8 introduction to references

72
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock CHAPTER 1 INTRODUCTION The global supply chain is the network of suppliers, manufacturing centers, warehouses, distribution centers, and retail outlets that transforms raw materials into finished products and delivers them to consumers. Security of the system has traditionally focused on reducing shrinkage—the loss of cargo shipments through theft and misrouting and has brought increased attention to the risks containerized shipping presents. After September 11, 2001, the security of a supply chain has become a major concern to the public and private sectors. In particular, the ocean segment of a supply chain is most vulnerable to security threats. More than 90% of world trade involves containers aboard ships, amounting to about 20 million containers trips annually. For the US, 17,000 containers arrive at US ports each day. Both the government and industries have begun to examine ways to address the threat of terrorism and the potential of having weapons of mass destruction (WMD) in materials flowing through a supply chain. WMD can result in significant loss in human lives, destruction of infrastructure, and erosion of public and business confidence. Ultimately, global trade and prosperity are threatened. Dept of ECE, SSIT, Tumakuru 2014-15 1

Upload: devanshu-suman

Post on 18-Jan-2017

48 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 1

INTRODUCTION

The global supply chain is the network of suppliers, manufacturing centers,

warehouses, distribution centers, and retail outlets that transforms raw materials into

finished products and delivers them to consumers. Security of the system has traditionally

focused on reducing shrinkage—the loss of cargo shipments through theft and misrouting

and has brought increased attention to the risks containerized shipping presents. After

September 11, 2001, the security of a supply chain has become a major concern to the

public and private sectors. In particular, the ocean segment of a supply chain is most

vulnerable to security threats. More than 90% of world trade involves containers aboard

ships, amounting to about 20 million containers trips annually. For the US, 17,000

containers arrive at US ports each day. Both the government and industries have begun to

examine ways to address the threat of terrorism and the potential of having weapons of

mass destruction (WMD) in materials flowing through a supply chain.

WMD can result in significant loss in human lives, destruction of infrastructure,

and erosion of public and business confidence. Ultimately, global trade and prosperity are

threatened.

1.1 Objectives:

Cargo monitoring system (CMS) is a set of hardware and software that allows

control/monitor containers from the point of departure to final destination. The main

objectives of such system:

Goods safety;

Illegal and smuggled goods control;

Information about cargo traffic and standing;

Real – time monitoring of hazardous and high value goods.

Sometimes it occurs such situations when the containers are loaded with the

illegal goods or unloaded without the owner’s acceptance. In order to avoid such

situations, it is proposed to monitor cargo transit via GPS tracking system. To ensure

Dept of ECE, SSIT, Tumakuru 2014-15 1

Page 2: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

proper and timely response to the intrusive cargo openings, containers are equipped with

the mobile GPS device and GSM modem. Additionally door opening sensor is mounted

inside the container.

GPS device fixates the coordinates of container and transfers information to the

main server via GSM network at fixed intervals. The user can connect to the graphic user

interface and monitor container traffic as well as door status (was opened or not) with any

computer, connected to the Internet. In case when the door is opened, the alert, composed

of exact time, coordinates and cargo number is sent to the user’s mobile telephone or

email.

1.2 Components of Electronic Cargo Tracking System:

Tracking reader (GPS receiver, RFID reader & GPRS / GSM modem). Electronic seal. CTS software platform

1.3 Implementation:

The CTS is being implemented using Radio Frequency Identification (RFID) and

GPS/GPRS technology. All trucks/vehicles, tankers and containers carrying goods on

transit, exports & under control are fitted with a tracking device and electronic lock

which sends the lock status, truck location and any violation information on real time

basis.

1.4 Problem statement:In addition to ongoing monitoring of the locks and the vehicles, supervisors will use

handheld devices to receive/send all information regarding the freights/containers on-line.

The Cargo Tracking & Protection System presents all freights, containers and vehicle’s

information on a Google Earth, using the GPS location of each component via the GSM

network.

1.5 Existing System:A present technology of locking and monitoring the Cargos does not provide effective

solutions for the situation. A little corruption among the employees can easily deceive the

Dept of ECE, SSIT, Tumakuru 2014-15 2

Page 3: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Fig.1.1. A Ship carrying cargoes

whole security system. Since these Cargos contains material of high value and in high

quantity , therefore these containers are more prone to the pilferage and to protect the

material we need a sound technique which minimizes the loss due to involvement of the

corrupt employees.

1.6 Proposed System:The proposed solution consists of several complexes while the main ones is:

Cargo tracking solution for monitoring of the goods.

1.7 Working:After loading the materials in the containers the electronic lock is activated. This lock

continuously monitors the global positioning coordinates of the container and sends the

data to the base station if requested.

During the course of the journey the electronic lock cannot be open as it requires a series

of security check before opening. At the destination the driver has to press a button to

acknowledge the completion of journey. When the switch is pressed the lock sends the

current GPS coordinates to the base station. At the base station the received coordinates

are compared with the database to confirm whether the container has reached the right

destination or not. If confirmed correctly it will send the password and ID number of the

driver to the lock and the password to the driver via GSM.

Dept of ECE, SSIT, Tumakuru 2014-15 3

Page 4: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Then the driver has to prove his identity to the lock by producing a RFID card.

After verifying the correct ID number the lock will ask for password and after verifying

the correct password it will open the electromagnetic lock. Any activity of pilferage in

between the journey can be tracked by sending the GPS coordinates and activation of

alarm immediately. The whole routing of the journey of the container can be traced by

viewing GPS coordinates on the PC at base station using GOOGLE EARTH.

We can extend this project by installing RFID readers to the container which will

count and log the quantity of material coming inside or going inside of the container at

any particular time.

Dept of ECE, SSIT, Tumakuru 2014-15 4

Page 5: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 2

LITERATURE SURVEY

1 Lecturer Ms. Sarojrani Pattnaik1, Dr. M.S.Khan2

Synergy Institute of Engineering and Technology, Dhenkanal, Orissa, India,

Email: [email protected]

2 Professor, Synergy Institute of Engineering and Technology, Dhenkanal,

Orissa, India,

Abstract:Prior to September 11, 2001, supply chain security concerns were related to Controlling

theft and reducing contraband such as illegal drugs, illegal immigrants, and export of

stolen goods. But after September 11, 2001, the threat of terrorist attacks has heightened

the need to assure supply chain security. The proposals should be there to create more

confidence in supply chain security, while maintaining smooth flows of goods and

services in a global supply chain. Resulting from security breaches, can be disastrous.

One of the most efficient strategies to ensure supply chain security is to apply the lessons

of successful quality improvement programs. In this paper, an attempt has been made to

describe how the principles of Total Quality Management (TQM) can actually be used to

design and operate processes to assure supply chain security information exchange among

trading partners, ports, shipping companies and the governments nor does it call for

heightened inspection and scrutiny of the goods flowing through a supply chain. The

Quality movement is that the higher quality can be attained at lower cost by proper

management and operational design. The central theme of the quality movement is also

applicable in supply chain security. By using the right management approach, new

technology, and re-engineered operational processes, higher supply chain at lower cost

can also be achieved.

Keywords: Supply Chain; Supply Chain Security; Six Sigma; Total Quality Management:

Dept of ECE, SSIT, Tumakuru 2014-15 5

Page 6: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Impact of RFID Technology on Tracking of Export Goods in Kenya

Joseph K. Siror*, Liang Guangun, Pang Kaifang, Sheng Huanye, Wang Dong

Computer Science & Engineering,

Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai, 200240, China

[email protected],[email protected],

[email protected], [email protected], [email protected]

Abstract -

In this paper the impact of RFID based tracking to address the challenges of

diversion of export goods into the local market in Kenya is discussed. Goods would be

moved out of the export factories on pretext that it was destined to foreign markets,

however, along the way the goods would be dumped and documents falsified to indicate

that goods had left the country, thus evading taxes and gaining unfair advantage. An

RFID based in- Transit Visibility system was designed and piloted to address the

challenges. The system was used to track export cargo from the factories to the port or

frontier offices. The system design, workings and pilot results are discussed in this paper.

Results from the pilot demonstrated that RFID based tracking has a great impact on

curbing diversion and considerable benefits to transporters and other stakeholders thro

Keywords: RFID, Container Tracking, In-Transit Visibility, Real Time Location

Tracking, Cargo Security, Intelligent Tracking ugh increased efficiency and reduced turn-

around

Dept of ECE, SSIT, Tumakuru 2014-15 6

Page 7: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Creating Resilient and Secure Supply Chains Interim Report of Progress and Learnings August 8, 2003

This report was pre pared by James B. Rice, Jr. of the MIT Centre for

Transportation and Logistics (CTL) and Federico Caniato of Politecnico di Milano for the

Supply Chain Response to Terrorism Project team with contributions from team members

Jonathan Fleck,Deena Disraelly, Don Lowtan, Reshma Lensing and Chris Pickett. This

work was conductedunder the direction of Professor Yossi Sheffi, CTL Director. Please

contact James B. Rice,Jr. of CTL ([email protected] or 617.258.8584) if you have any

questions or if you would like to discuss this research project was initiated to investigate

how terrorism and the threat of terrorism are affecting supply chains. The project is

entitled “Supply Chain Response to Global Terrorism” to recognize that there have been a

number of different responses which affect a firm’s ability to handle disruptions such as

terrorism. To fully appreciate the impact of the responses on the firm and its supply chain,

the project scope initially entailed studying the response to terrorist attacks (and similar

disruptions)from several different perspectives: the risk management community and

insurance industry response, the U.S. Government response, the response from shippers

and carriers and agents along the supply network, 11 the experience of past disasters, and

the use of real options 12 to assess the potential value of flexibility in supply chain design

in responding to disruption. The research to date has included a broad literature review

from these different perspectives as well as base interviews with 20 firms (primarily

shippers). The data from the interviews and literature review were synthesized and

analyzed into this body of observations and insights. A more detailed review of the

methodology and limitations on the use of the data is report

Dept of ECE, SSIT, Tumakuru 2014-15 7

Page 8: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

The Detection and Prevention of Cargo Theft

Many companies suffer losses through cargo theft, particularly small businesses, yet it is

an area of business crime that receives scant attention. A single truck load of cargo can be

worth as much as $3 million. The risk of theft, especially if the goods have a black market

value, is very real. Worldwide, the direct cost of cargo theft is estimated at about US$30

billion per year, within direct costs many times higher. Cargo theft occurs in freight-

forwarding yards, warehouses and during transportation in trucks, as airfreight and on

ships. Cargo is particularly vulnerable while in the process of being loaded or unloaded

from trucks, or through documentary fraud. For a small business operating on a just-in-

time basis, the loss of freight may threaten viability—particularly if insurance coveris

inadequate or compensation payments are contested. Further, the illegal saleof stolen

cargo undercuts prices in legitimate businesses. This paper provides an overview of cargo

theft, and discusses some target-hardening, freight forwardingand inventory control

strategies that can be adopted by smaller Organisations to reduce the risks. Cargo theft

creates substantial economic losses, however many incidents are not formally reported

and media attention is rare. Cargo can be stolen either by employees or by external

offenders. The modus operandi can involve hold-ups, theft from freight yards, theft from

containers, theft off trucks, or documentary fraud. The cargo can be legitimately in

transit, already illegally in the possession of other offenders, or being transported in a way

that avoids excise duty or other taxes.

Dept of ECE, SSIT, Tumakuru 2014-15 8

Page 9: 8 introduction to references

PC GSMMODULESIM900

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 3

SYSTEM DESIGN

3.1 Block Diagram:

Fig.3.1: Base Station

Dept of ECE, SSIT, Tumakuru 2014-15 9

Page 10: 8 introduction to references

PIC 18LF46K22Microcontroller

GPS MODULE

GSMMODULESIM300

KEYPAD RFID READER

16x2 LCD

Buzzer

ELECTROMAGNETICLOCKING MECHANISM

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Fig.3.2: Block Diagram of the system

Dept of ECE, SSIT, Tumakuru 2014-15 10

Page 11: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

3.1.1 Cargo Tracking - Electric LockEach container will be sealed with an Electric lock which will monitor the

container location and goods status in order to prevent and alert in case of unauthorized

opening, sabotage or theft. Each lock will contain all shipment details. This information

will be filled by the customs and revenue authorities in the beginning of each journey and

will be read along the way and in the port using a handheld terminal device.

This System aims at providing a sound mechanism to prevent the pilferage in the Cargo

containers by implying an electronic lock and minimizing the human interference in the

security of the Cargo containers.

This mechanism secures the containers by an electronic lock which will require a

series of security check during opening of the lock. The lock is controlled and monitored

by the base station.

3.1.2 LCD DISPLAY (16 X 2)

Alphanumeric displays are used in a wide range of applications, including

palmtop Computers, word processors, photocopiers, point of sale terminals, medical

Instruments, cellular phones, etc. The 16 x 2 intelligent alphanumeric dot matrix Display

is capable of displaying 224 different characters and symbols. A full list of the characters

and symbols is printed on pages 7/8 (note these symbols can vary between brand of LCD

used).

Fig 3.3.: LCD DISPLAY (16 X 2)

Dept of ECE, SSIT, Tumakuru 2014-15 11

Page 12: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

3.1.3 GPS (Global Positioning System)

The Global Positioning System (GPS) is a space-based satellite navigation system

that provides location and time information in all weather conditions, anywhere on or

near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

The system provides critical capabilities to military, civil and commercial users around

the world. It is maintained by the United States government and is freely accessible to

anyone with a GPS receiver.

The GPS project was developed in 1973 to overcome the limitations of previous

navigation systems, integrating ideas from several predecessors, including a number of

classified engineering design studies from the 1960s. GPS was created and realized by the

U.S. Department of Defence (DoD) and was originally run with 24 satellites. It became

fully operational in 1995. 

Each GPS satellite continually broadcasts a signal (carrier frequency with modulation)

that include:

A pseudorandom code (sequence of ones and zeros) that is known to the

receiver. By time-aligning a receiver-generated version and the receiver-

measured version of the code, the time of arrival (TOA) of a defined point in

the code sequence, called an epoch, can be found in the receiver clock time

scale

A message that includes the time of transmission (TOT) of the code epoch (in

GPS system time scale) and the satellite position at that time.

Conceptually, the receiver measures the TOAs (according to its own clock) of four

satellite signals. From the TOAs and the TOTs, the receiver forms four times of flight

(TOF) values, which are (given the speed of light) approximately equivalent to receiver-

satellite range differences. The receiver then computes its three-dimensional position and

clock deviation from the four TOFs.

In practice the receiver position (in three dimensional Cartesian coordinates with

origin at the earth's centre) and the offset of the receiver clock relative to GPS system

time are computed simultaneously, using the navigation equations to process the TOFs.

The receiver's earth-cantered solution location is usually converted

to latitude, longitude and height relative to an ellipsoidal earth model. The height may

Dept of ECE, SSIT, Tumakuru 2014-15 12

Page 13: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

then be further converted to height relative thegeoids(e.g.,EGM96) (essentially, mean sea

level). These coordinates may be displayed, perhaps on a moving map display and/or

recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person

carrying GPS device).

3.1.4 GSM (Global System for Mobile Communications)

GSM (Global System for Mobile Communications), (originally Groupe Spécial Mobile),

is a standard developed by the European Telecommunications Standards Institute (ETSI)

to describe protocols for second generation (2G) digital cellular networks used by mobile

phones. It is the default global standard for mobile communications with over 90%

market share, and is available in over 219 countries and territories.

The GSM standard was developed as a replacement for first generation (1G)

analogue cellular networks, and originally described a digital, circuit-switched network

optimized for full duplex voice telephony. This was expanded over time to include data

communications, first by circuit-switched transport, then packet data transport

via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM

Evolution

Fig 3.4.: Structure of GSM Network

Dept of ECE, SSIT, Tumakuru 2014-15 13

Page 14: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Frequency of operation for 2G is 900 MHz or 1800 MHz bands & for 3G it goes up to

2100 MHz.

One of the key features of GSM is the Subscriber Identity Module, commonly

known as a SIM card. The SIM is a detachable smart card containing the user's

subscription information and phone book. This allows the user to retain his or her

information after switching handsets. Alternatively, the user can also change operators

while retaining the handset simply by changing the SIM. Some operators will block this

by allowing the phone to use only a single SIM, or only a SIM issued by them; this

practice is known as SIM locking.

3.1.5 RFID (Radio-frequency identification) Reader

Radio-frequency identification (RFID) is the wireless use of electromagnetic

fields to transfer data, for the purposes of automatically identifying and tracking tags

attached to objects. The tags contain electronically stored information. Some tags are

powered by electromagnetic from magnetic fields produced near the reader. Some types

collect energy from the interrogating radio waves and act as a passive transponder. Other

types have a local power source such as a battery and may operate at hundreds of meters

from the reader. Radio frequency identification (RFID) is one method for Automatic

Identification and Data Capture (AIDC).

RFID tags are used in many industries. An RFID tag attached to an automobile during

production can be used to track its progress through the assembly line. Pharmaceuticals

can be tracked through warehouses. Livestock and pets may have tags injected, allowing

positive identification of the animal.

Since RFID tags can be attached to cash, clothing, possessions, or even implanted

within people, the possibility of reading personally-linked information without consent

has raised serious privacy concerns

A radio-frequency identification system uses tags, or labels attached to the objects

to be identified. Two-way radio transmitter-receivers called interrogators or readers send

a signal to the tag and read its response.

RFID tags can be passive, active or battery-assisted passive. An active tag has an

on-board battery and periodically transmits its ID signal. A battery-assisted passive

Dept of ECE, SSIT, Tumakuru 2014-15 14

Page 15: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

(BAP) has a small battery on board and is activated when in the presence of an RFID

reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag

uses the radio energy transmitted by the reader. However, to operate a passive tag, it must

be illuminated with a power level roughly a thousand times stronger than for signal

transmission. That makes a difference in interference and in exposure to radiation.

RFID tags contain at least two parts: an integrated circuit for storing and processing

information, modulating and demodulating a radio-frequency (RF) signal, collecting DC

power from the incident reader signal, and other specialized functions; and an antenna for

receiving and transmitting the signal. The tag information is stored in a non-volatile

memory. The RFID tag includes either fixed or programmable logic for processing the

transmission and sensor data, respectively.

An RFID reader transmits an encoded radio signal to interrogate the tag. The

RFID tag receives the message and then responds with its identification and other

information. This may be only a unique tag serial number, or may be product-related

information such as a stock number, lot or batch number, production date, or other

specific information. Since tags have individual serial numbers, the RFID system design

can discriminate among several tags that might be within the range of the RFID reader

and read them simultaneously.

RFID tags are widely used in identification badges, replacing earlier magnetic

stripe cards. These badges need only be held within a certain distance of the reader to

authenticate the holder. Tags can also be placed on vehicles, which can be read at a

distance, to allow entrance to controlled areas without having to stop the vehicle and

present a card or enter an access 

Yard management, shipping and freight and distribution centres use RFID

tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock

identify the owner, identification number and type of equipment and its characteristics.

This can be used with a database to identify the lading, origin, destination, etc. of the

commodities being carried.

In commercial aviation, RFID is used to support maintenance on commercial

aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.

Dept of ECE, SSIT, Tumakuru 2014-15 15

Page 16: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Some countries are using RFID for vehicle registration and enforcement. RFID can help

detect and retrieve stolen cars.

3.1.6 Electromagnetic Locking Mechanism

An electromagnetic lock, magnetic lock, or maglock is a locking device that

consists of an electromagnet and an armature plate. There are two main types of electric

locking devices. Locking devices can be either "fail safe" or "fail secure". A fail-secure

locking device remains locked when power is lost. Fail-safe locking devices are unlocked

when de-energized. Direct pull electromagnetic locks are inherently fail-safe. Typically

the electromagnet portion of the lock is attached to the door frame and a mating armature

plate is attached to the door. The two components are in contact when the door is closed.

When the electromagnet is energized, a current passing through the electromagnet creates

a magnetic flux that causes the armature plate to attract to the electromagnet, creating a

locking action. Because the mating area of the electromagnet and armature is relatively

large, the force created by the magnetic flux is strong enough to keep the door locked

even under stress.

Typical single door electromagnetic locks are offered in both 600 lbs. and 1200

lbs.The power for an electromagnet lock is DC (Direct Current), around 6 W. The current

is around 0.5 A when the voltage supply is 12 V DC. Generally, the specification of the

electromagnet locks is dual voltages 12/24 V DC

3.1.7 PIC18LF46K22 Microcontroller

The PIC18 microcontroller family provides PIC micro devices in 18- to 80-pin packages

that are both socket and software upwardly compatible to the PIC16 family. The PIC18

family includes all the popular peripherals, such as MSSP, ESCI, CCP, flexible 8- and 16-

bit timers, PSP, 10-bit ADC, WDT, and POR and CAN 2.0B Active for the maximum

flexible solution. Most PIC18 devices will provide FLASH program memory in sizes

from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes; operating from 2.0 to

5.5volts, at speeds from DC to 40 MHz Optimized for high-level languages like ANSI

C, the PIC18 family offers a highly flexible solution for complex embedded applications.

High Performance RISC CPU:

C-Language friendly architecture

PIC16 source code compatible

Linear program memory addressing to 2 Mbyte

Dept of ECE, SSIT, Tumakuru 2014-15 16

Page 17: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Linear data memory addressing up to 4 Kbytes

Up to 10 MIPs operation:

DC - 40 MHz osc/clock input

4 MHz - 10 MHz clock with PLL active

16-bit wide instructions, 8-bit wide data path

Priority levels for interrupts

8 x 8 Single Cycle Hardware Multiplier

Peripheral Features:

High current sink/source 25 mA/25 mA

Up to four external interrupt pins

Up to three 16-bit timer/counters

Up to two 8-bit timer/counters with 8-bit period

register (time-base for PWM)

Secondary LP oscillator clock option - Timer1

Up to five Capture/Compare/PWM (CCP) modules

CCP pins can be configured as:

Capture input: 16-bit, resolution 6.25 ns (TCY/16)

Compare: 16-bit, max. resolution 100 ns (TCY)

PWM output: PWM resolution is 1- to 10-bit

Max. PWM frequency @: 8-bit resolution = 156 kHz

10-bit resolution = 39 kHz

Master Synchronous Serial Port (MSSP) module

Two modes of operation:

3-wire SPITM (supports all 4 SPI modes)

I2CTM Master and Slave mode

Up to 2 Addressable USART modules (ESCI)

Supports interrupt on Address bit

Parallel Slave Port (PSP) module

Analog Features:

10-bit Analog-to-Digital Converter module (A/D) with:

Fast sampling rate

Up to 16 channels input multiplexor

Conversion available during SLEEP

DNL = ±1 LSb, INL = ±1 LSb

Dept of ECE, SSIT, Tumakuru 2014-15 17

Page 18: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Programmable Low Voltage Detection (LVD) module

Supports interrupt-on-low voltage detection

Programmable Brown-out Reset (BOR)

Comparators

Special Microcontroller Features:

Oscillator Start-up Timer (OST)

Watchdog Timer (WDT) with its own on-chip RC oscillator

for reliable operation

Programmable code protection

In-Circuit Serial Programming TM (ICSPTM) via two pins

CMOS Technology:

Fully static design

Wide operating voltage range (2.0V to 5.5V)

Industrial and Extended temperature ranges

Power Managed Features:

Internal RC oscillator for ADC operation during SLEEP

SLEEP mode (IPD < 1 µA typ.)

up to 23 individually selectable wake-up events

3 edge selectable wake-up inputs

4 state change wake-up inputs

Internal RC oscillator for WDT (period wake-up)

RAM retention mode (VDD as low as 1.5V)

Dept of ECE, SSIT, Tumakuru 2014-15 18

Page 19: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 4

SYSTEM IMPLEMENTATION

4.1 Schematics:

Fig 4.1: Schematic of system implementation

Dept of ECE, SSIT, Tumakuru 2014-15 19

Page 20: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

4.2 Flowchart of the system

Dept of ECE, SSIT, Tumakuru 2014-15 20

Page 21: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 5

HARDWARE AND SOFTWARE DESCRIPTION

5.1 HARDWARE DESCRIPTION

5.1.1 MICROCONTROLLER

Fig 5.1: PIC18LF46K22

It is the heart of the project, it is the decision maker and it controls all other device

interfaced with it. Here we are using PIC18LF46K22 microcontroller.

PIC18LF4K22 is a 8-bit, 40 Pin, Low-Power, High-Performance Microcontrollers

with XLP Technology. The PIC18 family includes all the popular peripherals, such as

MSSP, ESCI, CCP, flexible 8- and 16-bit timers, PSP, 10-bit ADC, WDT, and POR and

CAN 2.0B Active for the maximum flexible solution. Most PIC18 devices will provide

FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4

Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz Optimized for

high-level languages like ANSI C, the PIC18 family offers a highly flexible solution for

complex embedded applications.

Features:

High Performance RISC CPU:

C-Language friendly architecture

PIC16 source code compatible

Linear program memory addressing to 2 Mbyte

Dept of ECE, SSIT, Tumakuru 2014-15 21

Page 22: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Linear data memory addressing up to 4 Kbytes

Up to 10 MIPs operation:

DC - 40 MHz osc/clock input

4 MHz - 10 MHz clock with PLL active

16-bit wide instructions, 8-bit wide data path

Priority levels for interrupts

8 x 8 Single Cycle Hardware Multiplier

Peripheral Features:

High current sink/source 25 mA/25 mA

Up to four external interrupt pins

Up to three 16-bit timer/counters

Up to two 8-bit timer/counters with 8-bit period

register (time-base for PWM)

Secondary LP oscillator clock option - Timer1

Up to five Capture/Compare/PWM (CCP) modules

CCP pins can be configured as:

Capture input: 16-bit, resolution 6.25 ns (TCY/16)

Compare: 16-bit, max. resolution 100 ns (TCY)

PWM output: PWM resolution is 1- to 10-bit

Max. PWM frequency @: 8-bit resolution = 156 kHz

10-bit resolution = 39 kHz

Master Synchronous Serial Port (MSSP) module

Two modes of operation:

3-wire SPITM (supports all 4 SPI modes)

I2CTM Master and Slave mode

Up to 2 Addressable USART modules (ESCI)

Supports interrupt on Address bit

Parallel Slave Port (PSP) module

Analog Features:

10-bit Analog-to-Digital Converter module (A/D) with:

Fast sampling rate

Up to 16 channels input multiplexor

Conversion available during SLEEP

DNL = ±1 LSb, INL = ±1 LSb

Dept of ECE, SSIT, Tumakuru 2014-15 22

Page 23: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Programmable Low Voltage Detection (LVD) module

Supports interrupt-on-low voltage detection

Programmable Brown-out Reset (BOR)

Comparators

Special Microcontroller Features:

Power-on Reset (POR), Power-up Timer (PWRT) and

Oscillator Start-up Timer (OST)

Watchdog Timer (WDT) with its own on-chip RC oscillator

for reliable operation

Programmable code protection

In-Circuit Serial Programming TM (ICSPTM) via two pins

CMOS Technology:

Fully static design

Wide operating voltage range (2.0V to 5.5V)

Industrial and Extended temperature ranges

Power Managed Features:

Dynamically switch to secondary LP oscillator

Internal RC oscillator for ADC operation during SLEEP

SLEEP mode (IPD < 1 µA typ.)

up to 23 individually selectable wake-up events

edge selectable wake-up inputs

4 state change wake-up inputs

Internal RC oscillator for WDT (period wake-up)

RAM retention mode (VDD as low as 1.5V)

Up to 6 more Power Managed modes available on

selected models (PIC18F1320/2320/4320 and PIC18F1220/2220/4220)

Dept of ECE, SSIT, Tumakuru 2014-15 23

Page 24: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.1 PIN DIAGRAM OF PIC18F46K22

DIP

Fig 5.2 Pin diagram of PIC18LF46K22

Dept of ECE, SSIT, Tumakuru 2014-15 24

Page 25: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.2 GPS (Global Positioning System):

Fig 5.3: GPS module

The Global Positioning System(GPS) is a space-based satellite navigation system

that provides location and time information in all weather conditions, anywhere on or

near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

The system provides critical capabilities to military, civil and commercial users around

the world. It is maintained by the United States government and is freely accessible to

anyone with a GPS receiver.

GPS has become an efficient tool in the field of scientific use, commerce,

surveillance and tracking. This project presents a small application based on Global

Positioning System. It depicts the use of GPS module/receiver to find latitude and

longitude of its location. The data obtained from GPS receiver (GPGGA sentence) is

processed by the microcontroller to extract its latitude and longitude values.

The GPS module continuously transmits serial data (RS232 protocol) in the form

of sentences according to NMEA standards. The latitude and longitude values of the

location are contained in the GPGGA sentence (refer NMEA format). In this program,

these values are extracted from the GPGGA sentence and are displayed on LCD.

The extraction of location values is done as follows. The first six bytes of the data

received are compared with the pre-stored (GPGGA) string and if matched then only data

is further accounted for; otherwise the process is repeated again. From the comma

delimited GPGGA sentence, latitude and longitude positions are extracted by finding the

respective comma positions and extracting the data. The latitude and longitude positions

Dept of ECE, SSIT, Tumakuru 2014-15 25

Page 26: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

extracted are displayed on the with. The receiver measures the TOAs (according to its

own clock) of four satellite signals. From the TOAs and the TOTs, the receiver forms

four times of flight (TOF) values, which are (given the speed of light) approximately

equivalent to receiver-satellite range differences. The receiver then computes its three-

dimensional position and clock deviation from the four TOFs.

In practice the receiver position (in three dimensional Cartesian coordinates with

origin at the earth's centre) and the offset of the receiver clock relative to GPS system

time are computed simultaneously, using the navigation equations to process the TOFs.

The receiver's earth-cantered solution location is usually converted

to latitude, longitude and height relative to an ellipsoidal earth model. The height may

then be further converted to height relative the geoids (e.g., EGM96) (essentially, mean

sea level). These coordinates may be displayed, perhaps on a moving map display and/or

recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person

carrying GPS device). Figure 5.4 shows the schematic representation of GPS system.

Fig 5.4: Schematic representation of GPS

Dept of ECE, SSIT, Tumakuru 2014-15 26

Page 27: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.3 GSM (Global System for mobile):

Fig 5.5: GSM module

Architecture of the GSM Network:

A GSM network is composed of several functional entities, whose functions and

interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM

network can be divided into three broad parts. The Mobile Station is carried by the

subscriber. The Base Station Subsystem controls the radio link with the Mobile Station.

The Network Subsystem, the main part of which is the Mobile services Switching Center

(MSC), performs the switching of calls between the mobile users, and between mobile

and fixed network users. The MSC also handles the mobility management operations. Not

shown is the Operations and Maintenance Center, which oversees the proper operation

and setup of the network. The Mobile Station and the Base Station Subsystem

communicate across the Um interface, also known as the air interface or radio link. The

Base Station Subsystem communicates with the Mobile services Switching Center across

the A interface.

Mobile Station:

The mobile station (MS) consists of the mobile equipment (the terminal) and a

smart card called the Subscriber Identity Module (SIM). The SIM provides personal

mobility, so that the user can have access to subscribed services irrespective of a specific

terminal. By inserting the SIM card into another GSM terminal, the user is able to receive

calls at that terminal, make calls from that terminal, and receive other subscribed services.

The mobile equipment is uniquely identified by the International Mobile Equipment

Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity

(IMSI) used to identify the subscriber to the system, a secret key for authentication, and

Dept of ECE, SSIT, Tumakuru 2014-15 27

Page 28: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

other information. The IMEI and the IMSI are independent, thereby allowing personal

mobility. The SIM card may be protected against unauthorized use by a password or

personal identity number.

Base Station Subsystem:

The Base Station Subsystem is composed of two parts, the Base Transceiver

Station (BTS) and the Base Station Controller (BSC). These communicate across the

standardized Abis interface, allowing (as in the rest of the system) operation between

components made by different suppliers. The Base Transceiver Station houses the radio

transceivers that define a cell and handles the radio-link protocols with the Mobile

Station. In a large urban area, there will potentially be a large number of BTSs deployed,

thus the requirements for a BTS are ruggedness, reliability, portability, and minimum

cost. The Base Station Controller manages the radio resources for one or more BTSs. It

handles radio-channel setup, frequency hopping, and handovers, as described below. The

BSC is the connection between the mobile station and the Mobile service Switching

Centre (MSC).

Network Subsystem:

The central component of the Network Subsystem is the Mobile services Switching

Centre (MSC). It acts like a normal switching node of the PSTN or ISDN, and

additionally provides all the functionality needed to handle a mobile subscriber, such as

registration, authentication, location updating, handovers, and call routing to a roaming

subscriber. These services are provided in conjunction with several functional entities,

which together form the Network Subsystem. The MSC provides the connection to the

fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the

Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in

ISDN and widely used in current public networks.

GSM modem characteristics: Dual Band or Triband GSM GPRS modem (EGSM 900/1800MHz) / (EGSM

900/1800 / 1900 MHz)

Designed for GPRS, data, fax, SMS and voice applications

Fully compliant with ETSI GSM Phase 2+ specifications (Normal MS)

Input voltage: 8V-40V

Input current: 8mA in idle mode, 150mA in communication GSM 900 @ 12V

Dept of ECE, SSIT, Tumakuru 2014-15 28

Page 29: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Temperature range: Operating -20 to +55 degree Celsius; Storage -25 to +70

degree Celsius

Overall dimensions: 80mm x 62mm x 31mm / Weight: 200g Interfaces

RS-232 through D-TYPE 9 pin connector

RJ11 voice connector

Power supply through Molex 4 pin connector

SMA antenna connector

Toggle spring SIM holder

Red LED Power on

Green LED status of GSM / GPRS module.

Here is the figure 5.6 which shows the interfacing of GSM with microcontroller.

Fig 5.6: GSM interfaced with microcontroller

Dept of ECE, SSIT, Tumakuru 2014-15 29

Page 30: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.4 KEYPAD:

Fig 5.7: 4*3 matrix keypad

PIC Microcontrollers provides a library for working with 4*4 keypad. It can also

be used to interface 4*3, 4*2 and 4*1 keypads. In our project we are using 4*3 keypad.

MikroC provides the following three functions to interface Matrix Keypad.

Keypad_Init

Keypad_Key_Press

Keypad_Key_Click

Keypad_Init:

Prototype: void Keypad_Init(void);

It initializes a particular port for working with keypad. A global variable ‘keypad

Port’ must be defined before using this function. Port need to be initialized before calling

this function.

Keypad_Key_Press:

Prototype: char Keypad_Key_Press(void);

This function reads key when a key is pressed and it returns number

corresponding (1 – 16) to the pressed key. If no key is pressed, it will return 0.

Keypad_Key_Click:

Prototype chars Keypad_Key_Click (void);

Dept of ECE, SSIT, Tumakuru 2014-15 30

Page 31: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

When this function is called, it waits until some key is pressed and released. When

released it returns number corresponding (1 – 16) to the pressed key. If no key is pressed,

it will return 0. If more than one key is pressed, the function waits until all pressed keys

are released and returns number corresponds to first pressed key. Port need to be

initialized before calling this function.

Here is the figure 5.8 that shows the interfacing of keypad with microcontroller.

Fig 5.8: Keypad interfacing with microcontroller

Dept of ECE, SSIT, Tumakuru 2014-15 31

Page 32: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.5 LCD(LIQUID CRYSTAL DISPLAY):

Fig 5.9: Circuit diagram of LCD

The LCD panel used in this block interfaced with micro-controller through output

port. This is a 16 character X 2Line LCD module, capable of display numbers, characters,

and graphics. The display contains two internal byte-wide registers, one for commands

(RS=0) and the second for character to be displayed (RS=1). It also contains a user

programmed Ram area (the character RAM) character that can be formed using dot

matrix that can be programmed to generate any desired. Two distinguished between these

areas, the hex command byte will be signify that the display RAM address 00h is chosen.

LCD can add a lot to our application in terms of providing a useful interface for

the user, debugging an application or just giving it a “professional” look. The most

common type of LCD controller is the Hitachi 44780 which provides a relatively simple

interface between a processor and an LCD. Using this inter is often not attempted by

inexperienced designers and programmers because it is difficult to find good

documentation on the interface, initializing the interface can be problem and the displays

themselves are expensive.

Connection to a PC parallel port is mostly simple. These displays can handle eight

bit input directly. They also need two extra lines to control which kind of data has just

arrived and when the data is meant to e stable. Those signals are also called RS (Register

Select, instruction or data register) and EN (enable).

Dept of ECE, SSIT, Tumakuru 2014-15 32

Page 33: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

PIN DETAILS OF LCD:

Pin No. Name DescriptionPin no. 1 VSS Power supply (GND)Pin no. 2 VCC Power supply (+5V)Pin no. 3 VEE Contrast adjust

Pin no. 4 RS 0 = Instruction input1 = Data input

Pin no. 5 R/W 0 = Write to LCD module1 = Read from LCD module

Pin no. 6 EN Enable signalPin no. 7 D0 Data bus line 0 (LSB)Pin no. 8 D1 Data bus line 1Pin no. 9 D2 Data bus line 2Pin no. 10 D3 Data bus line 3Pin no. 11 D4 Data bus line 4Pin no. 12 D5 Data bus line 5Pin no. 13 D6 Data bus line 6Pin no. 14 D7 Data bus line 7 (MSB)Pin no. 15 LED+ Anode of LED for BacklitPin no. 16 LED- Cathode of LED for Backlit

Table No 5.1: Pin Details of LCD

Dept of ECE, SSIT, Tumakuru 2014-15 33

Page 34: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.6 Relay:

Fig 5.10: Relay

Relay is one of the most important electromechanical devices highly used in

industrial applications specifically in automation. A relay is used for electronic to

electrical interfacing i.e. it is used to switch on or off electrical circuits operating at high

AC voltage using a low DC control voltage. A relay generally has two parts, a coil which

operates at the rated DC voltage and a mechanically movable switch. The electronic and

electrical circuits are electrically isolated but magnetically connected to each other; hence

any fault on either side does not affect the other side.

Relay switch consists of five terminals. Two terminals are used to give the input

DC voltage also known as the operating voltage of the relay. Relays are available in

different operating voltages like 6V, 12V, 24V etc. The rest of the three terminals are

used to connect the high voltage AC circuit. The terminals are called Common, Normally

Open (NO) and Normally Closed (NC). Relays are available in various types & categories

and in order to identify the correct configuration of the output terminals, it is best to see

the data sheet or manual.

Normally Open is connected to12V and normally close is connected to ground. By

the help of a switch, Common is connected either to Normally Open or Normally Close

depending on the condition. Here; in our project we are using five relays, four to rotate

two motors in clock wise and anticlockwise direction which is connected with two

containers and one relay with another motor which is connected with belt. Motor is

connected to common terminal of relay. Out of two terminals of input DC one is

connected to ULN2803.

Dept of ECE, SSIT, Tumakuru 2014-15 34

Page 35: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

When there is voltage difference between two terminals, i.e. one terminal of

ULN2003 and another with operating voltage of relay then the EMF is induced in

between them and the Common is connected to Normally Open.

When there is no voltage difference between one terminal of ULN2003 and another

terminal of operating voltage of relay then no EMF is induced in between them and the

Common is connected to Normally Close.

Relay circuit:

Relay circuit is used to activate the relay through microcontroller. In this circuit

we have to use a Darlington transistor (Tip122) for switch on the relay. The relay is an

electromagnetic device which energies when the supply is given. In this circuit, relay is

working in the positive logic. That means when the microcontroller gives high to the

relay circuit the Darlington transistor is switched on and also the relay is ON. When the

microcontroller gives low to the relay circuit the Darlington transistor is switched off and

also the relay is OFF. The two diodes are used for protecting the microcontroller from the

load due to back EMF and EMI problems.

Fig 5.11: Circuit diagram of relay

Dept of ECE, SSIT, Tumakuru 2014-15 35

Page 36: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.7 RFID (Radio-frequency identification) Reader:

Fig 5.12: RFID

Radio-frequency identification (RFID) is the wireless use of electromagnetic

fields to transfer data, for the purposes of automatically identifying and tracking tags

attached to objects. The tags contain electronically stored information. Some tags are

powered by electromagnetic from magnetic fields produced near the reader. Some types

collect energy from the interrogating radio waves and act as a passive transponder. Other

types have a local power source such as a battery and may operate at hundreds of meters

from the reader. Unlike a barcode, the tag does not necessarily need to be within line of

sight of the reader, and may be embedded in the tracked object. Radio frequency

identification (RFID) is one method for Automatic Identification and Data

Capture (AIDC).

RFID tags are used in many industries. An RFID tag attached to an automobile

during production can be used to track its progress through the assembly line.

Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags

injected, allowing positive identification of the animal.

Since RFID tags can be attached to cash, clothing, possessions, or even implanted

within people, the possibility of reading personally-linked information without consent

has raised serious privacy concerns A radio-frequency identification system uses tags,

or labels attached to the objects to be identified. Two-way radio transmitter-receivers

called interrogators or readers send a signal to the tag and read its response.

RFID tags can be passive, active or battery-assisted passive. An active tag has an

on-board battery and periodically transmits its ID signal. A battery-assisted passive

(BAP) has a small battery on board and is activated when in the presence of an RFID

Dept of ECE, SSIT, Tumakuru 2014-15 36

Page 37: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag

uses the radio energy transmitted by the reader. However, to operate a passive tag, it must

be illuminated with a power level roughly a thousand times stronger than for signal

transmission. That makes a difference in interference and in exposure to radiation.

Tags may either be read-only, having a factory-assigned serial number that is used

as a key into a database, or may be read/write, where object-specific data can be written

into the tag by the system user. Field programmable tags may be writing-once, read-

multiple; "blank" tags may be written with an electronic product code by the user.

RFID tags contain at least two parts: an integrated circuit for storing and

processing information, modulating and demodulating a radio-frequency (RF) signal,

collecting DC power from the incident reader signal, and other specialized functions; and

an antenna for receiving and transmitting the signal. The tag information is stored in a

non-volatile memory. The RFID tag includes either fixed or programmable logic for

processing the transmission and sensor data, respectively.

An RFID reader transmits an encoded radio signal to interrogate the tag. The

RFID tag receives the message and then responds with its identification and other

information. This may be only a unique tag serial number, or may be product-related

information such as a stock number, lot or batch number, production date, or other

specific information. Since tags have individual serial numbers, the RFID system design

can discriminate among several tags that might be within the range of the RFID reader

and read them simultaneously.

RFID tags are widely used in identification badges, replacing earlier magnetic

stripe cards. These badges need only be held within a certain distance of the reader to

authenticate the holder. Tags can also be placed on vehicles, which can be read at a

distance, to allow entrance to controlled areas without having to stop the vehicle and

present a card or enter an access 

Yard management, shipping and freight and distribution centers use RFID

tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock

identify the owner, identification number and type of equipment and its characteristics.

This can be used with a database to identify the lading, origin, destination, etc. of the

commodities being carried.

Dept of ECE, SSIT, Tumakuru 2014-15 37

Page 38: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

In commercial aviation, RFID is used to support maintenance on commercial

aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.

Some countries are using RFID for vehicle registration and enforcement. RFID can help

detect and retrieve stolen cars.

Dept of ECE, SSIT, Tumakuru 2014-15 38

Page 39: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.1.8 BUZZER:

Fig 5.13: Buzzer

A buzzer or beeper is an audio signalling device, which may be mechanical,

electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm

devices, timers and confirmation of user input such as a mouse click or keystroke. A

piezoelectric element may be driven by an oscillating electronic circuit or other audio

signal source, driven with a piezoelectric audio amplifier. Sounds commonly used to

indicate that a button has been pressed are a click, a ring or a beep.

Dept of ECE, SSIT, Tumakuru 2014-15 39

Page 40: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

5.2 SOFTWARE DESCRIPTION5.2.1 Embedded C:

An embedded system is n application that contains at least one programmable

computer (typically in the form of microcontroller, a microprocessor or digital signal

processor chip) and which is used by individuals who are; in the main unaware that the

system is computer-based.in embedded C this can be done using specific inbuilt

instruction. Embedded C is controller or target specific. It allows direct communication

with memory.

5.2.2 MPLAB IDE:

MPLAB IDE is a software program that runs on a PC to develop application for

Microchip microcontroller. It is called an Integrated Development Environment, or IDE,

because it provide a single integrated environment to develop code for embedded

microcontrollers. A development system for embedded controllers is a system of

programs running on a desktop PC to help write, debug and program code. The

intelligence of embedded system applications into a microcontroller. MPLAB IDE runs

on a PC and contains all components needed to design and deploy embedded system

application.

Dept of ECE, SSIT, Tumakuru 2014-15 40

Page 41: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 6

RESULT AND TESTING

6.1 Result:

While testing of this project it was found that electronic door was being locked

after loading the cargo. Then while reaching to the destination, exact location was sent to

the base station. Base station sent a random password to the vehicle & authorized person

GSM mobile after verifying the coordinates. After scanning an authorized RFID card

same password was entered and if password correct door was open.

6.2 Testing:

Fig6.1: Booting of the system

Fig: 6.2: Welcome Screen of the system

Fig6.3: After loading press switch message being displayed

Dept of ECE, SSIT, Tumakuru 2014-15 41

Page 42: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Fig6.4 Electromagnetic door has been locked

Fig 6.5 Request has been sent to the base station along with exact coordinate

Dept of ECE, SSIT, Tumakuru 2014-15 42

Page 43: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

Fig 6.6: VB giving an exact location of cargo with the help of GSM & GPS

Dept of ECE, SSIT, Tumakuru 2014-15 43

Page 44: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 7

ADVANTAGES AND LIMITATIONS

7.1 ADVANTAGES

The proposed system has following Advantages.

Use of information to identify compliant stakeholders in the industry.

Platform for exchange of information with other Government agencies.

Develop improved risk assessment systems.

Serve as data sources and as a data exchange tool for Regional cargo tracking.

Maximize revenue collection due to,

Anti-dumping/diversion of transit, export, excisable export goods;

Fast movement of goods along the Kenya supply chain;

Elimination of non-tariff barriers to trade and traffic;

Reduction of corruption cases and promotion of integrity

Increased the level of security of monitored goods.

Fast movement of goods and conveyances along the corridors.

Improve voluntary levels of compliance low cost of compliance

7.2 LIMITATIONSThe proposed system has following Limitations

System knowledge and commitment among the users. (Training)

Maintenance and capacity challenges

Hardware failures, Systems integration

Dept of ECE, SSIT, Tumakuru 2014-15 44

Page 45: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 8

APPLICATIONS

Direct Benefits to Private Firms Improved reliability and service quality, usually thought of as tools

to retain good customers and grow market share and revenue.

Improved shipment and container integrity, built around a core of

security issues.

Direct Public Sector Benefits Increased Greater national security

Improved safety

Dept of ECE, SSIT, Tumakuru 2014-15 45

Page 46: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

CHAPTER 9

CONCLUSION FUTURE ENHANCEMENT

9.1 ConclusionLogistic Companies will benefit greatly with the full Implementation of the

Electronic Cargo Tracking System. With a comprehensive solution for the

monitoring of transit cargo, its status, location and other pertinent information

about it in real time, hence securing the Supply chain.

9.2 Future Enhancement With the implementation of this project Logistic companies will benefit

greatly.

Insurance companies will have to pay fewer claims to logistic companies

as there will be decrease in number of loss of cargoes.

Will the further development in project it can help in preventing human

trafficking through as well.

Dept of ECE, SSIT, Tumakuru 2014-15 46

Page 47: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

REFERENCES

Websites referred:

http://www.raviyp.com/embedded/183-sim900-sim908-gsm-module-autobaud-solution

Journals & Books Referred:

[1] Fleischer P.B., Nelson A.Y.,Sowah R.A.,Bremang, A., “Designand

development of GPS/GSM basedvehicle tracking

andalertsystemforcommercialinter-city buses”,Adaptive Science&Technology

(ICAST),2012IEEE 4thInternational Conference on:25-27Oct.2012Page(s):1–

6

[2] GaneshG.S.P,BalajiB,VaradhanT.A.S,“Anti-thefttracking

systemforautomobiles(autogsm)Fulltextsign-Inor Purchase”, Anti-

Counterfeiting,SecurityandIdentification(ASID),2011

IEEEInternationalConferenceon24-26June2011Page(s):17–19

[3] ZhigangLiu, AnqiZhang, ShaojunLi, “Vehicleanti-theft

trackingsystembasedonInternetof things”,Vehicular Electronics and Safety

(ICVES), 2013 IEEE InternationalConference on2013,Page(s): 48–52

[4] HuiSong,SencunZhu,GuohongCao,“SVATS:ASensor- Network-

BasedVehicleAnti-theftsystem”,INFOCOM2008.The 27thConference

onComputer Communications.IEEE

[5] BaburaoKodavati,V.K.Raju, S.SrinivasaRao, A.V.Prabu, T.Appa

Rao,Dr.Y.V.Narayana “GPSBasedAutomatic

VehicleTrackingUsingRFID”,InternationalJournal of Engineering Research

and Applications , Vol. 1, Issue 3, pp.616-62.

[6] DevyaniBajaj,NeeleshGupt,“GSMandGPSbasedvehicle

locationandtrackingsystem”,International Journal of Engineering and

Innovative Technology (IJEIT) Volume 1,Issue 1,January2012

[7] Mrs.Ramyakulandaivel,P.Ponmalar,B.Geetha,G.Saranya, “GPS and GSM

based vehicle information system”, International Journal of Communications

and EngineeringVolume 01–No.1,Issue:01March 2012.

Dept of ECE, SSIT, Tumakuru 2014-15 47

Page 48: 8 introduction to references

Tracking and Checking Cargo Containers Pilferage Using Electronic Lock

[8] DeepakMishra,Apurv Vas,PuneetTandon,“A novelandcost

effectiveapproachtopublic vehicletrackingsystem”,

InternationalJournalofubicomp(IJU),Vol.3,No.1,January2012.

[9] RuchikaGuptaandBVRReddy,“GPSandGPRSBasedCostEffective Human

TrackingSystem UsingMobilePhones”,Volume 2January-June 2011.

[10] MohammadA.Al-Khedher,“HybridGPS-GSMLocalization of

AutomobileTracking System”,InternationalJournal of

ComputerScience&InformationTechnology (IJCSIT)Vol3, No 6,Dec 2011.

[11] FrancisEnejoIdachaba“DesignofaGPS/GSMbasedtrackerfor the location of

stolen items and kidnapped or missing personsinNIGERIA”,ARPNJournal of

Engineeringand Applied Sciences VOL.6,NO.10,OCTOBER 2011.

[12] AdnanI.Yaqzan,IssamW.Damaj,andRachedN.Zantout“GPS-based

VehicleTrackingSystem-on-Chip”,Proceedings of

theWorldCongressonEngineering 2008VolI WCE2008, July2-

4,2008,London,U.K.

[13] T.KrishnaKishore,T.SasiVardhan,N.LakshmiNarayana,“Vehicle Tracking

Using a Reliable Embedded Data Acquisition SytemWithGPS

andGSM”,IJCSNSInternational

JournalofComputerScienceandNetworkSecurity,VOL.10No.2, February2010

[14] S.S Pethakar, N Srivastava and S.D Suryawanshi. Article:

“GPSandGSMbased Vehicle Tracing andEmployeeSecurity System”,

InternationalJournal ofComputerApplications62(6):37-42, January

2013.Published byFoundation ofComputer Science, New York, USA.

Dept of ECE, SSIT, Tumakuru 2014-15 48