery power supplier and
black and white is used for starting the bike and stopping the bike and black wire is used
for display purpose .The four wires functions are given as;
RED: battery power supplier to all others
GREEN: only for earthing
BLACK: used for display (speed meter etc)
BLACK AND WHITE: used for start and stop the vehicle
Generally there are two conditions for the purpose of starting and stopping of the
bike the two conditions are shown in diagrammatically;
40
SVS Institute Of Technology
41. Department Of ECE
Key off condition
Key on condition
Fig 3.19: Key off/on Condition
When ever the green wire is earthed with black and white wire then the bike stops
and when ever the green wire is open circuit with the black and white wire then the bike
begins to start, all this process depends on the ignition lock of the bike, if on the key and
also to off the key it must satisfy certain condition to accept the condition.
41
SVS Institute Of Technology
42. Department Of ECE
SOFTWARE:
Operating System: WINDOWS XP
Software Used: KEIL, MICRO ‘C’ FLASH, EXPRESS PCB
3.11 KEIL SOFTWARE
Installing the Keil software on a Windows PC:
• Insert the CD-ROM in your computer’s CD drive
• On most computers, the CD will “auto run”, and you will see the Keil installation
menu. If the menu does not appear, manually double click on the Setup icon, in
the root directory: you will then see the Keil menu.
• On the Keil menu, please select “Install Evaluation Software”. (You will not
require a license number to install this software).
• Follow the installation instructions as they appear.
Loading the Projects:
The example projects for this book are NOT loaded automatically when you
install the Keil compiler. These files are stored on the CD in a directory “/Pont”. The files
are arranged by chapter: for example, the project discussed in Chapter 3 is in the
directory “/Pont/Ch03_00-Hello”. Rather than using the projects on the CD (where
changes cannot be saved), please copy the files from CD onto an appropriate directory on
your hard disk.
Note: you will need to change the file properties after copying: file transferred from the
CD will be ‘read only’.
42
SVS Institute Of Technology
43. Department Of ECE
Configuring the Simulator:
1. Open the Keil µVision2
2. Go to Project – Open Project and browse for Hello in Ch03_00 in Pont and open
it.
3. Go to Project – Select Device for Target ‘Target1’
4. Select 8052(all variants) and click OK
5. Now we need to check the oscillator frequency
6. Go to project – Options for Target ‘Target1’
7. Make sure that the oscillator frequency is 11.5902MHz.
8. Building the Target:
9. Build the target as illustrated in the figure below
10. Running the Simulation
11. Having successfully built the target, we are now ready to start the debug session
and run the simulator.
12. First start a debug session
13. The flashing LED we will view will be connected to Port 1. We therefore want to
observe the activity on port
14. To ensure that the port activity is visible, we need to start the ‘periodic window
update’ flag
15. Go to Debug - Go
16. While the simulation is running, view the performance analyzer to check the
delay durations.
17. Go to Debug – Performance Analyzer and click on it
18. Double click on DELAY_LOOP_Wait in Function Symbols: and click Define
button
43
SVS Institute Of Technology
44. Department Of ECE
Go to Project:
Go to Project – Select Device for Target ‘Target1’
Select 8052(all variants) and click OK
44
SVS Institute Of Technology
45. Department Of ECE
Now we need to check the oscillator frequency:
Go to project – Options for Target ‘Target1’
Make sure that the oscillator frequency is 12MHz.
45
SVS Institute Of Technology
46. Department Of ECE
Building the Target
Build the target as illustrated in the figure below
Running the Simulation Having successfully built the target, we are now ready to start
the debug session and run the simulator.
First start a debug session
46
SVS Institute Of Technology
47. Department Of ECE
The flashing LED we will view will be connected to Port 1. We therefore want to observe
the activity on this port
47
SVS Institute Of Technology
48. Department Of ECE
To ensure that the port activity is visible, we need to start the ‘periodic window update’
flag
48
SVS Institute Of Technology
49. Department Of ECE
Go to Debug - Go
While the simulation is running, view the performance analyzer to check the delay
durations.
49
SVS Institute Of Technology
50. Department Of ECE
Go to Debug – Performance Analyzer and click on it
Double click on DELAY LOOP Wait in Function Symbols: and click Define button
50
SVS Institute Of Technology
51. Department Of ECE
Fig 3.20: Configuring the Simulator
51
SVS Institute Of Technology
52. Department Of ECE
Advantages & Applications
Advantages
The main advantage of our project is
• It is used to reduce the vehicle thieves
• It is used to build the own security of your own vehicle
• It is used to identify the thieves (while they are stealing the buzzer or alarm
makes sound)
Disadvantages
• Whenever neighbor needs your vehicle he can’t start without you(vehicle owner).
• Else one of your friend or son has to move with him (friend or neighbor
fingerprint identity is stored)
Applications
House hold based equipments
• It is used in vehicles and also the household equipments (such as door locks
and almaris etc)
Automobiles
• It is used in each and every security things which are needed for us.
• It is used in identification purpose (person identification by using the thumb
impression etc)
52
SVS Institute Of Technology
53. Department Of ECE
4. RESULTS
In our project, from the fingerprint module the wires are connected to the battery
of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get
the power, green wire is connected for earthing, red black is connected for the display
purpose the power from the battery generates from the black wire then the total display
will appear.
In the ignition lock there are certain conditions when the bike is on and as well as
off condition, in the on condition the green wire is shorted with black and white wire then
there is short circuit hence the bike doesn’t start and when there is open circuit with in the
green wire then the bike begins to start, at the starting moment of the bike fingerprint
module ask for the verification of the fingerprint impression if matches they can use
otherwise it gives a sound from the buzzer.
53
SVS Institute Of Technology
54. Department Of ECE
5. CONCLUSION & FUTURE SCOPE
5.1 Conclusion
This project may helpful to the people who are earning a very less salaries and the people
who are richest, earning high salaries by keeping a powerful security on their own
vehicles, they can move anywhere they want by parking the vehicle at unknown place.
This may useful to each and every person in day to day life and they will never afraid of
the vehicle thefters. By this project people come to existence that our country is
developing and they move forward the leg with full of dareness in their minds.
5.2 Future Scope
In future we want to develop the same project but by adding a default user identifier and
in future we can make this project very bright, by using a snapshot video camera
whenever a thief ready for stealing the vehicle, as it records the total scenario happening
and also it sends the message to the owner of the vehicle by using the GSM and GPRS
technologies.
54
SVS Institute Of Technology
55. Department Of ECE
BIBILOGRAPHY
http://www.fingerprint.com/
http://en.wikipedia.org/wiki/Biometric
http://travel.state.gov/fingerprint/eppt/eppt_2788.html
http://www.buslab.org/index.php/content/view/24733/6
http://www.pcworld.com/article/id,103535-page,1/article.html
http://www.modulesfinger.in/site/india
55
SVS Institute Of Technology