SlideShare a Scribd company logo
Department Of ECE
1. INTRODUCTION
1.1 Introduction
Embedded systems plays a crucial role in critical infrastructure, which is
recognized as essential to national security, health and economy. There is an increasing
concern of security threats, as embedded systems are moving towards networked
applications. Model based approaches have proven to be an effective for embedded
system design. Security is the important aspect of embedded system design. The
characteristics of embedded system give rise to a number of novel vulnerabilities.
Network connectivity opens even more avenues for remote exploits. In response, security
solutions are being developed to provide robustness, protection from attacks, and
recovery capabilities.
Fingerprint identification is used in many ways, for identification and also for the
security purposes. In these days, somewhere sometimes bikes are stolen by the stranger’s
reason is that they don’t have security system. In the present generation we are using the
fingerprint based security system for door locking, EVM’s for any kind of the
identification.
1.2 Literature Survey
Biometrics is derived from Greek word “bios” means life and “metron” means
measure. It is the study of methods for uniquely recognizing human based upon one or
more physical or behavioral traits.
1.2.1 Fingerprint Authentication:
It refers to the automated method of verifying a match between two human
fingerprints.
Fingerprints are one of many forms of biometrics used to identify an individual
and verify their identity. This article touches two major classes of algorithms (minutia
and pattern) and four sensor designs (optical, ultrasonic, passive capacitance and active
capacitance).The simple fact is that passwords don’t work very well. Other authentication
mechanisms such as tokens, smart cards, etc. require you to carry something. This is
better than a password, but easies to lose. Think about losing your credit card or driving
1
SVS Institute Of Technology
Department Of ECE
license. Losing your corporate network access is a lot worse. Information is valuable and
harder to track than money.
Fingerprints can also acts as a simple, trusted and convenient user-interface to a
well thought security architecture. The two components need each other to provide truly
effective security. A user authenticated via fingerprints can take advantage of a solid
security system minimal education. Fingerprints have been used for identification for
over 100 years. They are the standard without question. In addition to signatures,
fingerprints are the only other form of identification that has a legal standing. A key issue
of trust is privacy. The best way to maintain that is to store a template of unique
fingerprint characteristics instead of entire print. This is sufficient for one to one or too
many matching and eliminates the need for a database of searchable fingerprints.
1.2.2 Biometric System:
The diagram below shows a simple block diagram of a biometric system. The
main operations a system can perform are enrollment and test. During the enrollment
biometric information of an individual are stored, during the test, and during the test
information are detected and compared with the stored information.
Fig 1.0: Biometric System
2
SVS Institute Of Technology
Department Of ECE
Biometric System Diagram:
The first block (sensor) is the interface between the real world (user) and our
system (biometric system), it has to acquire all the necessary data. Most of the time it is
an image acquisition system, but it can change according to the characteristics we want to
consider.
The second block performs all the necessary pre-processing; it has to remove
artifacts from the sensor, to enhance the input (e.g. remove some kind of noise.), to use
some kind of normalization, etc.
In third block we have to extract the features we need. This step is really
important; we have to choose which features it extract and how. Moreover we have to do
it with certain efficiency (it can’t take hours). After that, we can have a vector of numbers
or an image with particular properties: all those data are used to create the template.
A template is a synthesis of all the characteristics we could extract from the
source; it has to be as short as possible (to improve efficiency) but we can’t discard to
many details, thus losing discrimination.
Then if it is performing enrollment, then the template is simply stored somewhere
(it can be stored in on a card or within a database). If it is performing the matching phase,
the obtained template is passed to matcher that compares it with other existing templates,
estimating the distance between them using any algorithm (e.g. Hamming distance). The
decision matcher has taken is sent as output, so that it can be used for any purpose (e.g. it
can allow the entrance in restricted areas).
1.2.3 Patterns and Features:
The analysis of fingerprints for matching purposes generally requires the
comparison of several features of the print pattern. These include print patterns, which
are aggregate characteristics of ridges, and minutia points, which are unique features
found within patterns. It is also necessary to know the structure and properties of human
skin in order to successfully employ some of the imaging technologies.
Patterns:
There are three basic patterns of fingerprint ridges are the Arch, Loop, and Whorl.
3
SVS Institute Of Technology
Department Of ECE
Arch Pattern:
An arch is a pattern where the ridges enter from one side of a finger, rise in the
centre forming an arc, and them exit the other side of the finger.
Loop Pattern:
The loop pattern is a pattern where the ridges enter from one side of a finger, from
a curve, and tend to exit from the same side they enter.
Whorl Pattern:
In the whorl pattern, ridges form a circular pattern around a central point on the
finger. Scientists have found that of family members often share the same general
patterns, leading to the belief that these patterns are inherited.
Fig 1.1: Human Fingerprint Pattern
Features:
Minutia based feature:
The major minutia features of fingerprint ridges are: ridge ending, bifurcation and
short point ridge (or dot). The ridge ending is the point at which a ridge terminates.
Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or
dots) are the ridges which are significantly shorter than the average ridge length on the
fingerprint.
4
SVS Institute Of Technology
Department Of ECE
Sequential design based on the following modules: Segmentation, local ridge
orientation estimation (singularity and more detection), local ridge frequency estimation,
fingerprint enhancement, minutiae detection, and minutiae filtering and post-processing.
Ridge based feature:
Size and shape of fingerprint, number, type, and position of singularities (cores
and deltas), spatial relationship and geometrical attributes of the ridge lines, shape
features, global and local texture information, sweat pores, fractal features.
Fig 1.2: Ridge based feature
5
SVS Institute Of Technology
Department Of ECE
2.BLOCK DIAGRAM
+5v
Fig 2.1: BLOCK DIAGRAM
6
SVS Institute Of Technology
AT89C51 BUZZER
DRIVER RELAY
Bik
e
con
nec
tio
n
L.C.D
Max
232
FINGERPRINT
MODULE
POWER
SUPPLY (5V DC)
Department Of ECE
2.1 Block diagram description:
8051 MICROCONTROLLER:
The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller
with 4k bytes of Flash Programmable and erasable read only memory (EROM).AT89C51
has many functions and to this microcontroller many other various components are
connected for the functioning of their particular operations and to get the particular
required output. This is very necessary in each and every embedded project.
FINGERPRINT MODULE:
Fingerprint module is interconnected to 8051 microcontroller and this module is
used for the recognization and identification of the fingerprint and also to verify the
recognized fingerprint. So fingerprint module is necessary for identification.
MAX 232:
Max 232 is used as a voltage converter, as 8051 microcontroller need TTL
voltage level, as fingerprint module voltage is cmos voltage level ,but by using the
max232 we can convert one voltage level to the other voltage level.
LCD:
LCD is used to display the functioning of the project or particular operation, as
our project is needed to identify and also to recognize the fingerprint, the LCD shows it
on the screen and total verification depends on the LCD.
BIKE BATTERY:
Bike battery is connected to the 8051 microcontroller and it has the main
functioning of our project. In this bike battery the power supplies and the ignition key
lock on and off conditions totally depends on the bike battery.
7
SVS Institute Of Technology
Department Of ECE
POWER SUPPLY:
Power supply is needed for each and every IC and also the modules, so it supplies
the required amount of power to all the components and has major part the project, it
supplies a high power but by using the voltage regulator we can supply the required
amount of power to the components.
RELAY:
Relay is used as switch and when ever it gets the power it starts the vehicle and
when ever it doesn’t get any power until and unless it won’t starts the vehicle.
2.2 Schematic diagram
Fig 2.2: Schematic diagram
8
SVS Institute Of Technology
Department Of ECE
2.3 Working principle
The working principle of “fingerprint based vehicle access control system” is
switching (act as switch).
In our project, from the fingerprint module the wires are connected to the battery
of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get
the power, green wire is connected for earthing, red black is connected for the display
purpose the power from the battery generates from the black wire then the total display
will appear.
In the ignition lock there are certain conditions when the bike is on and as well as
off condition, in the on condition the green wire is shorted with black and white wire then
there is short circuit hence the bike doesn’t start and when there is open circuit with in the
green wire then the bike begins to start, at the starting moment of the bike fingerprint
module ask for the verification of the fingerprint impression if matches they can use
otherwise it gives a sound from the buzzer.
9
SVS Institute Of Technology
Department Of ECE
3. HARDWARE & SOFTWARE REQUIREMENTS
HARDWARE:
3.1 AT89C51:
A microcontroller is a general purpose device, but that is meant to read data,
perform limited calculations on that data and control its environment based on those
calculations. The prime use of a microcontroller is to control the operation of a machine
using a fixed program that is stored in ROM and that does not change over the lifetime of
the system.
The microcontroller design uses a much more limited set of single and double
byte instructions that are used to move data and code from internal memory to the ALU.
The microcontroller is concerned with getting data from and to its own pins, the
architecture and instruction set are optimized to handle data in bit and byte size.
The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller
with 4k bytes of Flash Programmable and erasable read only memory (EROM). The
device is manufactured using Atmel’s high-density nonvolatile memory technology and
is functionally compatible with the industry-standard 80C51 microcontroller instruction
set and pin out. By combining versatile 8-bit CPU with Flash on a monolithic chip, the
Atmel’s AT89c51 is a powerful microcomputer, which provides a high flexible and cost-
effective solution to many embedded control applications.
10
SVS Institute Of Technology
Department Of ECE
Pin Configuration of AT89c51 Microcontroller
Fig 3.1: Pin Configuration of AT89c51 Microcontroller
11
SVS Institute Of Technology
Department Of ECE
AT89C51 Block Diagram
Fig 3.2: AT89C51 Block Diagram
PIN DESCRIPTION:
VCC
Supply voltage
GND
Ground
Port 0
Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin
can sink eight TTL inputs. When 1’s are written to port 0 pins, the pins can be used as
high impedance inputs.
Port 0 can also be configured to be the multiplexed low order address/data bus
during access to external program and data memory.
12
SVS Institute Of Technology
Department Of ECE
Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The port 1output
buffers can sink/source four TTL inputs. When 1’s are written to port 1 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 1 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The port 2 output
buffers can sink/source four TTL inputs. When 1’s are written to port 2 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 2 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The port 3 output
buffers can sink/source four TTL inputs. When 1s are written to port 3 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 3 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 3 also receives some control signals for Flash Programming and verification.
Port pin Alternate Functions
P3.0 RXD(serial input port)
P3.1 TXD(serial input port)
P3.2 INT0(external interrupt 0)
P3.3 INT1(external interrupt 1)
P3.4 T0(timer 0 external input)
P3.5 T1(timer 1 external input)
P3.6 WR(external data memory write
strobe)
P3.7 RD(external data memory read
strobe)
Table 1.1: Pin Description of AT89C51
13
SVS Institute Of Technology
Department Of ECE
RST
Rest input A on this pin for two machine cycles while the oscillator is running
resets the device.
ALE/PROG:
Address Latch Enable is an output pulse for latching the low byte of the address
during access to external memory. This pin is also the program pulse input (PROG)
during Flash programming.
In normal operation ALE is emitted at a constant rate of 1/16 the oscillator
frequency and may be used for external timing or clocking purpose. Note, however, that
one ALE pulse is skipped during each access to external Data memory.
PSEN
Program Store Enable is the read strobe to external program memory when the
AT89c51 is executing code from external program memory PSEN is activated twice each
machine cycle, except that two PSEN activations are skipped during each access to
external data memory.
EA /VPP
External Access Enable (EA) must be strapped to GND in order to enable the
device to fetch code from external program memory locations starting at 0000h up to
FFFFH. Note, however, that if lock bit 1 is programmed EA will be internally latched on
reset. EA should be strapped to Vcc for internal program executions. This pin also
receives the 12-volt programming enable voltage (Vpp) during Flash programming when
12-volt programming is selected.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock
operating circuit.
XTAL 2
Output from the inverting oscillator amplifier.
14
SVS Institute Of Technology
Department Of ECE
OPERATING DESCRIPTION
The detail description of the AT89C51 included in this description is:
• Memory Map and Registers
• Timer/Counters
• Interrupt System
MEMORY MAP AND REGISTERS
Memory
The AT89C51 has separate address spaces for program and data memory. The
program and data memory can be up to 64K bytes long. The lower 4K program memory
can reside on-chip. The AT89C51 has 128 bytes of on-chip RAM.
The lower 128 bytes can be accessed either by direct addressing or by indirect
addressing. The lower 128 bytes of RAM can be divided into 3 segments as listed below
1. Register Banks 0-3:
Locations 00H through 1FH (32 bytes). The device after reset defaults to register
bank 0. To use the other register banks, the user must select them in software. Each
register bank contains eight 1-byte registers R0-R7. Reset initializes the stack point to
location 07H, and is incremented once to start from 08H, which is the first register of the
second register bank.
2. Bit Addressable Area:
16 bytes have been assigned for this segment 20H-2FH. Each one of the 128 bits
of this segment can be directly addressed (0-7FH). Each of the 16 bytes in this segment
can also be addressed as a byte.
3. Scratch Pad Area:
30H-7FH are available to the user as data RAM. However, if the data pointer has
been initialized to this area, enough bytes should be left aside to prevent SP data
destruction.
15
SVS Institute Of Technology
Department Of ECE
Fig 3.3: Memory Map & Registers
SPECIAL FUNCTION REGISTERS
The Special Function Registers (SFR's) are located in upper 128 Bytes direct
addressing area. The SFR Memory Map in shows that.
Not all of the addresses are occupied. Unoccupied addresses are not implemented
on the chip. Read accesses to these addresses in general return random data, and write
accesses have no effect. User software should not write 1’s to these unimplemented
locations, since they may be used in future microcontrollers to invoke new features. In
that case, the reset or inactive values of the new bits will always be 0, and their active
values will be 1.
The functions of the SFR’s are outlined in the following sections.
Accumulator (ACC)
ACC is the Accumulator register. The mnemonics for Accumulator-specific
instructions, however, refer to the Accumulator simply as A.
16
SVS Institute Of Technology
Department Of ECE
B Register (B)
The B register is used during multiply and divide operations. For other
instructions it can be treated as another scratch pad register.
Program Status Word (PSW)
The PSW register contains program status information.
Stack Pointer (SP)
The Stack Pointer Register is eight bits wide. It is incremented before data is
stored during PUSH and CALL executions. While the stack may reside anywhere in on
chip RAM, the Stack Pointer is initialized to 07H after a reset. This causes the stack to
begin at location 08H.
Data Pointer (DPTR)
The Data Pointer consists of a high byte (DPH) and a low byte (DPL). Its function
is to hold a 16-bit address. It may be manipulated as a 16-bit register or as two
independent 8-bit registers.
Serial Data Buffer (SBUF)
The Serial Data Buffer is actually two separate registers, a transmit buffer and a
receive buffer register. When data is moved to SBUF, it goes to the transmit buffer,
where it is held for serial transmission. (Moving a byte to SBUF initiates the
transmission.) When data is moved from SBUF, it comes from the receive buffer.
Timer Registers
Register pairs (TH0, TL0) and (TH1, TL1) are the 16-bit Counter registers for
Timer/Counters 0 and 1, respectively.
Control Registers
Special Function Registers IP, IE, TMOD, TCON, SCON, and PCON contain
control and status bits for the interrupt system, the Timer/Counters, and the serial port.
17
SVS Institute Of Technology
Department Of ECE
TIMER/COUNTERS
The IS89C51 has two 16-bit Timer/Counter registers: Timer 0 and Timer 1. All
two can be configured to operate either as Timers or event counters. As a Timer, the
register is incremented every machine cycle. Thus, the register counts machine cycles.
Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the
oscillator frequency.
As a Counter, the register is incremented in response to a 1-to-0 transition at its
corresponding external input pin, T0 and T1. The external input is sampled during S5P2
of every machine cycle. When the samples show a high in one cycle and a low in the next
Cycle, the count is incremented. The new count value appears in the register during S3P1
of the cycle following the one in which the transition was detected. Since two machine
cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum
count rate is 1/24 of the oscillator frequency. There are no restrictions on the duty cycle
of the external input signal, but it should be held for at least one full machine cycle to
ensure that a given level is sampled at least once before it changes.
INTERRUPT SYSTEM
An interrupt is an external or internal event that suspends the operation of micro
controller to inform it that a device needs its service. In interrupt method, whenever any
device needs its service, the device notifies the micro controller by sending it an interrupt
signal. Upon receiving an interrupt signal, the micro controller interrupts whatever it is
doing and serves the device. The program associated with interrupt is called as interrupt
service subroutine (ISR).Main advantage with interrupts is that the micro controller can
serve many devices.
Baud Rate
The baud rate in Mode 0 is fixed as shown in the following equation. Mode 0
Baud Rate = Oscillator Frequency /12 the baud rate in Mode 2 depends on the value of
the SMOD bit in Special Function Register PCON. If SMOD = 0 the baud rate is 1/64 of
the oscillator frequency. If SMOD = 1, the baud rate is 1/32 of the oscillator frequency.
18
SVS Institute Of Technology
Department Of ECE
Mode 2 Baud Rate = 2SMODx (Oscillator Frequency)/64.In the IS89C51, the Timer 1
overflow rate determines the baud rates in Modes 1 and 3.
NUMBER OF INTERRUPTS IN 89C51:
There are basically five interrupts available to the user. Reset is also considered as
an interrupt. There are two interrupts for timer, two interrupts for external hardware
interrupt and one interrupt for serial communication.
Memory location Interrupt name
0000H Reset
0003H External interrupt 0
000BH Timer interrupt 0
0013H External interrupt 1
001BH Timer interrupt 1
0023H Serial COM interrupt
Lower the vector, higher the priority. The External Interrupts INT0 and INT1 can
each be either level-activated or transition-activated, depending on bits IT0 and IT1 in
Register TCON. The flags that actually generate these interrupts are the IE0 and IE1 bits
in TCON. When the service routine is vectored, hardware clears the flag that generated
an external interrupt only if the interrupt was transition-activated. If the interrupt was
level-activated, then the external requesting source (rather than the on-chip hardware)
controls the request flag.
The Timer 0 and Timer 1 Interrupts are generated by TF0and TF1, which are set
by a rollover in their respective Timer/Counter registers (except for Timer 0 in Mode
3).When a timer interrupt is generated, the on-chip hardware clears the flag that is
generated.
The Serial Port Interrupt is generated by the logical OR of RI and TI. The service
routine normally must determine whether RI or TI generated the interrupt, and the bit
must be cleared in software.
All of the bits that generate interrupts can be set or cleared by software, with the
same result as though they had been set or cleared by hardware. That is, interrupts can be
generated and pending interrupts can be canceled in software.
19
SVS Institute Of Technology
Department Of ECE
Each of these interrupt sources can be individually enabled or disabled by setting
or clearing a bit in Special Function Register IE (interrupt enable) at address 0A8H.
There is a global enable/disable bit that is cleared to disable all interrupts or to set the
interrupts.
IE (Interrupt enable register):
Steps in enabling an interrupt:
Bit D7 of the IE register must be set to high to allow the rest of register to take
effect. If EA=1, interrupts are enabled and will be responded to if their corresponding bits
in IE are high. If EA=0, no interrupt will be responded to even if the associated bit in the
IE register is high.
Description of each bit in IE register:
D7 bit: Disable all interrupts. If EA =0, no interrupt is acknowledged, if EA=1 each
interrupt source is individually enabled or disabled by setting or clearing its enable bit.
D6 bit: Reserved.
D5 bit: Enables or disables timer 2 over flow interrupt (in 8052).
D4 bit: Enables or disables serial port interrupt.
D3 bit: Enables or disables timer 1 over flow interrupt.
D2 bit: Enables or disables external interrupt 1.
D1 bit: Enables or disables timer 0 over flow interrupt.
D0 bit: Enables or disables external interrupt 0.
Interrupt priority in 89C51:
There is one more SRF to assign priority to the interrupts which is named as
interrupt priority (IP). User has given the provision to assign priority to one interrupt.
Writing one to that particular bit in the IP register fulfils the task of assigning the priority.
20
SVS Institute Of Technology
Department Of ECE
Description of each bit in IP register:
D7 bit: Reserved.
D6 bit: Reserved.
D5 bit: Timer 2 interrupt priority bit (in 8052).
D4 bit: Serial port interrupt priority bit.
D3 bit: Timer 1 interrupt priority bit.
D2 bit: External interrupt 1 priority bit.
D1 bit: Timer 0 interrupt priority bit.
D0 bit: External interrupt 0 priority bit.
3.2 POWER SUPPLY
This term covers the power distribution system together with any other primary or
secondary sources of energy.
Fig 3.4: Power Supply
Introduction
Power supply is a reference to a source of electrical power. A device or system
that supplies electrical or other types of energy to an output load or group of loads is
called a power supply unit or PSU. The first section is the transformer. The transformer
steps up or steps down the input line voltage and isolates the power supply from the
power line. The rectifier section converts the alternating current input signal to a
pulsating direct current. A filter section is used to convert pulsating dc to a purer, more
21
SVS Institute Of Technology
Department Of ECE
desirable form of dc voltage. The final section is the regulator, it maintains the output of
the power supply at a constant level.
Each of the blocks are described below
1. Transformer - steps down high voltage AC mains to low voltage AC.
2. Rectifier - converts AC to DC, but the DC output is varying.
3. Smoothing - smoothes the DC from varying greatly to a small ripple.
4. Regulator - eliminates ripple by setting DC output to a fixed voltage.
3.3 Voltage Regulator:
A voltage regulator is an electrical regulator designed to automatically maintain a
constant voltage level. It may use an electromechanical mechanism, or passive or active
electronic components. Depending on the design, it may be used to regulate one or more
AC or DC voltages. There are two types of regulators they are:
Positive Voltage Series (78xx)
Negative Voltage Series (79xx)
78xx:’78’ indicate the positive series and ‘xx’indicates the voltage rating. Suppose 7805
produces the maximum 5V.’05’indicates the regulator output is 5V.
79xx:’78’ indicate the negative series and ‘xx’indicates the voltage rating. Suppose 7905
produces the maximum -5V.’05’indicates the regulator output is -5V.
These regulators consists the three pins there are
Pin1: It is used for input pin.
Pin2: This is ground pin for regulator
Pin3: It is used for output pin. Through this pin we get the output.
22
SVS Institute Of Technology
Department Of ECE
Fig 3.5: Voltage Regulator
3.4 MAX 232
Connection Diagram:
Fig 3.6: MAX 232 Connection Diagram
The MAX232 line drivers/receivers are designed for RS-232 and V.28
communications in harsh environments. Each transmitter output and receiver input is
protected against 15kV electrostatic discharge (ESD) shocks, without latchup.It can
operate from a Single +5V Power Supply.
23
SVS Institute Of Technology
Department Of ECE
It is an integrated circuit that converts signals from an RS-232 serial port to
signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a dual
driver/receiver and typically converts the RX, TX, CTS and RTS signals.
Fig 3.7: MAX232 line drivers/receivers
The drivers provide RS-232 voltage level outputs (approx. ± 7.5 V) from a single
+ 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for
implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V
to + 5 V range, as power supply design does not need to be made more complicated just
for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as
high as ± 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of
1.3 V, and a typical hysteresis of 0.5 V.
24
SVS Institute Of Technology
Department Of ECE
Voltage levels:
It is helpful to understand what occurs to the voltage levels. When a MAX232 IC
receives a TTL level to convert, it changes a TTL Logic 0 to between +3 and +15V, and
changes TTL Logic 1 to between -3 to -15V, and vice versa for converting from RS232
to TTL. This can be confusing when you realize that the RS232 Data Transmission
voltages at a certain logic state are opposite from the RS232 Control Line voltages at the
same logic state. To clarify the matter, see the table below.
Table 1.2:RS232 Voltage Levels
FUNCTION TABLE
Table 1.3:RS232 Function Table
25
SVS Institute Of Technology
Department Of ECE
LOGIC DIAGRAM: (POSITIVE LOGIC)
Fig 3.8:RS232 Logic Diagram
3.5 RS-232 Cable
RS-232 was created for one purpose, to interface between Data Terminal
Equipment (DTE) and Data Communications Equipment (DCE) employing serial binary
data interchange. So as stated the DTE is the terminal or computer and the DCE is the
modem or other communications device. RS-232 is most widely used serial input output
interfacing standards. This standards used in PCs and numerous types of equipment.
However, since the standards were set long before the advent of the TTL logic family, its
input and output levels are not TTL compatible. In RS 232, a 1 is represented by -3 to -25
volt, while 0 bit is +3 to +25 volt, making -3 to +3 undefined. For this reason, we must
use MAX 232 line driver to convert voltage level. It is compatible with PC.
26
SVS Institute Of Technology
Department Of ECE
Fig 3.9: RS232 cable
3-wire and 5-wire RS-232:
Minimal “3-wire” RS-232 connections consisting only of transmits data,
receive data, and ground, is commonly used when the full facilities of RS-232 are not
required. Even a two-wire connection (data and ground) can be used if the data flow is
one way (for example, a digital postal scale that periodically sends a weight reading, or a
GPS receiver that periodically sends position, if no configuration via RS-232 is
necessary). When only hardware flow control is required in addition to two-way data, the
RTS and CTS lines are added in a 5-wire version
DB9 CONNECTOR
The term "DB9" refers to a common connector type, one of the D-Subminiature or
D-Sub types of connectors. DB9 has the smallest "footprint" of the D-Subminiature
connectors, and houses 9 pins (for the male connector) or 9 holes (for the female
connector).
DB9 connectors were once very common on PCs and servers. DB9 connectors are
designed to work with the EIA/TIA 232 serial interface standard, which determined the
function of all nine pins as a standard, so that multiple companies could design them into
their products. DB9 connectors were commonly used for serial peripheral devices like
keyboards, mice, joysticks, etc. Today, the DB9 has mostly been replaced by more
modern interfaces such as USB, PS/2, Fire wire, and others. However, there are still
many legacy devices that use the DB9 interface for serial communication.
27
SVS Institute Of Technology
Department Of ECE
Fig 3.10: DB9 connector (male and female)
TYPES OF THE DB9 CONNECTOR:
In DB9 connector w have two types of connector
• Male connectors
• Female connectors
Male:
Fig 3.11: DB9 male connector
28
SVS Institute Of Technology
Department Of ECE
Female:
Fig 3.12:DB9 Female Connector
Pin Functions:
Data: TxD on pin 3, RxD on pin 2
Handshake: RTS on pin 7, CTS on pin 8, DSR on pin 6,
CD on pin 1, DTR on pin 4
Common: Common pin 5(ground)
Other: RI on pin 9
The method used by RS-232 for communication allows for a simple connection of
three lines: TX, Rx, and Ground. The three essential signals for 2 way RS-232
Communications are these:
TXD: carries data from DTE to the DCE.
RXD: carries data from DCE to the DTE
SG: signal ground
Pin Configuration:
The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature
connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial
connections, allowing for the asynchronous transmission of data as provided for by
standard RS-232 (RS-232C).
29
SVS Institute Of Technology
Department Of ECE
Fig 3.13: DB9male and female pins
Pin number Name
1 CD - Carrier Detect
2 RXD - Receive Data
3 TXD - Transmit Data
4 DTR - Data Terminal Ready
5 GND - Signal Ground
6 DSR - Data Set Ready
7 RTS - Request To Send
8 CTS - Clear To Send
9 RI - Ring Indicator
Table 1.4: DB9 Pin Configuration
30
SVS Institute Of Technology
Department Of ECE
3.6 LCD (Liquid Crystal Display)
Fig 3.14: LCD
General Description:
The Liquid Crystal Display (LCD) is a low power device (microwatts). Now a
days in most applications LCDs are using rather using of LED displays because of its
specifications like low power consumption, ability to display numbers and special
characters which are difficult to display with other displaying circuits and easy to
program. An LCD requires an external or internal light source. Temperature range of
LCD is 0ºC to 60ºC and lifetime is an area of concern, because LCDs can chemically
degrade these are manufactured with liquid crystal material (normally organic for LCDs)
that will flow like a liquid but whose molecular structure has some properties normally
associated with solids. .
LCD’s are classified as
1. Dynamic-scattering LCDs and
2. Field-effect LCDs
Field-effect LCDs are normally used in such applications where source of
energy is a prime factor (e.g., watches, portable instrumentation etc.).They absorb
considerably less power than the light-scattering type. However, the cost for field-effect
units is typically higher, and their height is limited to 2 inches. On the other hand, light-
scattering units are available up to 8 inches in height. Field-effect LCD is used in the
project for displaying the appropriate information.
31
SVS Institute Of Technology
Department Of ECE
RS (Command / Data):
This bit is to specify weather received byte is command or data. So that LCD can
recognize the operation to be performed based on the bit status.
RS = 0 => Command
RS = 1 => Data
RW (Read / Write):
RW bit is to specify weather controller wants READ from LCD or WRITE to
LCD. The READ operation here is just ACK bit to know weather LCD is free or not.
RW = 0 => Write
RW = 1 => Read
EN (Enable LCD):
EN bit is to ENABLE or DISABLE the LCD. Whenever controller wants to
write something into LCD or READ acknowledgment from LCD it needs to enable the
LCD.
EN = 0 => High Impedance
EN = 1 => Low Impedance
ACK (LCD Ready):
ACK bit is to acknowledge the MCU that LCD is free so that it can send new
command or data to be stored in its internal Ram locations
ACK = 1 => Not ACK
ACK = 0 => ACK
32
SVS Institute Of Technology
Department Of ECE
LCD diagram:
16 x 2 Char LCD
R1
R2
GND
Vcc
VfRSRWEN
D0 – D7
A K
D0
D7
ACK
Block Diagram
Fig 3.15: LCD Block Diagram
33
SVS Institute Of Technology
Department Of ECE
Hardware connections:
CONTROLER
PINS
LCD PINS PIN NAME WITH FEATURE
(P1.0) 4 RS (Control Pin)
(P1.1) 5 RW (Control pin )
(P1.2) 6 EN (Control pin)
Port 0 7 to 14 Data Port
40 15 & 2 Vcc
20 16 & 1 Gnd
Table 1.5: LCD Hardware Connections
3.7 Buzzer Circuit with Unique Functionality
Fig 3.16: Buzzer Circuit with Unique Functionality
Overview
The circuit was constructed using a few components to produce a unique buzzer
with adjustable buzzer tones.
Terminology
Buzzer – an electronic signaling device that produces light and buzzing sound
when activated or triggered
34
SVS Institute Of Technology
Department Of ECE
Single Pole Double Throw (SPDT)
An electromagnetic switch that has common, normally open and normally closed
connections; the common gets connected to the normally closed connection when the
relay coil is de-energized while the common gets connected to the normally open
connection when the relay coil is energized.
3.8 ULN2804
The eight NPN Darlington connected transistors in this family of arrays are
ideally suited for interfacing between low logic level digital circuitry (such as TTL,
CMOS or PMOS/NMOS) and the higher current/voltage requirements of lamps, relays,
printer hammers or other similar loads for a broad range of computer, industrial, and
consumer applications. All devices feature open–collector outputs and freewheeling
clamp diodes for transient suppression. The ULN2803 is designed to be compatible with
standard TTL families. While the ULN2804 is optimized for 6 to 15 volt high level
CMOS or PMOS
ULN2804 IC FORM
35
SVS Institute Of Technology
Department Of ECE
High-Voltage, High-Current Darlington
Fig 3.17: Pin diagram of ULN2804
Featuring continuous load current ratings to 500 mA for each of the drivers, the
ULN2804 high voltage, high-current Darlington arrays is ideally suited for interfacing
between low-level logic circuitry and multiple peripheral power loads. Typical power
loads totaling over 260 W (350 mA x 8, 95 V) can be controlled at an appropriate duty
cycle depending on ambient temperature and number of drivers turned on simultaneously.
Typical loads include relays, solenoids, stepping Motors, magnetic print hammers,
multiplexed LED and incandescent displays, and heaters. All devices feature open-
collector outputs with integral clamp diodes.
The ULN2003 has series input resistors selected for operation directly with 5 V
TTL or CMOS. These devices will handle numerous interface needs — particularly those
beyond the capabilities of standard logic buffers. The ULN2804 has series input resistors
for operation directly from 6 V to 15 V CMOS or PMOS logic outputs.
36
SVS Institute Of Technology
Department Of ECE
The ULN is the standard Darlington arrays. The outputs are capable of sinking
500 mA and will withstand at least 50 V in the off state. Outputs may be paralleled for
higher load current capability. The ULN2804 will withstand 95 V in the off state.
These Darlington arrays are furnished in 18-pin dual in-line plastic packages (suffix
‘A’) or 18-lead small-outline plastic packages (suffix ‘LW’). All devices are pinned with
outputs opposite inputs to facilitate ease of circuit board layout. Prefix ‘ULN’ devices are
rated for operation over the temperature range of -20°C to +85°C; prefix ‘ULQ’ devices
are rated for operation to -40°C.
1. Output Voltage, VCE
2. Input Voltage, VIN ..............................30 V
3. Continuous Output Current, IC .... 500 mA
4. Continuous Input Current, IIN ....... 25 mA
5. Power Dissipation, PD
6. (one Darlington pair) .................. 1.0 W
7. Storage Temperature Range….-55°C to +150°
3.9 Fingerprint module:
System parameter and interface
serial
number
Index Parameter Condition
1 Power supply 5V
2 Working current 170mA
3 Peak value current 200mA
4 Fingerprint input
time
<250ms
5 1:1 matching time <600ms
Matching features + matching
fingerprint
6
1:900 searching
time
<2s
7
Fingerprint
capacity
Max. 960
8 FAR(False
Acceptance Rate)
<0. 001
%
9 FRR
(False Rejection
Rate)
<1.5 %
10 Fingerprint
template size
512bytes
37
SVS Institute Of Technology
Department Of ECE
11 Outer interface UART
Commands / Datasheet format
Commands / datasheet:
Pack mark =01 Command
Pack mark=02 Data, and has Follow-up package
Pack mark=08 the last data pack, over
All data packets have to add: 0xEF01
Command packs format:
Byte 2bytes 4bytes
1
byte
2
bytes
1byte … …
2
bytes
Name
Pack
head
Chip
add
Pack
mark
Pack
length
command Parameter1 …
Parameter
n
Check
sum
Content 0xEF01 Xxxx 01 N=
Data pack format:
Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes
Name
Pack
head
Chip add
Pack
mark
Pack length Data
Check
sum
Content 0xEF01 xxxx 02
Over Pack format:
Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes
name
Pack
head
Chip add
Pack
mark
Pack length data
Check
sum
content 0xEF01 xxxx 08
Data packs cannot ingress into executive flow alone, it has to follow behind the
command pack or respond pack.
Upload or upload data pack are the same format.
Pack length = the total bytes of pack length to check sum (command, parameter or data)
including check sum, but excludes the bytes of pack length itself.
38
SVS Institute Of Technology
Department Of ECE
Check sum includes all the bytes of the pack mark to check sum, in excess of 2-
byte binary are ignored.
Chip address are default as 0xFFFFFFFF before created, once the host computer
through the command to generate the chip address, all packets must be generated in
accordance with the address to send and receive. Chip will refuse to address the wrong
packet.
Command response
Response is to report for the implementation of the orders and results execution.
Response includes all the parameter and the follow-up data packets, PC only confirm by
receiving the SOC response and order execution.
Response packet format:
2bytes 4bytes 1 byte 2 bytes 1 byte N bytes 2 bytes
0xEF01 Chips add.
Pack mark
07
Pack
length
Confirm
code
Return
parameter
Check sum
Table 1.6: Commands / Datasheet formats
Fig 3.18: Fingerprint Verification System
39
SVS Institute Of Technology
Department Of ECE
Application
NGE - OP 67 can be used on all fingerprint verification systems, such as
 R&D, Embedded interface development.
 Complicated door-guard system;
 Fingerprint IC card Identification Terminal;
 Fingerprint identification and verification system associated with PC or embedded
environment.
Developer can develop various fingerprint verification application systems based on the
technical data.
3.10 Bike battery:
Bike battery consists of four wires red ,green,black,black and white, from these
four wires green wire is used for earthing and red wire is the battery power supplier and
black and white is used for starting the bike and stopping the bike and black wire is used
for display purpose .The four wires functions are given as;
RED: battery power supplier to all others
GREEN: only for earthing
BLACK: used for display (speed meter etc)
BLACK AND WHITE: used for start and stop the vehicle
Generally there are two conditions for the purpose of starting and stopping of the
bike the two conditions are shown in diagrammatically;
40
SVS Institute Of Technology
Department Of ECE
Key off condition
Key on condition
Fig 3.19: Key off/on Condition
When ever the green wire is earthed with black and white wire then the bike stops
and when ever the green wire is open circuit with the black and white wire then the bike
begins to start, all this process depends on the ignition lock of the bike, if on the key and
also to off the key it must satisfy certain condition to accept the condition.
41
SVS Institute Of Technology
Department Of ECE
SOFTWARE:
Operating System: WINDOWS XP
Software Used: KEIL, MICRO ‘C’ FLASH, EXPRESS PCB
3.11 KEIL SOFTWARE
Installing the Keil software on a Windows PC:
• Insert the CD-ROM in your computer’s CD drive
• On most computers, the CD will “auto run”, and you will see the Keil installation
menu. If the menu does not appear, manually double click on the Setup icon, in
the root directory: you will then see the Keil menu.
• On the Keil menu, please select “Install Evaluation Software”. (You will not
require a license number to install this software).
• Follow the installation instructions as they appear.
Loading the Projects:
The example projects for this book are NOT loaded automatically when you
install the Keil compiler. These files are stored on the CD in a directory “/Pont”. The files
are arranged by chapter: for example, the project discussed in Chapter 3 is in the
directory “/Pont/Ch03_00-Hello”. Rather than using the projects on the CD (where
changes cannot be saved), please copy the files from CD onto an appropriate directory on
your hard disk.
Note: you will need to change the file properties after copying: file transferred from the
CD will be ‘read only’.
42
SVS Institute Of Technology
Department Of ECE
Configuring the Simulator:
1. Open the Keil µVision2
2. Go to Project – Open Project and browse for Hello in Ch03_00 in Pont and open
it.
3. Go to Project – Select Device for Target ‘Target1’
4. Select 8052(all variants) and click OK
5. Now we need to check the oscillator frequency
6. Go to project – Options for Target ‘Target1’
7. Make sure that the oscillator frequency is 11.5902MHz.
8. Building the Target:
9. Build the target as illustrated in the figure below
10. Running the Simulation
11. Having successfully built the target, we are now ready to start the debug session
and run the simulator.
12. First start a debug session
13. The flashing LED we will view will be connected to Port 1. We therefore want to
observe the activity on port
14. To ensure that the port activity is visible, we need to start the ‘periodic window
update’ flag
15. Go to Debug - Go
16. While the simulation is running, view the performance analyzer to check the
delay durations.
17. Go to Debug – Performance Analyzer and click on it
18. Double click on DELAY_LOOP_Wait in Function Symbols: and click Define
button
43
SVS Institute Of Technology
Department Of ECE
Go to Project:
Go to Project – Select Device for Target ‘Target1’
Select 8052(all variants) and click OK
44
SVS Institute Of Technology
Department Of ECE
Now we need to check the oscillator frequency:
Go to project – Options for Target ‘Target1’
Make sure that the oscillator frequency is 12MHz.
45
SVS Institute Of Technology
Department Of ECE
Building the Target
Build the target as illustrated in the figure below
Running the Simulation Having successfully built the target, we are now ready to start
the debug session and run the simulator.
First start a debug session
46
SVS Institute Of Technology
Department Of ECE
The flashing LED we will view will be connected to Port 1. We therefore want to observe
the activity on this port
47
SVS Institute Of Technology
Department Of ECE
To ensure that the port activity is visible, we need to start the ‘periodic window update’
flag
48
SVS Institute Of Technology
Department Of ECE
Go to Debug - Go
While the simulation is running, view the performance analyzer to check the delay
durations.
49
SVS Institute Of Technology
Department Of ECE
Go to Debug – Performance Analyzer and click on it
Double click on DELAY LOOP Wait in Function Symbols: and click Define button
50
SVS Institute Of Technology
Department Of ECE
Fig 3.20: Configuring the Simulator
51
SVS Institute Of Technology
Department Of ECE
Advantages & Applications
Advantages
The main advantage of our project is
• It is used to reduce the vehicle thieves
• It is used to build the own security of your own vehicle
• It is used to identify the thieves (while they are stealing the buzzer or alarm
makes sound)
Disadvantages
• Whenever neighbor needs your vehicle he can’t start without you(vehicle owner).
• Else one of your friend or son has to move with him (friend or neighbor
fingerprint identity is stored)
Applications
House hold based equipments
• It is used in vehicles and also the household equipments (such as door locks
and almaris etc)
Automobiles
• It is used in each and every security things which are needed for us.
• It is used in identification purpose (person identification by using the thumb
impression etc)
52
SVS Institute Of Technology
Department Of ECE
4. RESULTS
In our project, from the fingerprint module the wires are connected to the battery
of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get
the power, green wire is connected for earthing, red black is connected for the display
purpose the power from the battery generates from the black wire then the total display
will appear.
In the ignition lock there are certain conditions when the bike is on and as well as
off condition, in the on condition the green wire is shorted with black and white wire then
there is short circuit hence the bike doesn’t start and when there is open circuit with in the
green wire then the bike begins to start, at the starting moment of the bike fingerprint
module ask for the verification of the fingerprint impression if matches they can use
otherwise it gives a sound from the buzzer.
53
SVS Institute Of Technology
Department Of ECE
5. CONCLUSION & FUTURE SCOPE
5.1 Conclusion
This project may helpful to the people who are earning a very less salaries and the people
who are richest, earning high salaries by keeping a powerful security on their own
vehicles, they can move anywhere they want by parking the vehicle at unknown place.
This may useful to each and every person in day to day life and they will never afraid of
the vehicle thefters. By this project people come to existence that our country is
developing and they move forward the leg with full of dareness in their minds.
5.2 Future Scope
In future we want to develop the same project but by adding a default user identifier and
in future we can make this project very bright, by using a snapshot video camera
whenever a thief ready for stealing the vehicle, as it records the total scenario happening
and also it sends the message to the owner of the vehicle by using the GSM and GPRS
technologies.
54
SVS Institute Of Technology
Department Of ECE
BIBILOGRAPHY
 http://www.fingerprint.com/
 http://en.wikipedia.org/wiki/Biometric
 http://travel.state.gov/fingerprint/eppt/eppt_2788.html
 http://www.buslab.org/index.php/content/view/24733/6
 http://www.pcworld.com/article/id,103535-page,1/article.html
 http://www.modulesfinger.in/site/india
55
SVS Institute Of Technology

More Related Content

What's hot

VOICE OPERATED WHEELCHAIR
VOICE OPERATED WHEELCHAIRVOICE OPERATED WHEELCHAIR
VOICE OPERATED WHEELCHAIRMandar Jadhav
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
Edgefxkits & Solutions
 
Wireless charging ppt
Wireless charging pptWireless charging ppt
Wireless charging ppt
Manjunath Kareppagoudr
 
Smart glove
Smart gloveSmart glove
Smart glove
Sapna Patil
 
Embedded System in Automobiles
Embedded System in Automobiles Embedded System in Automobiles
Embedded System in Automobiles
Seminar Links
 
SMART HELMET
SMART HELMETSMART HELMET
SMART HELMET
Sivajith007
 
Smart glove hand gesture vocalizer final year report
Smart glove hand gesture vocalizer final year reportSmart glove hand gesture vocalizer final year report
Smart glove hand gesture vocalizer final year report
MUHAMMAD NOMAN KHAN
 
Hyper transport technology
Hyper transport technologyHyper transport technology
Hyper transport technologyAkhil Kumar
 
Smart Helmet using IoT
Smart Helmet using IoTSmart Helmet using IoT
Smart Helmet using IoT
AI Publications
 
Arduino Based Parking Lot System
Arduino Based Parking Lot SystemArduino Based Parking Lot System
Arduino Based Parking Lot System
United International University
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
Vinny Chweety
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
123seminarsonly
 
Deaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemDeaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition System
Praveena T
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
Shivnaresh Likhar
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system ppt
Pankaj Singh
 
Artificial vision using embedded system
Artificial vision using embedded systemArtificial vision using embedded system
Artificial vision using embedded systemJegannath Alagendran
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System VisualBee.com
 
Advanced driver assistance systems
Advanced driver assistance systemsAdvanced driver assistance systems
Advanced driver assistance systems
Car Leasing Made Simple
 
smart helmet
smart helmetsmart helmet
smart helmet
Venkata Krishna
 

What's hot (20)

VOICE OPERATED WHEELCHAIR
VOICE OPERATED WHEELCHAIRVOICE OPERATED WHEELCHAIR
VOICE OPERATED WHEELCHAIR
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
Wireless charging ppt
Wireless charging pptWireless charging ppt
Wireless charging ppt
 
Smart glove
Smart gloveSmart glove
Smart glove
 
Embedded System in Automobiles
Embedded System in Automobiles Embedded System in Automobiles
Embedded System in Automobiles
 
SMART HELMET
SMART HELMETSMART HELMET
SMART HELMET
 
Smart glove hand gesture vocalizer final year report
Smart glove hand gesture vocalizer final year reportSmart glove hand gesture vocalizer final year report
Smart glove hand gesture vocalizer final year report
 
Hyper transport technology
Hyper transport technologyHyper transport technology
Hyper transport technology
 
Smart Helmet using IoT
Smart Helmet using IoTSmart Helmet using IoT
Smart Helmet using IoT
 
Arduino Based Parking Lot System
Arduino Based Parking Lot SystemArduino Based Parking Lot System
Arduino Based Parking Lot System
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Deaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemDeaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition System
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system ppt
 
Artificial vision using embedded system
Artificial vision using embedded systemArtificial vision using embedded system
Artificial vision using embedded system
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Advanced driver assistance systems
Advanced driver assistance systemsAdvanced driver assistance systems
Advanced driver assistance systems
 
smart helmet
smart helmetsmart helmet
smart helmet
 

Viewers also liked

FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
Ann Mathew
 
Fingerprint based security system
Fingerprint based security systemFingerprint based security system
Fingerprint based security systemPadmakar Mangrule
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
santhu652
 
SYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
SYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGSYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
SYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
Sree Kantesh
 
A prototype of finger print based licensing system for driving
A prototype of finger print based licensing system for drivingA prototype of finger print based licensing system for driving
A prototype of finger print based licensing system for driving
Vengamamba Pachava
 
Road Accidents in India seminar report
Road Accidents in India seminar reportRoad Accidents in India seminar report
Road Accidents in India seminar report
Ankush Gavit
 
finger print based security system
finger print based security systemfinger print based security system
finger print based security system
Anand Parakkat Parambil
 
Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...
Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...
Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...
Road Safety
 
ROAD ACCIDENT
ROAD ACCIDENTROAD ACCIDENT
ROAD ACCIDENT
Dharun Balakrishnan
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (12)

Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
 
Fingerprint based security system
Fingerprint based security systemFingerprint based security system
Fingerprint based security system
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
SYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
SYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGSYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
SYNOPSIS ON FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
 
A prototype of finger print based licensing system for driving
A prototype of finger print based licensing system for drivingA prototype of finger print based licensing system for driving
A prototype of finger print based licensing system for driving
 
Road Accidents in India seminar report
Road Accidents in India seminar reportRoad Accidents in India seminar report
Road Accidents in India seminar report
 
finger print based security system
finger print based security systemfinger print based security system
finger print based security system
 
Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...
Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...
Road Safety Project PowerPoint Presentation, Road safety ppt pps pdf photos i...
 
ROAD ACCIDENT
ROAD ACCIDENTROAD ACCIDENT
ROAD ACCIDENT
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Finger print authentication for bikes

Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
IRJET Journal
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
Michael George
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
IRJET Journal
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
aissmsblogs
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
IRJET Journal
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
nooriasukmaningtyas
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
ijtsrd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
AnuragKumarJha4
 
Fingerprint based authentication system
Fingerprint based authentication systemFingerprint based authentication system
Fingerprint based authentication system
Pvrtechnologies Nellore
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
IJCIRAS Journal
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
IJTET Journal
 
MOUSE SIMULATION USING NON MAXIMUM SUPPRESSION
MOUSE SIMULATION USING NON MAXIMUM SUPPRESSIONMOUSE SIMULATION USING NON MAXIMUM SUPPRESSION
MOUSE SIMULATION USING NON MAXIMUM SUPPRESSION
IRJET Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
eSAT Publishing House
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
CSCJournals
 

Similar to Finger print authentication for bikes (20)

Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
 
biometrics
biometricsbiometrics
biometrics
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Iciea08
Iciea08Iciea08
Iciea08
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
 
Fingerprint based authentication system
Fingerprint based authentication systemFingerprint based authentication system
Fingerprint based authentication system
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
MOUSE SIMULATION USING NON MAXIMUM SUPPRESSION
MOUSE SIMULATION USING NON MAXIMUM SUPPRESSIONMOUSE SIMULATION USING NON MAXIMUM SUPPRESSION
MOUSE SIMULATION USING NON MAXIMUM SUPPRESSION
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 

Recently uploaded

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

Finger print authentication for bikes

  • 1. Department Of ECE 1. INTRODUCTION 1.1 Introduction Embedded systems plays a crucial role in critical infrastructure, which is recognized as essential to national security, health and economy. There is an increasing concern of security threats, as embedded systems are moving towards networked applications. Model based approaches have proven to be an effective for embedded system design. Security is the important aspect of embedded system design. The characteristics of embedded system give rise to a number of novel vulnerabilities. Network connectivity opens even more avenues for remote exploits. In response, security solutions are being developed to provide robustness, protection from attacks, and recovery capabilities. Fingerprint identification is used in many ways, for identification and also for the security purposes. In these days, somewhere sometimes bikes are stolen by the stranger’s reason is that they don’t have security system. In the present generation we are using the fingerprint based security system for door locking, EVM’s for any kind of the identification. 1.2 Literature Survey Biometrics is derived from Greek word “bios” means life and “metron” means measure. It is the study of methods for uniquely recognizing human based upon one or more physical or behavioral traits. 1.2.1 Fingerprint Authentication: It refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. This article touches two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance and active capacitance).The simple fact is that passwords don’t work very well. Other authentication mechanisms such as tokens, smart cards, etc. require you to carry something. This is better than a password, but easies to lose. Think about losing your credit card or driving 1 SVS Institute Of Technology
  • 2. Department Of ECE license. Losing your corporate network access is a lot worse. Information is valuable and harder to track than money. Fingerprints can also acts as a simple, trusted and convenient user-interface to a well thought security architecture. The two components need each other to provide truly effective security. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Fingerprints have been used for identification for over 100 years. They are the standard without question. In addition to signatures, fingerprints are the only other form of identification that has a legal standing. A key issue of trust is privacy. The best way to maintain that is to store a template of unique fingerprint characteristics instead of entire print. This is sufficient for one to one or too many matching and eliminates the need for a database of searchable fingerprints. 1.2.2 Biometric System: The diagram below shows a simple block diagram of a biometric system. The main operations a system can perform are enrollment and test. During the enrollment biometric information of an individual are stored, during the test, and during the test information are detected and compared with the stored information. Fig 1.0: Biometric System 2 SVS Institute Of Technology
  • 3. Department Of ECE Biometric System Diagram: The first block (sensor) is the interface between the real world (user) and our system (biometric system), it has to acquire all the necessary data. Most of the time it is an image acquisition system, but it can change according to the characteristics we want to consider. The second block performs all the necessary pre-processing; it has to remove artifacts from the sensor, to enhance the input (e.g. remove some kind of noise.), to use some kind of normalization, etc. In third block we have to extract the features we need. This step is really important; we have to choose which features it extract and how. Moreover we have to do it with certain efficiency (it can’t take hours). After that, we can have a vector of numbers or an image with particular properties: all those data are used to create the template. A template is a synthesis of all the characteristics we could extract from the source; it has to be as short as possible (to improve efficiency) but we can’t discard to many details, thus losing discrimination. Then if it is performing enrollment, then the template is simply stored somewhere (it can be stored in on a card or within a database). If it is performing the matching phase, the obtained template is passed to matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The decision matcher has taken is sent as output, so that it can be used for any purpose (e.g. it can allow the entrance in restricted areas). 1.2.3 Patterns and Features: The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include print patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. Patterns: There are three basic patterns of fingerprint ridges are the Arch, Loop, and Whorl. 3 SVS Institute Of Technology
  • 4. Department Of ECE Arch Pattern: An arch is a pattern where the ridges enter from one side of a finger, rise in the centre forming an arc, and them exit the other side of the finger. Loop Pattern: The loop pattern is a pattern where the ridges enter from one side of a finger, from a curve, and tend to exit from the same side they enter. Whorl Pattern: In the whorl pattern, ridges form a circular pattern around a central point on the finger. Scientists have found that of family members often share the same general patterns, leading to the belief that these patterns are inherited. Fig 1.1: Human Fingerprint Pattern Features: Minutia based feature: The major minutia features of fingerprint ridges are: ridge ending, bifurcation and short point ridge (or dot). The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are the ridges which are significantly shorter than the average ridge length on the fingerprint. 4 SVS Institute Of Technology
  • 5. Department Of ECE Sequential design based on the following modules: Segmentation, local ridge orientation estimation (singularity and more detection), local ridge frequency estimation, fingerprint enhancement, minutiae detection, and minutiae filtering and post-processing. Ridge based feature: Size and shape of fingerprint, number, type, and position of singularities (cores and deltas), spatial relationship and geometrical attributes of the ridge lines, shape features, global and local texture information, sweat pores, fractal features. Fig 1.2: Ridge based feature 5 SVS Institute Of Technology
  • 6. Department Of ECE 2.BLOCK DIAGRAM +5v Fig 2.1: BLOCK DIAGRAM 6 SVS Institute Of Technology AT89C51 BUZZER DRIVER RELAY Bik e con nec tio n L.C.D Max 232 FINGERPRINT MODULE POWER SUPPLY (5V DC)
  • 7. Department Of ECE 2.1 Block diagram description: 8051 MICROCONTROLLER: The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller with 4k bytes of Flash Programmable and erasable read only memory (EROM).AT89C51 has many functions and to this microcontroller many other various components are connected for the functioning of their particular operations and to get the particular required output. This is very necessary in each and every embedded project. FINGERPRINT MODULE: Fingerprint module is interconnected to 8051 microcontroller and this module is used for the recognization and identification of the fingerprint and also to verify the recognized fingerprint. So fingerprint module is necessary for identification. MAX 232: Max 232 is used as a voltage converter, as 8051 microcontroller need TTL voltage level, as fingerprint module voltage is cmos voltage level ,but by using the max232 we can convert one voltage level to the other voltage level. LCD: LCD is used to display the functioning of the project or particular operation, as our project is needed to identify and also to recognize the fingerprint, the LCD shows it on the screen and total verification depends on the LCD. BIKE BATTERY: Bike battery is connected to the 8051 microcontroller and it has the main functioning of our project. In this bike battery the power supplies and the ignition key lock on and off conditions totally depends on the bike battery. 7 SVS Institute Of Technology
  • 8. Department Of ECE POWER SUPPLY: Power supply is needed for each and every IC and also the modules, so it supplies the required amount of power to all the components and has major part the project, it supplies a high power but by using the voltage regulator we can supply the required amount of power to the components. RELAY: Relay is used as switch and when ever it gets the power it starts the vehicle and when ever it doesn’t get any power until and unless it won’t starts the vehicle. 2.2 Schematic diagram Fig 2.2: Schematic diagram 8 SVS Institute Of Technology
  • 9. Department Of ECE 2.3 Working principle The working principle of “fingerprint based vehicle access control system” is switching (act as switch). In our project, from the fingerprint module the wires are connected to the battery of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get the power, green wire is connected for earthing, red black is connected for the display purpose the power from the battery generates from the black wire then the total display will appear. In the ignition lock there are certain conditions when the bike is on and as well as off condition, in the on condition the green wire is shorted with black and white wire then there is short circuit hence the bike doesn’t start and when there is open circuit with in the green wire then the bike begins to start, at the starting moment of the bike fingerprint module ask for the verification of the fingerprint impression if matches they can use otherwise it gives a sound from the buzzer. 9 SVS Institute Of Technology
  • 10. Department Of ECE 3. HARDWARE & SOFTWARE REQUIREMENTS HARDWARE: 3.1 AT89C51: A microcontroller is a general purpose device, but that is meant to read data, perform limited calculations on that data and control its environment based on those calculations. The prime use of a microcontroller is to control the operation of a machine using a fixed program that is stored in ROM and that does not change over the lifetime of the system. The microcontroller design uses a much more limited set of single and double byte instructions that are used to move data and code from internal memory to the ALU. The microcontroller is concerned with getting data from and to its own pins, the architecture and instruction set are optimized to handle data in bit and byte size. The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller with 4k bytes of Flash Programmable and erasable read only memory (EROM). The device is manufactured using Atmel’s high-density nonvolatile memory technology and is functionally compatible with the industry-standard 80C51 microcontroller instruction set and pin out. By combining versatile 8-bit CPU with Flash on a monolithic chip, the Atmel’s AT89c51 is a powerful microcomputer, which provides a high flexible and cost- effective solution to many embedded control applications. 10 SVS Institute Of Technology
  • 11. Department Of ECE Pin Configuration of AT89c51 Microcontroller Fig 3.1: Pin Configuration of AT89c51 Microcontroller 11 SVS Institute Of Technology
  • 12. Department Of ECE AT89C51 Block Diagram Fig 3.2: AT89C51 Block Diagram PIN DESCRIPTION: VCC Supply voltage GND Ground Port 0 Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin can sink eight TTL inputs. When 1’s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 can also be configured to be the multiplexed low order address/data bus during access to external program and data memory. 12 SVS Institute Of Technology
  • 13. Department Of ECE Port 1 Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The port 1output buffers can sink/source four TTL inputs. When 1’s are written to port 1 pins, they are pulled high by the internal pull-ups can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current because of the internal pull-ups. Port 2 Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The port 2 output buffers can sink/source four TTL inputs. When 1’s are written to port 2 pins, they are pulled high by the internal pull-ups can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current because of the internal pull-ups. Port 3 Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The port 3 output buffers can sink/source four TTL inputs. When 1s are written to port 3 pins, they are pulled high by the internal pull-ups can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current because of the internal pull-ups. Port 3 also receives some control signals for Flash Programming and verification. Port pin Alternate Functions P3.0 RXD(serial input port) P3.1 TXD(serial input port) P3.2 INT0(external interrupt 0) P3.3 INT1(external interrupt 1) P3.4 T0(timer 0 external input) P3.5 T1(timer 1 external input) P3.6 WR(external data memory write strobe) P3.7 RD(external data memory read strobe) Table 1.1: Pin Description of AT89C51 13 SVS Institute Of Technology
  • 14. Department Of ECE RST Rest input A on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG: Address Latch Enable is an output pulse for latching the low byte of the address during access to external memory. This pin is also the program pulse input (PROG) during Flash programming. In normal operation ALE is emitted at a constant rate of 1/16 the oscillator frequency and may be used for external timing or clocking purpose. Note, however, that one ALE pulse is skipped during each access to external Data memory. PSEN Program Store Enable is the read strobe to external program memory when the AT89c51 is executing code from external program memory PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA /VPP External Access Enable (EA) must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000h up to FFFFH. Note, however, that if lock bit 1 is programmed EA will be internally latched on reset. EA should be strapped to Vcc for internal program executions. This pin also receives the 12-volt programming enable voltage (Vpp) during Flash programming when 12-volt programming is selected. XTAL1 Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL 2 Output from the inverting oscillator amplifier. 14 SVS Institute Of Technology
  • 15. Department Of ECE OPERATING DESCRIPTION The detail description of the AT89C51 included in this description is: • Memory Map and Registers • Timer/Counters • Interrupt System MEMORY MAP AND REGISTERS Memory The AT89C51 has separate address spaces for program and data memory. The program and data memory can be up to 64K bytes long. The lower 4K program memory can reside on-chip. The AT89C51 has 128 bytes of on-chip RAM. The lower 128 bytes can be accessed either by direct addressing or by indirect addressing. The lower 128 bytes of RAM can be divided into 3 segments as listed below 1. Register Banks 0-3: Locations 00H through 1FH (32 bytes). The device after reset defaults to register bank 0. To use the other register banks, the user must select them in software. Each register bank contains eight 1-byte registers R0-R7. Reset initializes the stack point to location 07H, and is incremented once to start from 08H, which is the first register of the second register bank. 2. Bit Addressable Area: 16 bytes have been assigned for this segment 20H-2FH. Each one of the 128 bits of this segment can be directly addressed (0-7FH). Each of the 16 bytes in this segment can also be addressed as a byte. 3. Scratch Pad Area: 30H-7FH are available to the user as data RAM. However, if the data pointer has been initialized to this area, enough bytes should be left aside to prevent SP data destruction. 15 SVS Institute Of Technology
  • 16. Department Of ECE Fig 3.3: Memory Map & Registers SPECIAL FUNCTION REGISTERS The Special Function Registers (SFR's) are located in upper 128 Bytes direct addressing area. The SFR Memory Map in shows that. Not all of the addresses are occupied. Unoccupied addresses are not implemented on the chip. Read accesses to these addresses in general return random data, and write accesses have no effect. User software should not write 1’s to these unimplemented locations, since they may be used in future microcontrollers to invoke new features. In that case, the reset or inactive values of the new bits will always be 0, and their active values will be 1. The functions of the SFR’s are outlined in the following sections. Accumulator (ACC) ACC is the Accumulator register. The mnemonics for Accumulator-specific instructions, however, refer to the Accumulator simply as A. 16 SVS Institute Of Technology
  • 17. Department Of ECE B Register (B) The B register is used during multiply and divide operations. For other instructions it can be treated as another scratch pad register. Program Status Word (PSW) The PSW register contains program status information. Stack Pointer (SP) The Stack Pointer Register is eight bits wide. It is incremented before data is stored during PUSH and CALL executions. While the stack may reside anywhere in on chip RAM, the Stack Pointer is initialized to 07H after a reset. This causes the stack to begin at location 08H. Data Pointer (DPTR) The Data Pointer consists of a high byte (DPH) and a low byte (DPL). Its function is to hold a 16-bit address. It may be manipulated as a 16-bit register or as two independent 8-bit registers. Serial Data Buffer (SBUF) The Serial Data Buffer is actually two separate registers, a transmit buffer and a receive buffer register. When data is moved to SBUF, it goes to the transmit buffer, where it is held for serial transmission. (Moving a byte to SBUF initiates the transmission.) When data is moved from SBUF, it comes from the receive buffer. Timer Registers Register pairs (TH0, TL0) and (TH1, TL1) are the 16-bit Counter registers for Timer/Counters 0 and 1, respectively. Control Registers Special Function Registers IP, IE, TMOD, TCON, SCON, and PCON contain control and status bits for the interrupt system, the Timer/Counters, and the serial port. 17 SVS Institute Of Technology
  • 18. Department Of ECE TIMER/COUNTERS The IS89C51 has two 16-bit Timer/Counter registers: Timer 0 and Timer 1. All two can be configured to operate either as Timers or event counters. As a Timer, the register is incremented every machine cycle. Thus, the register counts machine cycles. Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the oscillator frequency. As a Counter, the register is incremented in response to a 1-to-0 transition at its corresponding external input pin, T0 and T1. The external input is sampled during S5P2 of every machine cycle. When the samples show a high in one cycle and a low in the next Cycle, the count is incremented. The new count value appears in the register during S3P1 of the cycle following the one in which the transition was detected. Since two machine cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum count rate is 1/24 of the oscillator frequency. There are no restrictions on the duty cycle of the external input signal, but it should be held for at least one full machine cycle to ensure that a given level is sampled at least once before it changes. INTERRUPT SYSTEM An interrupt is an external or internal event that suspends the operation of micro controller to inform it that a device needs its service. In interrupt method, whenever any device needs its service, the device notifies the micro controller by sending it an interrupt signal. Upon receiving an interrupt signal, the micro controller interrupts whatever it is doing and serves the device. The program associated with interrupt is called as interrupt service subroutine (ISR).Main advantage with interrupts is that the micro controller can serve many devices. Baud Rate The baud rate in Mode 0 is fixed as shown in the following equation. Mode 0 Baud Rate = Oscillator Frequency /12 the baud rate in Mode 2 depends on the value of the SMOD bit in Special Function Register PCON. If SMOD = 0 the baud rate is 1/64 of the oscillator frequency. If SMOD = 1, the baud rate is 1/32 of the oscillator frequency. 18 SVS Institute Of Technology
  • 19. Department Of ECE Mode 2 Baud Rate = 2SMODx (Oscillator Frequency)/64.In the IS89C51, the Timer 1 overflow rate determines the baud rates in Modes 1 and 3. NUMBER OF INTERRUPTS IN 89C51: There are basically five interrupts available to the user. Reset is also considered as an interrupt. There are two interrupts for timer, two interrupts for external hardware interrupt and one interrupt for serial communication. Memory location Interrupt name 0000H Reset 0003H External interrupt 0 000BH Timer interrupt 0 0013H External interrupt 1 001BH Timer interrupt 1 0023H Serial COM interrupt Lower the vector, higher the priority. The External Interrupts INT0 and INT1 can each be either level-activated or transition-activated, depending on bits IT0 and IT1 in Register TCON. The flags that actually generate these interrupts are the IE0 and IE1 bits in TCON. When the service routine is vectored, hardware clears the flag that generated an external interrupt only if the interrupt was transition-activated. If the interrupt was level-activated, then the external requesting source (rather than the on-chip hardware) controls the request flag. The Timer 0 and Timer 1 Interrupts are generated by TF0and TF1, which are set by a rollover in their respective Timer/Counter registers (except for Timer 0 in Mode 3).When a timer interrupt is generated, the on-chip hardware clears the flag that is generated. The Serial Port Interrupt is generated by the logical OR of RI and TI. The service routine normally must determine whether RI or TI generated the interrupt, and the bit must be cleared in software. All of the bits that generate interrupts can be set or cleared by software, with the same result as though they had been set or cleared by hardware. That is, interrupts can be generated and pending interrupts can be canceled in software. 19 SVS Institute Of Technology
  • 20. Department Of ECE Each of these interrupt sources can be individually enabled or disabled by setting or clearing a bit in Special Function Register IE (interrupt enable) at address 0A8H. There is a global enable/disable bit that is cleared to disable all interrupts or to set the interrupts. IE (Interrupt enable register): Steps in enabling an interrupt: Bit D7 of the IE register must be set to high to allow the rest of register to take effect. If EA=1, interrupts are enabled and will be responded to if their corresponding bits in IE are high. If EA=0, no interrupt will be responded to even if the associated bit in the IE register is high. Description of each bit in IE register: D7 bit: Disable all interrupts. If EA =0, no interrupt is acknowledged, if EA=1 each interrupt source is individually enabled or disabled by setting or clearing its enable bit. D6 bit: Reserved. D5 bit: Enables or disables timer 2 over flow interrupt (in 8052). D4 bit: Enables or disables serial port interrupt. D3 bit: Enables or disables timer 1 over flow interrupt. D2 bit: Enables or disables external interrupt 1. D1 bit: Enables or disables timer 0 over flow interrupt. D0 bit: Enables or disables external interrupt 0. Interrupt priority in 89C51: There is one more SRF to assign priority to the interrupts which is named as interrupt priority (IP). User has given the provision to assign priority to one interrupt. Writing one to that particular bit in the IP register fulfils the task of assigning the priority. 20 SVS Institute Of Technology
  • 21. Department Of ECE Description of each bit in IP register: D7 bit: Reserved. D6 bit: Reserved. D5 bit: Timer 2 interrupt priority bit (in 8052). D4 bit: Serial port interrupt priority bit. D3 bit: Timer 1 interrupt priority bit. D2 bit: External interrupt 1 priority bit. D1 bit: Timer 0 interrupt priority bit. D0 bit: External interrupt 0 priority bit. 3.2 POWER SUPPLY This term covers the power distribution system together with any other primary or secondary sources of energy. Fig 3.4: Power Supply Introduction Power supply is a reference to a source of electrical power. A device or system that supplies electrical or other types of energy to an output load or group of loads is called a power supply unit or PSU. The first section is the transformer. The transformer steps up or steps down the input line voltage and isolates the power supply from the power line. The rectifier section converts the alternating current input signal to a pulsating direct current. A filter section is used to convert pulsating dc to a purer, more 21 SVS Institute Of Technology
  • 22. Department Of ECE desirable form of dc voltage. The final section is the regulator, it maintains the output of the power supply at a constant level. Each of the blocks are described below 1. Transformer - steps down high voltage AC mains to low voltage AC. 2. Rectifier - converts AC to DC, but the DC output is varying. 3. Smoothing - smoothes the DC from varying greatly to a small ripple. 4. Regulator - eliminates ripple by setting DC output to a fixed voltage. 3.3 Voltage Regulator: A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. It may use an electromechanical mechanism, or passive or active electronic components. Depending on the design, it may be used to regulate one or more AC or DC voltages. There are two types of regulators they are: Positive Voltage Series (78xx) Negative Voltage Series (79xx) 78xx:’78’ indicate the positive series and ‘xx’indicates the voltage rating. Suppose 7805 produces the maximum 5V.’05’indicates the regulator output is 5V. 79xx:’78’ indicate the negative series and ‘xx’indicates the voltage rating. Suppose 7905 produces the maximum -5V.’05’indicates the regulator output is -5V. These regulators consists the three pins there are Pin1: It is used for input pin. Pin2: This is ground pin for regulator Pin3: It is used for output pin. Through this pin we get the output. 22 SVS Institute Of Technology
  • 23. Department Of ECE Fig 3.5: Voltage Regulator 3.4 MAX 232 Connection Diagram: Fig 3.6: MAX 232 Connection Diagram The MAX232 line drivers/receivers are designed for RS-232 and V.28 communications in harsh environments. Each transmitter output and receiver input is protected against 15kV electrostatic discharge (ESD) shocks, without latchup.It can operate from a Single +5V Power Supply. 23 SVS Institute Of Technology
  • 24. Department Of ECE It is an integrated circuit that converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a dual driver/receiver and typically converts the RX, TX, CTS and RTS signals. Fig 3.7: MAX232 line drivers/receivers The drivers provide RS-232 voltage level outputs (approx. ± 7.5 V) from a single + 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V to + 5 V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as high as ± 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of 1.3 V, and a typical hysteresis of 0.5 V. 24 SVS Institute Of Technology
  • 25. Department Of ECE Voltage levels: It is helpful to understand what occurs to the voltage levels. When a MAX232 IC receives a TTL level to convert, it changes a TTL Logic 0 to between +3 and +15V, and changes TTL Logic 1 to between -3 to -15V, and vice versa for converting from RS232 to TTL. This can be confusing when you realize that the RS232 Data Transmission voltages at a certain logic state are opposite from the RS232 Control Line voltages at the same logic state. To clarify the matter, see the table below. Table 1.2:RS232 Voltage Levels FUNCTION TABLE Table 1.3:RS232 Function Table 25 SVS Institute Of Technology
  • 26. Department Of ECE LOGIC DIAGRAM: (POSITIVE LOGIC) Fig 3.8:RS232 Logic Diagram 3.5 RS-232 Cable RS-232 was created for one purpose, to interface between Data Terminal Equipment (DTE) and Data Communications Equipment (DCE) employing serial binary data interchange. So as stated the DTE is the terminal or computer and the DCE is the modem or other communications device. RS-232 is most widely used serial input output interfacing standards. This standards used in PCs and numerous types of equipment. However, since the standards were set long before the advent of the TTL logic family, its input and output levels are not TTL compatible. In RS 232, a 1 is represented by -3 to -25 volt, while 0 bit is +3 to +25 volt, making -3 to +3 undefined. For this reason, we must use MAX 232 line driver to convert voltage level. It is compatible with PC. 26 SVS Institute Of Technology
  • 27. Department Of ECE Fig 3.9: RS232 cable 3-wire and 5-wire RS-232: Minimal “3-wire” RS-232 connections consisting only of transmits data, receive data, and ground, is commonly used when the full facilities of RS-232 are not required. Even a two-wire connection (data and ground) can be used if the data flow is one way (for example, a digital postal scale that periodically sends a weight reading, or a GPS receiver that periodically sends position, if no configuration via RS-232 is necessary). When only hardware flow control is required in addition to two-way data, the RTS and CTS lines are added in a 5-wire version DB9 CONNECTOR The term "DB9" refers to a common connector type, one of the D-Subminiature or D-Sub types of connectors. DB9 has the smallest "footprint" of the D-Subminiature connectors, and houses 9 pins (for the male connector) or 9 holes (for the female connector). DB9 connectors were once very common on PCs and servers. DB9 connectors are designed to work with the EIA/TIA 232 serial interface standard, which determined the function of all nine pins as a standard, so that multiple companies could design them into their products. DB9 connectors were commonly used for serial peripheral devices like keyboards, mice, joysticks, etc. Today, the DB9 has mostly been replaced by more modern interfaces such as USB, PS/2, Fire wire, and others. However, there are still many legacy devices that use the DB9 interface for serial communication. 27 SVS Institute Of Technology
  • 28. Department Of ECE Fig 3.10: DB9 connector (male and female) TYPES OF THE DB9 CONNECTOR: In DB9 connector w have two types of connector • Male connectors • Female connectors Male: Fig 3.11: DB9 male connector 28 SVS Institute Of Technology
  • 29. Department Of ECE Female: Fig 3.12:DB9 Female Connector Pin Functions: Data: TxD on pin 3, RxD on pin 2 Handshake: RTS on pin 7, CTS on pin 8, DSR on pin 6, CD on pin 1, DTR on pin 4 Common: Common pin 5(ground) Other: RI on pin 9 The method used by RS-232 for communication allows for a simple connection of three lines: TX, Rx, and Ground. The three essential signals for 2 way RS-232 Communications are these: TXD: carries data from DTE to the DCE. RXD: carries data from DCE to the DTE SG: signal ground Pin Configuration: The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial connections, allowing for the asynchronous transmission of data as provided for by standard RS-232 (RS-232C). 29 SVS Institute Of Technology
  • 30. Department Of ECE Fig 3.13: DB9male and female pins Pin number Name 1 CD - Carrier Detect 2 RXD - Receive Data 3 TXD - Transmit Data 4 DTR - Data Terminal Ready 5 GND - Signal Ground 6 DSR - Data Set Ready 7 RTS - Request To Send 8 CTS - Clear To Send 9 RI - Ring Indicator Table 1.4: DB9 Pin Configuration 30 SVS Institute Of Technology
  • 31. Department Of ECE 3.6 LCD (Liquid Crystal Display) Fig 3.14: LCD General Description: The Liquid Crystal Display (LCD) is a low power device (microwatts). Now a days in most applications LCDs are using rather using of LED displays because of its specifications like low power consumption, ability to display numbers and special characters which are difficult to display with other displaying circuits and easy to program. An LCD requires an external or internal light source. Temperature range of LCD is 0ºC to 60ºC and lifetime is an area of concern, because LCDs can chemically degrade these are manufactured with liquid crystal material (normally organic for LCDs) that will flow like a liquid but whose molecular structure has some properties normally associated with solids. . LCD’s are classified as 1. Dynamic-scattering LCDs and 2. Field-effect LCDs Field-effect LCDs are normally used in such applications where source of energy is a prime factor (e.g., watches, portable instrumentation etc.).They absorb considerably less power than the light-scattering type. However, the cost for field-effect units is typically higher, and their height is limited to 2 inches. On the other hand, light- scattering units are available up to 8 inches in height. Field-effect LCD is used in the project for displaying the appropriate information. 31 SVS Institute Of Technology
  • 32. Department Of ECE RS (Command / Data): This bit is to specify weather received byte is command or data. So that LCD can recognize the operation to be performed based on the bit status. RS = 0 => Command RS = 1 => Data RW (Read / Write): RW bit is to specify weather controller wants READ from LCD or WRITE to LCD. The READ operation here is just ACK bit to know weather LCD is free or not. RW = 0 => Write RW = 1 => Read EN (Enable LCD): EN bit is to ENABLE or DISABLE the LCD. Whenever controller wants to write something into LCD or READ acknowledgment from LCD it needs to enable the LCD. EN = 0 => High Impedance EN = 1 => Low Impedance ACK (LCD Ready): ACK bit is to acknowledge the MCU that LCD is free so that it can send new command or data to be stored in its internal Ram locations ACK = 1 => Not ACK ACK = 0 => ACK 32 SVS Institute Of Technology
  • 33. Department Of ECE LCD diagram: 16 x 2 Char LCD R1 R2 GND Vcc VfRSRWEN D0 – D7 A K D0 D7 ACK Block Diagram Fig 3.15: LCD Block Diagram 33 SVS Institute Of Technology
  • 34. Department Of ECE Hardware connections: CONTROLER PINS LCD PINS PIN NAME WITH FEATURE (P1.0) 4 RS (Control Pin) (P1.1) 5 RW (Control pin ) (P1.2) 6 EN (Control pin) Port 0 7 to 14 Data Port 40 15 & 2 Vcc 20 16 & 1 Gnd Table 1.5: LCD Hardware Connections 3.7 Buzzer Circuit with Unique Functionality Fig 3.16: Buzzer Circuit with Unique Functionality Overview The circuit was constructed using a few components to produce a unique buzzer with adjustable buzzer tones. Terminology Buzzer – an electronic signaling device that produces light and buzzing sound when activated or triggered 34 SVS Institute Of Technology
  • 35. Department Of ECE Single Pole Double Throw (SPDT) An electromagnetic switch that has common, normally open and normally closed connections; the common gets connected to the normally closed connection when the relay coil is de-energized while the common gets connected to the normally open connection when the relay coil is energized. 3.8 ULN2804 The eight NPN Darlington connected transistors in this family of arrays are ideally suited for interfacing between low logic level digital circuitry (such as TTL, CMOS or PMOS/NMOS) and the higher current/voltage requirements of lamps, relays, printer hammers or other similar loads for a broad range of computer, industrial, and consumer applications. All devices feature open–collector outputs and freewheeling clamp diodes for transient suppression. The ULN2803 is designed to be compatible with standard TTL families. While the ULN2804 is optimized for 6 to 15 volt high level CMOS or PMOS ULN2804 IC FORM 35 SVS Institute Of Technology
  • 36. Department Of ECE High-Voltage, High-Current Darlington Fig 3.17: Pin diagram of ULN2804 Featuring continuous load current ratings to 500 mA for each of the drivers, the ULN2804 high voltage, high-current Darlington arrays is ideally suited for interfacing between low-level logic circuitry and multiple peripheral power loads. Typical power loads totaling over 260 W (350 mA x 8, 95 V) can be controlled at an appropriate duty cycle depending on ambient temperature and number of drivers turned on simultaneously. Typical loads include relays, solenoids, stepping Motors, magnetic print hammers, multiplexed LED and incandescent displays, and heaters. All devices feature open- collector outputs with integral clamp diodes. The ULN2003 has series input resistors selected for operation directly with 5 V TTL or CMOS. These devices will handle numerous interface needs — particularly those beyond the capabilities of standard logic buffers. The ULN2804 has series input resistors for operation directly from 6 V to 15 V CMOS or PMOS logic outputs. 36 SVS Institute Of Technology
  • 37. Department Of ECE The ULN is the standard Darlington arrays. The outputs are capable of sinking 500 mA and will withstand at least 50 V in the off state. Outputs may be paralleled for higher load current capability. The ULN2804 will withstand 95 V in the off state. These Darlington arrays are furnished in 18-pin dual in-line plastic packages (suffix ‘A’) or 18-lead small-outline plastic packages (suffix ‘LW’). All devices are pinned with outputs opposite inputs to facilitate ease of circuit board layout. Prefix ‘ULN’ devices are rated for operation over the temperature range of -20°C to +85°C; prefix ‘ULQ’ devices are rated for operation to -40°C. 1. Output Voltage, VCE 2. Input Voltage, VIN ..............................30 V 3. Continuous Output Current, IC .... 500 mA 4. Continuous Input Current, IIN ....... 25 mA 5. Power Dissipation, PD 6. (one Darlington pair) .................. 1.0 W 7. Storage Temperature Range….-55°C to +150° 3.9 Fingerprint module: System parameter and interface serial number Index Parameter Condition 1 Power supply 5V 2 Working current 170mA 3 Peak value current 200mA 4 Fingerprint input time <250ms 5 1:1 matching time <600ms Matching features + matching fingerprint 6 1:900 searching time <2s 7 Fingerprint capacity Max. 960 8 FAR(False Acceptance Rate) <0. 001 % 9 FRR (False Rejection Rate) <1.5 % 10 Fingerprint template size 512bytes 37 SVS Institute Of Technology
  • 38. Department Of ECE 11 Outer interface UART Commands / Datasheet format Commands / datasheet: Pack mark =01 Command Pack mark=02 Data, and has Follow-up package Pack mark=08 the last data pack, over All data packets have to add: 0xEF01 Command packs format: Byte 2bytes 4bytes 1 byte 2 bytes 1byte … … 2 bytes Name Pack head Chip add Pack mark Pack length command Parameter1 … Parameter n Check sum Content 0xEF01 Xxxx 01 N= Data pack format: Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes Name Pack head Chip add Pack mark Pack length Data Check sum Content 0xEF01 xxxx 02 Over Pack format: Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes name Pack head Chip add Pack mark Pack length data Check sum content 0xEF01 xxxx 08 Data packs cannot ingress into executive flow alone, it has to follow behind the command pack or respond pack. Upload or upload data pack are the same format. Pack length = the total bytes of pack length to check sum (command, parameter or data) including check sum, but excludes the bytes of pack length itself. 38 SVS Institute Of Technology
  • 39. Department Of ECE Check sum includes all the bytes of the pack mark to check sum, in excess of 2- byte binary are ignored. Chip address are default as 0xFFFFFFFF before created, once the host computer through the command to generate the chip address, all packets must be generated in accordance with the address to send and receive. Chip will refuse to address the wrong packet. Command response Response is to report for the implementation of the orders and results execution. Response includes all the parameter and the follow-up data packets, PC only confirm by receiving the SOC response and order execution. Response packet format: 2bytes 4bytes 1 byte 2 bytes 1 byte N bytes 2 bytes 0xEF01 Chips add. Pack mark 07 Pack length Confirm code Return parameter Check sum Table 1.6: Commands / Datasheet formats Fig 3.18: Fingerprint Verification System 39 SVS Institute Of Technology
  • 40. Department Of ECE Application NGE - OP 67 can be used on all fingerprint verification systems, such as  R&D, Embedded interface development.  Complicated door-guard system;  Fingerprint IC card Identification Terminal;  Fingerprint identification and verification system associated with PC or embedded environment. Developer can develop various fingerprint verification application systems based on the technical data. 3.10 Bike battery: Bike battery consists of four wires red ,green,black,black and white, from these four wires green wire is used for earthing and red wire is the battery power supplier and black and white is used for starting the bike and stopping the bike and black wire is used for display purpose .The four wires functions are given as; RED: battery power supplier to all others GREEN: only for earthing BLACK: used for display (speed meter etc) BLACK AND WHITE: used for start and stop the vehicle Generally there are two conditions for the purpose of starting and stopping of the bike the two conditions are shown in diagrammatically; 40 SVS Institute Of Technology
  • 41. Department Of ECE Key off condition Key on condition Fig 3.19: Key off/on Condition When ever the green wire is earthed with black and white wire then the bike stops and when ever the green wire is open circuit with the black and white wire then the bike begins to start, all this process depends on the ignition lock of the bike, if on the key and also to off the key it must satisfy certain condition to accept the condition. 41 SVS Institute Of Technology
  • 42. Department Of ECE SOFTWARE: Operating System: WINDOWS XP Software Used: KEIL, MICRO ‘C’ FLASH, EXPRESS PCB 3.11 KEIL SOFTWARE Installing the Keil software on a Windows PC: • Insert the CD-ROM in your computer’s CD drive • On most computers, the CD will “auto run”, and you will see the Keil installation menu. If the menu does not appear, manually double click on the Setup icon, in the root directory: you will then see the Keil menu. • On the Keil menu, please select “Install Evaluation Software”. (You will not require a license number to install this software). • Follow the installation instructions as they appear. Loading the Projects: The example projects for this book are NOT loaded automatically when you install the Keil compiler. These files are stored on the CD in a directory “/Pont”. The files are arranged by chapter: for example, the project discussed in Chapter 3 is in the directory “/Pont/Ch03_00-Hello”. Rather than using the projects on the CD (where changes cannot be saved), please copy the files from CD onto an appropriate directory on your hard disk. Note: you will need to change the file properties after copying: file transferred from the CD will be ‘read only’. 42 SVS Institute Of Technology
  • 43. Department Of ECE Configuring the Simulator: 1. Open the Keil µVision2 2. Go to Project – Open Project and browse for Hello in Ch03_00 in Pont and open it. 3. Go to Project – Select Device for Target ‘Target1’ 4. Select 8052(all variants) and click OK 5. Now we need to check the oscillator frequency 6. Go to project – Options for Target ‘Target1’ 7. Make sure that the oscillator frequency is 11.5902MHz. 8. Building the Target: 9. Build the target as illustrated in the figure below 10. Running the Simulation 11. Having successfully built the target, we are now ready to start the debug session and run the simulator. 12. First start a debug session 13. The flashing LED we will view will be connected to Port 1. We therefore want to observe the activity on port 14. To ensure that the port activity is visible, we need to start the ‘periodic window update’ flag 15. Go to Debug - Go 16. While the simulation is running, view the performance analyzer to check the delay durations. 17. Go to Debug – Performance Analyzer and click on it 18. Double click on DELAY_LOOP_Wait in Function Symbols: and click Define button 43 SVS Institute Of Technology
  • 44. Department Of ECE Go to Project: Go to Project – Select Device for Target ‘Target1’ Select 8052(all variants) and click OK 44 SVS Institute Of Technology
  • 45. Department Of ECE Now we need to check the oscillator frequency: Go to project – Options for Target ‘Target1’ Make sure that the oscillator frequency is 12MHz. 45 SVS Institute Of Technology
  • 46. Department Of ECE Building the Target Build the target as illustrated in the figure below Running the Simulation Having successfully built the target, we are now ready to start the debug session and run the simulator. First start a debug session 46 SVS Institute Of Technology
  • 47. Department Of ECE The flashing LED we will view will be connected to Port 1. We therefore want to observe the activity on this port 47 SVS Institute Of Technology
  • 48. Department Of ECE To ensure that the port activity is visible, we need to start the ‘periodic window update’ flag 48 SVS Institute Of Technology
  • 49. Department Of ECE Go to Debug - Go While the simulation is running, view the performance analyzer to check the delay durations. 49 SVS Institute Of Technology
  • 50. Department Of ECE Go to Debug – Performance Analyzer and click on it Double click on DELAY LOOP Wait in Function Symbols: and click Define button 50 SVS Institute Of Technology
  • 51. Department Of ECE Fig 3.20: Configuring the Simulator 51 SVS Institute Of Technology
  • 52. Department Of ECE Advantages & Applications Advantages The main advantage of our project is • It is used to reduce the vehicle thieves • It is used to build the own security of your own vehicle • It is used to identify the thieves (while they are stealing the buzzer or alarm makes sound) Disadvantages • Whenever neighbor needs your vehicle he can’t start without you(vehicle owner). • Else one of your friend or son has to move with him (friend or neighbor fingerprint identity is stored) Applications House hold based equipments • It is used in vehicles and also the household equipments (such as door locks and almaris etc) Automobiles • It is used in each and every security things which are needed for us. • It is used in identification purpose (person identification by using the thumb impression etc) 52 SVS Institute Of Technology
  • 53. Department Of ECE 4. RESULTS In our project, from the fingerprint module the wires are connected to the battery of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get the power, green wire is connected for earthing, red black is connected for the display purpose the power from the battery generates from the black wire then the total display will appear. In the ignition lock there are certain conditions when the bike is on and as well as off condition, in the on condition the green wire is shorted with black and white wire then there is short circuit hence the bike doesn’t start and when there is open circuit with in the green wire then the bike begins to start, at the starting moment of the bike fingerprint module ask for the verification of the fingerprint impression if matches they can use otherwise it gives a sound from the buzzer. 53 SVS Institute Of Technology
  • 54. Department Of ECE 5. CONCLUSION & FUTURE SCOPE 5.1 Conclusion This project may helpful to the people who are earning a very less salaries and the people who are richest, earning high salaries by keeping a powerful security on their own vehicles, they can move anywhere they want by parking the vehicle at unknown place. This may useful to each and every person in day to day life and they will never afraid of the vehicle thefters. By this project people come to existence that our country is developing and they move forward the leg with full of dareness in their minds. 5.2 Future Scope In future we want to develop the same project but by adding a default user identifier and in future we can make this project very bright, by using a snapshot video camera whenever a thief ready for stealing the vehicle, as it records the total scenario happening and also it sends the message to the owner of the vehicle by using the GSM and GPRS technologies. 54 SVS Institute Of Technology
  • 55. Department Of ECE BIBILOGRAPHY  http://www.fingerprint.com/  http://en.wikipedia.org/wiki/Biometric  http://travel.state.gov/fingerprint/eppt/eppt_2788.html  http://www.buslab.org/index.php/content/view/24733/6  http://www.pcworld.com/article/id,103535-page,1/article.html  http://www.modulesfinger.in/site/india 55 SVS Institute Of Technology