Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

My best effort


Published on

based upon RFID technology

Published in: Technology, Business
  • Be the first to comment

My best effort

  3. 3. <ul><li>What is the need of detecting currency …? </li></ul><ul><li>“ The currency” the most important part of anyone’s life. </li></ul><ul><li>The best way to ensure them is to secure them. </li></ul><ul><li>There are various nations working on the same line but while talking about our nation the currency is not secured. </li></ul><ul><li>As now a days, we are hearing about fake notes from bank and ATMs also. </li></ul><ul><li>Thus,this project ensures the proper rather a complete detection of currency note. </li></ul>
  4. 4. <ul><ul><ul><ul><li>What this project deals with….? </li></ul></ul></ul></ul><ul><ul><ul><ul><li>In this project the detection of currency note is done using RFID tag. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>The RFID tag is used to store the unique data which is maintained in database. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>An additional parameter is used to confirm the value of the same. </li></ul></ul></ul></ul>
  5. 5. <ul><li>The goals that we want to achieve are… </li></ul><ul><li>To design electronic system for the detection of currency . </li></ul><ul><li>To implement the relationship between the software and hardware. </li></ul>
  6. 6. <ul><li>Radio-frequency identification ( RFID ) </li></ul><ul><li>RFID tag is applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. </li></ul><ul><li>RFID chips are being embedded in everything from jeans to paper money, and your privacy is at stake. </li></ul><ul><li>Some tags can be read from several meters away and beyond the line of sight of the reader. </li></ul><ul><li>Radio-frequency identification comprises interrogators (also known as readers ), and tags (also known as labels ). </li></ul><ul><li>  </li></ul>TECHNOLOGY USED
  7. 7. <ul><li>Most RFID tags contain at least two parts: </li></ul><ul><li>One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. </li></ul><ul><li>The second is an antenna for receiving and transmitting the signal. </li></ul><ul><li>There are generally three types of RFID tags: </li></ul><ul><li>Active RFID tags, which contain a battery and can transmit signals autonomously. </li></ul><ul><li>Passive RFID tags, which have no battery and require an external source to provoke signal transmission, and </li></ul><ul><li>Battery assisted passive (BAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. </li></ul>
  8. 8. <ul><li>A RFID CHIP: </li></ul><ul><li>Currently, RFID tags are created by gluing an integrated circuit (IC) to an inlay . </li></ul><ul><li>This poses a problem as vibration and high temperatures will loosen the connection. If the IC loses connection with the inlay, the RFID tag will no longer transmit. </li></ul><ul><li>This process replaces the adhesive with solder which is much more durable and temperature resistant. </li></ul>
  9. 9. <ul><li>The SensIC is an RFID chip that adds a new dimension in monitoring. </li></ul><ul><li>The SensIC is a low frequency passive RFID chip that provides read/write memory. </li></ul><ul><li>Temperature monitoring and an MEMS sensor interface to enable pressure, humidity, or strain measurements. </li></ul><ul><li>It communicates via standard ISO protocols and legacy ID systems can be upgraded to provide temperature. </li></ul><ul><li>The RFID chip can be mounted and left in place in harsh environments without concern for battery life, </li></ul><ul><li>enabling parameter measurement at any time in the future. </li></ul>
  10. 10. <ul><li>How much memory can a tag have? </li></ul><ul><li>Passive tags (non-battery) typically have anywhere from 64 bits to 1 kilobyte of non-volatile memory. </li></ul><ul><li>Active tags, such as those used in military tags, have memories as high as 128 kilobytes. </li></ul><ul><li>How is the information stored on an RFID tag? </li></ul><ul><li>The majority of passive tags use EEPROM memory. </li></ul><ul><li>Some are laser programmed at the silicon level. </li></ul><ul><li>Many active tags utilize battery-backed SRAM. </li></ul><ul><li>How can a passive RFID tag accommodate all the data desired? </li></ul><ul><li>It depends on the amount of data required.Some passive tags can store up to 1 kilobyte of data on the tag. </li></ul>MEMORY OF RFID TAG :
  11. 11. <ul><li>What is the relationship between frequency and tag/antenna distance? </li></ul><ul><li>Passive high-frequency (HF, typically 13 MHz) and low-frequency (LF, around 125 kHz) systems typically exhibit a read range of less than 3 feet. </li></ul><ul><li>With HF and LF tag systems, the size of a tag (and hence area of antenna) will have a significant impact on read range. </li></ul><ul><li>Some applications limit the read range to around 6 to 8 inches. Some newer technologies(UHF systems) do have a longer read range that can be 20 to 25 feet, but these systems are intended for pallets andshipping crates. </li></ul><ul><li>Read range depends on many factors, but the size of the transponder’s antenna, the size of the reader’s antenna,and its output power are the main factors to consider. With battery-less transponders, long read range and small size are mutually exclusive. </li></ul>
  12. 12. <ul><li>DESIGN OF PROPOSED WORK </li></ul>
  14. 15. SOFTWARE REQUIRED <ul><li>1. µVision Keil </li></ul><ul><li>  </li></ul><ul><li>ROLE IN THE DESIGN: </li></ul><ul><li>µVision Keil provides IDE for 8051 programming & is very easy to use. </li></ul><ul><li>It’s device database is large which supports many ICs of the 8051 family. </li></ul><ul><li>A HEX file can be created with the help of Keil which is required for burning onto chip. </li></ul><ul><li>It has a powerful debugging tool which detects most of the errors in the program. </li></ul>
  15. 16. <ul><li>2 . Flash Magic </li></ul><ul><li>  </li></ul><ul><li>ROLE IN THE DESIGN: </li></ul><ul><li>  </li></ul><ul><li>Flash Magic is a PC tool for programming flash based microcontrollers from NXP using a serial or Ethernet protocol while in the target hardware.  </li></ul><ul><li>It has some excellent features like changeable baud rate, erase all flash before programming, setting security bits etc. </li></ul><ul><li>The HEX file created with the help of keil was selected through it for programming the microcontroller. </li></ul>
  17. 18. <ul><li>The Central Bank may embed RFID chips in the note. Ostensibly to combat counterfeiters and money-launderers. </li></ul><ul><li>It would also enable banks to count large amounts of cash in seconds. Unfortunately, such a move would also makes it possible for governments to track the passage of cash from individual to individual. </li></ul><ul><li>Cash is the last truly anonymous way to buy and sell. With RFID tags, that anonymity would be gone. </li></ul><ul><li>In addition, banks would not be the only ones who could in an instant divine how much cash you were carrying; criminals can also obtain power transceivers. </li></ul>
  18. 19. <ul><li>Passports </li></ul><ul><li>The first RFID passports (&quot; E-passport &quot;) were issued by Malaysia in 1998. In addition to information also contained on the visual data page of the passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits from the country. </li></ul><ul><li>Schools and universities </li></ul><ul><li>School authorities in the Japanese city of Osaka are now chipping children's clothing, back packs, and student IDs in a primary school. </li></ul><ul><li>Museums </li></ul><ul><li>RFID technologies are now also implemented in end-user applications in museums. An example was the custom-designed temporary research application, &quot;eXspot,&quot; at the Exploratorium , a science museum in San Francisco, California . </li></ul>VARIOUS SIMILAR EXISTING PROJECTS USING RFID TAG
  19. 20. <ul><li>Attendance Tracking & Duration of Stay </li></ul><ul><li>Passive RFID systems are being used at conferences and live events. Attendees at these events are outfitted with passive tags that are read by temporary antennae placed outside educational session rooms or throughout exhibition halls. </li></ul><ul><li>Libraries </li></ul><ul><li>RFID tags used in libraries: square book tag, round CD/DVD tag and rectangular VHS tag. </li></ul><ul><li>Among the many uses of RFID technology is its deployment in libraries . This technology has slowly begun to replace the traditional barcodes on library items (books, CDs , DVDs , etc.). The RFID tag can contain identifying information, such as a book's title or material type, without having to be pointed to a separate database </li></ul>
  20. 21. REFERENCES <ul><li>1. identification </li></ul><ul><li>  2. http://www.STMicroelectronics - RFID and RF Memory ICs.htm </li></ul><ul><li>3. </li></ul><ul><li>4. http://www.RFID Chips Are Here </li></ul><ul><li>5.http://www.RFID Tag Characteristics.htm </li></ul><ul><li>  </li></ul>
  21. 22. Special thanks t o <ul><li>Mr. ROHIT IYER </li></ul>
  22. 23. <ul><li>THANK YOU </li></ul>