8 introduction to references
Post on 18-Jan-2017
46 Views
Preview:
TRANSCRIPT
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 1
INTRODUCTION
The global supply chain is the network of suppliers, manufacturing centers,
warehouses, distribution centers, and retail outlets that transforms raw materials into
finished products and delivers them to consumers. Security of the system has traditionally
focused on reducing shrinkage—the loss of cargo shipments through theft and misrouting
and has brought increased attention to the risks containerized shipping presents. After
September 11, 2001, the security of a supply chain has become a major concern to the
public and private sectors. In particular, the ocean segment of a supply chain is most
vulnerable to security threats. More than 90% of world trade involves containers aboard
ships, amounting to about 20 million containers trips annually. For the US, 17,000
containers arrive at US ports each day. Both the government and industries have begun to
examine ways to address the threat of terrorism and the potential of having weapons of
mass destruction (WMD) in materials flowing through a supply chain.
WMD can result in significant loss in human lives, destruction of infrastructure,
and erosion of public and business confidence. Ultimately, global trade and prosperity are
threatened.
1.1 Objectives:
Cargo monitoring system (CMS) is a set of hardware and software that allows
control/monitor containers from the point of departure to final destination. The main
objectives of such system:
Goods safety;
Illegal and smuggled goods control;
Information about cargo traffic and standing;
Real – time monitoring of hazardous and high value goods.
Sometimes it occurs such situations when the containers are loaded with the
illegal goods or unloaded without the owner’s acceptance. In order to avoid such
situations, it is proposed to monitor cargo transit via GPS tracking system. To ensure
Dept of ECE, SSIT, Tumakuru 2014-15 1
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
proper and timely response to the intrusive cargo openings, containers are equipped with
the mobile GPS device and GSM modem. Additionally door opening sensor is mounted
inside the container.
GPS device fixates the coordinates of container and transfers information to the
main server via GSM network at fixed intervals. The user can connect to the graphic user
interface and monitor container traffic as well as door status (was opened or not) with any
computer, connected to the Internet. In case when the door is opened, the alert, composed
of exact time, coordinates and cargo number is sent to the user’s mobile telephone or
email.
1.2 Components of Electronic Cargo Tracking System:
Tracking reader (GPS receiver, RFID reader & GPRS / GSM modem). Electronic seal. CTS software platform
1.3 Implementation:
The CTS is being implemented using Radio Frequency Identification (RFID) and
GPS/GPRS technology. All trucks/vehicles, tankers and containers carrying goods on
transit, exports & under control are fitted with a tracking device and electronic lock
which sends the lock status, truck location and any violation information on real time
basis.
1.4 Problem statement:In addition to ongoing monitoring of the locks and the vehicles, supervisors will use
handheld devices to receive/send all information regarding the freights/containers on-line.
The Cargo Tracking & Protection System presents all freights, containers and vehicle’s
information on a Google Earth, using the GPS location of each component via the GSM
network.
1.5 Existing System:A present technology of locking and monitoring the Cargos does not provide effective
solutions for the situation. A little corruption among the employees can easily deceive the
Dept of ECE, SSIT, Tumakuru 2014-15 2
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Fig.1.1. A Ship carrying cargoes
whole security system. Since these Cargos contains material of high value and in high
quantity , therefore these containers are more prone to the pilferage and to protect the
material we need a sound technique which minimizes the loss due to involvement of the
corrupt employees.
1.6 Proposed System:The proposed solution consists of several complexes while the main ones is:
Cargo tracking solution for monitoring of the goods.
1.7 Working:After loading the materials in the containers the electronic lock is activated. This lock
continuously monitors the global positioning coordinates of the container and sends the
data to the base station if requested.
During the course of the journey the electronic lock cannot be open as it requires a series
of security check before opening. At the destination the driver has to press a button to
acknowledge the completion of journey. When the switch is pressed the lock sends the
current GPS coordinates to the base station. At the base station the received coordinates
are compared with the database to confirm whether the container has reached the right
destination or not. If confirmed correctly it will send the password and ID number of the
driver to the lock and the password to the driver via GSM.
Dept of ECE, SSIT, Tumakuru 2014-15 3
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Then the driver has to prove his identity to the lock by producing a RFID card.
After verifying the correct ID number the lock will ask for password and after verifying
the correct password it will open the electromagnetic lock. Any activity of pilferage in
between the journey can be tracked by sending the GPS coordinates and activation of
alarm immediately. The whole routing of the journey of the container can be traced by
viewing GPS coordinates on the PC at base station using GOOGLE EARTH.
We can extend this project by installing RFID readers to the container which will
count and log the quantity of material coming inside or going inside of the container at
any particular time.
Dept of ECE, SSIT, Tumakuru 2014-15 4
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 2
LITERATURE SURVEY
1 Lecturer Ms. Sarojrani Pattnaik1, Dr. M.S.Khan2
Synergy Institute of Engineering and Technology, Dhenkanal, Orissa, India,
Email: rani_saroj7@yahoomail.com
2 Professor, Synergy Institute of Engineering and Technology, Dhenkanal,
Orissa, India,
Abstract:Prior to September 11, 2001, supply chain security concerns were related to Controlling
theft and reducing contraband such as illegal drugs, illegal immigrants, and export of
stolen goods. But after September 11, 2001, the threat of terrorist attacks has heightened
the need to assure supply chain security. The proposals should be there to create more
confidence in supply chain security, while maintaining smooth flows of goods and
services in a global supply chain. Resulting from security breaches, can be disastrous.
One of the most efficient strategies to ensure supply chain security is to apply the lessons
of successful quality improvement programs. In this paper, an attempt has been made to
describe how the principles of Total Quality Management (TQM) can actually be used to
design and operate processes to assure supply chain security information exchange among
trading partners, ports, shipping companies and the governments nor does it call for
heightened inspection and scrutiny of the goods flowing through a supply chain. The
Quality movement is that the higher quality can be attained at lower cost by proper
management and operational design. The central theme of the quality movement is also
applicable in supply chain security. By using the right management approach, new
technology, and re-engineered operational processes, higher supply chain at lower cost
can also be achieved.
Keywords: Supply Chain; Supply Chain Security; Six Sigma; Total Quality Management:
Dept of ECE, SSIT, Tumakuru 2014-15 5
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Impact of RFID Technology on Tracking of Export Goods in Kenya
Joseph K. Siror*, Liang Guangun, Pang Kaifang, Sheng Huanye, Wang Dong
Computer Science & Engineering,
Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai, 200240, China
josephsiror@gmail.com,liang_guanqun@yahoo.com.cn,
kaifang_pang@gmail.com, hsheng@sjtu.edu.cn, wangdong@cs.sjtu.edu.cn
Abstract -
In this paper the impact of RFID based tracking to address the challenges of
diversion of export goods into the local market in Kenya is discussed. Goods would be
moved out of the export factories on pretext that it was destined to foreign markets,
however, along the way the goods would be dumped and documents falsified to indicate
that goods had left the country, thus evading taxes and gaining unfair advantage. An
RFID based in- Transit Visibility system was designed and piloted to address the
challenges. The system was used to track export cargo from the factories to the port or
frontier offices. The system design, workings and pilot results are discussed in this paper.
Results from the pilot demonstrated that RFID based tracking has a great impact on
curbing diversion and considerable benefits to transporters and other stakeholders thro
Keywords: RFID, Container Tracking, In-Transit Visibility, Real Time Location
Tracking, Cargo Security, Intelligent Tracking ugh increased efficiency and reduced turn-
around
Dept of ECE, SSIT, Tumakuru 2014-15 6
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Creating Resilient and Secure Supply Chains Interim Report of Progress and Learnings August 8, 2003
This report was pre pared by James B. Rice, Jr. of the MIT Centre for
Transportation and Logistics (CTL) and Federico Caniato of Politecnico di Milano for the
Supply Chain Response to Terrorism Project team with contributions from team members
Jonathan Fleck,Deena Disraelly, Don Lowtan, Reshma Lensing and Chris Pickett. This
work was conductedunder the direction of Professor Yossi Sheffi, CTL Director. Please
contact James B. Rice,Jr. of CTL (jrice@mit.edu or 617.258.8584) if you have any
questions or if you would like to discuss this research project was initiated to investigate
how terrorism and the threat of terrorism are affecting supply chains. The project is
entitled “Supply Chain Response to Global Terrorism” to recognize that there have been a
number of different responses which affect a firm’s ability to handle disruptions such as
terrorism. To fully appreciate the impact of the responses on the firm and its supply chain,
the project scope initially entailed studying the response to terrorist attacks (and similar
disruptions)from several different perspectives: the risk management community and
insurance industry response, the U.S. Government response, the response from shippers
and carriers and agents along the supply network, 11 the experience of past disasters, and
the use of real options 12 to assess the potential value of flexibility in supply chain design
in responding to disruption. The research to date has included a broad literature review
from these different perspectives as well as base interviews with 20 firms (primarily
shippers). The data from the interviews and literature review were synthesized and
analyzed into this body of observations and insights. A more detailed review of the
methodology and limitations on the use of the data is report
Dept of ECE, SSIT, Tumakuru 2014-15 7
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
The Detection and Prevention of Cargo Theft
Many companies suffer losses through cargo theft, particularly small businesses, yet it is
an area of business crime that receives scant attention. A single truck load of cargo can be
worth as much as $3 million. The risk of theft, especially if the goods have a black market
value, is very real. Worldwide, the direct cost of cargo theft is estimated at about US$30
billion per year, within direct costs many times higher. Cargo theft occurs in freight-
forwarding yards, warehouses and during transportation in trucks, as airfreight and on
ships. Cargo is particularly vulnerable while in the process of being loaded or unloaded
from trucks, or through documentary fraud. For a small business operating on a just-in-
time basis, the loss of freight may threaten viability—particularly if insurance coveris
inadequate or compensation payments are contested. Further, the illegal saleof stolen
cargo undercuts prices in legitimate businesses. This paper provides an overview of cargo
theft, and discusses some target-hardening, freight forwardingand inventory control
strategies that can be adopted by smaller Organisations to reduce the risks. Cargo theft
creates substantial economic losses, however many incidents are not formally reported
and media attention is rare. Cargo can be stolen either by employees or by external
offenders. The modus operandi can involve hold-ups, theft from freight yards, theft from
containers, theft off trucks, or documentary fraud. The cargo can be legitimately in
transit, already illegally in the possession of other offenders, or being transported in a way
that avoids excise duty or other taxes.
Dept of ECE, SSIT, Tumakuru 2014-15 8
PC GSMMODULESIM900
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 3
SYSTEM DESIGN
3.1 Block Diagram:
Fig.3.1: Base Station
Dept of ECE, SSIT, Tumakuru 2014-15 9
PIC 18LF46K22Microcontroller
GPS MODULE
GSMMODULESIM300
KEYPAD RFID READER
16x2 LCD
Buzzer
ELECTROMAGNETICLOCKING MECHANISM
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Fig.3.2: Block Diagram of the system
Dept of ECE, SSIT, Tumakuru 2014-15 10
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
3.1.1 Cargo Tracking - Electric LockEach container will be sealed with an Electric lock which will monitor the
container location and goods status in order to prevent and alert in case of unauthorized
opening, sabotage or theft. Each lock will contain all shipment details. This information
will be filled by the customs and revenue authorities in the beginning of each journey and
will be read along the way and in the port using a handheld terminal device.
This System aims at providing a sound mechanism to prevent the pilferage in the Cargo
containers by implying an electronic lock and minimizing the human interference in the
security of the Cargo containers.
This mechanism secures the containers by an electronic lock which will require a
series of security check during opening of the lock. The lock is controlled and monitored
by the base station.
3.1.2 LCD DISPLAY (16 X 2)
Alphanumeric displays are used in a wide range of applications, including
palmtop Computers, word processors, photocopiers, point of sale terminals, medical
Instruments, cellular phones, etc. The 16 x 2 intelligent alphanumeric dot matrix Display
is capable of displaying 224 different characters and symbols. A full list of the characters
and symbols is printed on pages 7/8 (note these symbols can vary between brand of LCD
used).
Fig 3.3.: LCD DISPLAY (16 X 2)
Dept of ECE, SSIT, Tumakuru 2014-15 11
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
3.1.3 GPS (Global Positioning System)
The Global Positioning System (GPS) is a space-based satellite navigation system
that provides location and time information in all weather conditions, anywhere on or
near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
The system provides critical capabilities to military, civil and commercial users around
the world. It is maintained by the United States government and is freely accessible to
anyone with a GPS receiver.
The GPS project was developed in 1973 to overcome the limitations of previous
navigation systems, integrating ideas from several predecessors, including a number of
classified engineering design studies from the 1960s. GPS was created and realized by the
U.S. Department of Defence (DoD) and was originally run with 24 satellites. It became
fully operational in 1995.
Each GPS satellite continually broadcasts a signal (carrier frequency with modulation)
that include:
A pseudorandom code (sequence of ones and zeros) that is known to the
receiver. By time-aligning a receiver-generated version and the receiver-
measured version of the code, the time of arrival (TOA) of a defined point in
the code sequence, called an epoch, can be found in the receiver clock time
scale
A message that includes the time of transmission (TOT) of the code epoch (in
GPS system time scale) and the satellite position at that time.
Conceptually, the receiver measures the TOAs (according to its own clock) of four
satellite signals. From the TOAs and the TOTs, the receiver forms four times of flight
(TOF) values, which are (given the speed of light) approximately equivalent to receiver-
satellite range differences. The receiver then computes its three-dimensional position and
clock deviation from the four TOFs.
In practice the receiver position (in three dimensional Cartesian coordinates with
origin at the earth's centre) and the offset of the receiver clock relative to GPS system
time are computed simultaneously, using the navigation equations to process the TOFs.
The receiver's earth-cantered solution location is usually converted
to latitude, longitude and height relative to an ellipsoidal earth model. The height may
Dept of ECE, SSIT, Tumakuru 2014-15 12
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
then be further converted to height relative thegeoids(e.g.,EGM96) (essentially, mean sea
level). These coordinates may be displayed, perhaps on a moving map display and/or
recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person
carrying GPS device).
3.1.4 GSM (Global System for Mobile Communications)
GSM (Global System for Mobile Communications), (originally Groupe Spécial Mobile),
is a standard developed by the European Telecommunications Standards Institute (ETSI)
to describe protocols for second generation (2G) digital cellular networks used by mobile
phones. It is the default global standard for mobile communications with over 90%
market share, and is available in over 219 countries and territories.
The GSM standard was developed as a replacement for first generation (1G)
analogue cellular networks, and originally described a digital, circuit-switched network
optimized for full duplex voice telephony. This was expanded over time to include data
communications, first by circuit-switched transport, then packet data transport
via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM
Evolution
Fig 3.4.: Structure of GSM Network
Dept of ECE, SSIT, Tumakuru 2014-15 13
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Frequency of operation for 2G is 900 MHz or 1800 MHz bands & for 3G it goes up to
2100 MHz.
One of the key features of GSM is the Subscriber Identity Module, commonly
known as a SIM card. The SIM is a detachable smart card containing the user's
subscription information and phone book. This allows the user to retain his or her
information after switching handsets. Alternatively, the user can also change operators
while retaining the handset simply by changing the SIM. Some operators will block this
by allowing the phone to use only a single SIM, or only a SIM issued by them; this
practice is known as SIM locking.
3.1.5 RFID (Radio-frequency identification) Reader
Radio-frequency identification (RFID) is the wireless use of electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects. The tags contain electronically stored information. Some tags are
powered by electromagnetic from magnetic fields produced near the reader. Some types
collect energy from the interrogating radio waves and act as a passive transponder. Other
types have a local power source such as a battery and may operate at hundreds of meters
from the reader. Radio frequency identification (RFID) is one method for Automatic
Identification and Data Capture (AIDC).
RFID tags are used in many industries. An RFID tag attached to an automobile during
production can be used to track its progress through the assembly line. Pharmaceuticals
can be tracked through warehouses. Livestock and pets may have tags injected, allowing
positive identification of the animal.
Since RFID tags can be attached to cash, clothing, possessions, or even implanted
within people, the possibility of reading personally-linked information without consent
has raised serious privacy concerns
A radio-frequency identification system uses tags, or labels attached to the objects
to be identified. Two-way radio transmitter-receivers called interrogators or readers send
a signal to the tag and read its response.
RFID tags can be passive, active or battery-assisted passive. An active tag has an
on-board battery and periodically transmits its ID signal. A battery-assisted passive
Dept of ECE, SSIT, Tumakuru 2014-15 14
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
(BAP) has a small battery on board and is activated when in the presence of an RFID
reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag
uses the radio energy transmitted by the reader. However, to operate a passive tag, it must
be illuminated with a power level roughly a thousand times stronger than for signal
transmission. That makes a difference in interference and in exposure to radiation.
RFID tags contain at least two parts: an integrated circuit for storing and processing
information, modulating and demodulating a radio-frequency (RF) signal, collecting DC
power from the incident reader signal, and other specialized functions; and an antenna for
receiving and transmitting the signal. The tag information is stored in a non-volatile
memory. The RFID tag includes either fixed or programmable logic for processing the
transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The
RFID tag receives the message and then responds with its identification and other
information. This may be only a unique tag serial number, or may be product-related
information such as a stock number, lot or batch number, production date, or other
specific information. Since tags have individual serial numbers, the RFID system design
can discriminate among several tags that might be within the range of the RFID reader
and read them simultaneously.
RFID tags are widely used in identification badges, replacing earlier magnetic
stripe cards. These badges need only be held within a certain distance of the reader to
authenticate the holder. Tags can also be placed on vehicles, which can be read at a
distance, to allow entrance to controlled areas without having to stop the vehicle and
present a card or enter an access
Yard management, shipping and freight and distribution centres use RFID
tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock
identify the owner, identification number and type of equipment and its characteristics.
This can be used with a database to identify the lading, origin, destination, etc. of the
commodities being carried.
In commercial aviation, RFID is used to support maintenance on commercial
aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.
Dept of ECE, SSIT, Tumakuru 2014-15 15
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Some countries are using RFID for vehicle registration and enforcement. RFID can help
detect and retrieve stolen cars.
3.1.6 Electromagnetic Locking Mechanism
An electromagnetic lock, magnetic lock, or maglock is a locking device that
consists of an electromagnet and an armature plate. There are two main types of electric
locking devices. Locking devices can be either "fail safe" or "fail secure". A fail-secure
locking device remains locked when power is lost. Fail-safe locking devices are unlocked
when de-energized. Direct pull electromagnetic locks are inherently fail-safe. Typically
the electromagnet portion of the lock is attached to the door frame and a mating armature
plate is attached to the door. The two components are in contact when the door is closed.
When the electromagnet is energized, a current passing through the electromagnet creates
a magnetic flux that causes the armature plate to attract to the electromagnet, creating a
locking action. Because the mating area of the electromagnet and armature is relatively
large, the force created by the magnetic flux is strong enough to keep the door locked
even under stress.
Typical single door electromagnetic locks are offered in both 600 lbs. and 1200
lbs.The power for an electromagnet lock is DC (Direct Current), around 6 W. The current
is around 0.5 A when the voltage supply is 12 V DC. Generally, the specification of the
electromagnet locks is dual voltages 12/24 V DC
3.1.7 PIC18LF46K22 Microcontroller
The PIC18 microcontroller family provides PIC micro devices in 18- to 80-pin packages
that are both socket and software upwardly compatible to the PIC16 family. The PIC18
family includes all the popular peripherals, such as MSSP, ESCI, CCP, flexible 8- and 16-
bit timers, PSP, 10-bit ADC, WDT, and POR and CAN 2.0B Active for the maximum
flexible solution. Most PIC18 devices will provide FLASH program memory in sizes
from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes; operating from 2.0 to
5.5volts, at speeds from DC to 40 MHz Optimized for high-level languages like ANSI
C, the PIC18 family offers a highly flexible solution for complex embedded applications.
High Performance RISC CPU:
C-Language friendly architecture
PIC16 source code compatible
Linear program memory addressing to 2 Mbyte
Dept of ECE, SSIT, Tumakuru 2014-15 16
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Linear data memory addressing up to 4 Kbytes
Up to 10 MIPs operation:
DC - 40 MHz osc/clock input
4 MHz - 10 MHz clock with PLL active
16-bit wide instructions, 8-bit wide data path
Priority levels for interrupts
8 x 8 Single Cycle Hardware Multiplier
Peripheral Features:
High current sink/source 25 mA/25 mA
Up to four external interrupt pins
Up to three 16-bit timer/counters
Up to two 8-bit timer/counters with 8-bit period
register (time-base for PWM)
Secondary LP oscillator clock option - Timer1
Up to five Capture/Compare/PWM (CCP) modules
CCP pins can be configured as:
Capture input: 16-bit, resolution 6.25 ns (TCY/16)
Compare: 16-bit, max. resolution 100 ns (TCY)
PWM output: PWM resolution is 1- to 10-bit
Max. PWM frequency @: 8-bit resolution = 156 kHz
10-bit resolution = 39 kHz
Master Synchronous Serial Port (MSSP) module
Two modes of operation:
3-wire SPITM (supports all 4 SPI modes)
I2CTM Master and Slave mode
Up to 2 Addressable USART modules (ESCI)
Supports interrupt on Address bit
Parallel Slave Port (PSP) module
Analog Features:
10-bit Analog-to-Digital Converter module (A/D) with:
Fast sampling rate
Up to 16 channels input multiplexor
Conversion available during SLEEP
DNL = ±1 LSb, INL = ±1 LSb
Dept of ECE, SSIT, Tumakuru 2014-15 17
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Programmable Low Voltage Detection (LVD) module
Supports interrupt-on-low voltage detection
Programmable Brown-out Reset (BOR)
Comparators
Special Microcontroller Features:
Oscillator Start-up Timer (OST)
Watchdog Timer (WDT) with its own on-chip RC oscillator
for reliable operation
Programmable code protection
In-Circuit Serial Programming TM (ICSPTM) via two pins
CMOS Technology:
Fully static design
Wide operating voltage range (2.0V to 5.5V)
Industrial and Extended temperature ranges
Power Managed Features:
Internal RC oscillator for ADC operation during SLEEP
SLEEP mode (IPD < 1 µA typ.)
up to 23 individually selectable wake-up events
3 edge selectable wake-up inputs
4 state change wake-up inputs
Internal RC oscillator for WDT (period wake-up)
RAM retention mode (VDD as low as 1.5V)
Dept of ECE, SSIT, Tumakuru 2014-15 18
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 4
SYSTEM IMPLEMENTATION
4.1 Schematics:
Fig 4.1: Schematic of system implementation
Dept of ECE, SSIT, Tumakuru 2014-15 19
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
4.2 Flowchart of the system
Dept of ECE, SSIT, Tumakuru 2014-15 20
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 5
HARDWARE AND SOFTWARE DESCRIPTION
5.1 HARDWARE DESCRIPTION
5.1.1 MICROCONTROLLER
Fig 5.1: PIC18LF46K22
It is the heart of the project, it is the decision maker and it controls all other device
interfaced with it. Here we are using PIC18LF46K22 microcontroller.
PIC18LF4K22 is a 8-bit, 40 Pin, Low-Power, High-Performance Microcontrollers
with XLP Technology. The PIC18 family includes all the popular peripherals, such as
MSSP, ESCI, CCP, flexible 8- and 16-bit timers, PSP, 10-bit ADC, WDT, and POR and
CAN 2.0B Active for the maximum flexible solution. Most PIC18 devices will provide
FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4
Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz Optimized for
high-level languages like ANSI C, the PIC18 family offers a highly flexible solution for
complex embedded applications.
Features:
High Performance RISC CPU:
C-Language friendly architecture
PIC16 source code compatible
Linear program memory addressing to 2 Mbyte
Dept of ECE, SSIT, Tumakuru 2014-15 21
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Linear data memory addressing up to 4 Kbytes
Up to 10 MIPs operation:
DC - 40 MHz osc/clock input
4 MHz - 10 MHz clock with PLL active
16-bit wide instructions, 8-bit wide data path
Priority levels for interrupts
8 x 8 Single Cycle Hardware Multiplier
Peripheral Features:
High current sink/source 25 mA/25 mA
Up to four external interrupt pins
Up to three 16-bit timer/counters
Up to two 8-bit timer/counters with 8-bit period
register (time-base for PWM)
Secondary LP oscillator clock option - Timer1
Up to five Capture/Compare/PWM (CCP) modules
CCP pins can be configured as:
Capture input: 16-bit, resolution 6.25 ns (TCY/16)
Compare: 16-bit, max. resolution 100 ns (TCY)
PWM output: PWM resolution is 1- to 10-bit
Max. PWM frequency @: 8-bit resolution = 156 kHz
10-bit resolution = 39 kHz
Master Synchronous Serial Port (MSSP) module
Two modes of operation:
3-wire SPITM (supports all 4 SPI modes)
I2CTM Master and Slave mode
Up to 2 Addressable USART modules (ESCI)
Supports interrupt on Address bit
Parallel Slave Port (PSP) module
Analog Features:
10-bit Analog-to-Digital Converter module (A/D) with:
Fast sampling rate
Up to 16 channels input multiplexor
Conversion available during SLEEP
DNL = ±1 LSb, INL = ±1 LSb
Dept of ECE, SSIT, Tumakuru 2014-15 22
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Programmable Low Voltage Detection (LVD) module
Supports interrupt-on-low voltage detection
Programmable Brown-out Reset (BOR)
Comparators
Special Microcontroller Features:
Power-on Reset (POR), Power-up Timer (PWRT) and
Oscillator Start-up Timer (OST)
Watchdog Timer (WDT) with its own on-chip RC oscillator
for reliable operation
Programmable code protection
In-Circuit Serial Programming TM (ICSPTM) via two pins
CMOS Technology:
Fully static design
Wide operating voltage range (2.0V to 5.5V)
Industrial and Extended temperature ranges
Power Managed Features:
Dynamically switch to secondary LP oscillator
Internal RC oscillator for ADC operation during SLEEP
SLEEP mode (IPD < 1 µA typ.)
up to 23 individually selectable wake-up events
edge selectable wake-up inputs
4 state change wake-up inputs
Internal RC oscillator for WDT (period wake-up)
RAM retention mode (VDD as low as 1.5V)
Up to 6 more Power Managed modes available on
selected models (PIC18F1320/2320/4320 and PIC18F1220/2220/4220)
Dept of ECE, SSIT, Tumakuru 2014-15 23
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.1 PIN DIAGRAM OF PIC18F46K22
DIP
Fig 5.2 Pin diagram of PIC18LF46K22
Dept of ECE, SSIT, Tumakuru 2014-15 24
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.2 GPS (Global Positioning System):
Fig 5.3: GPS module
The Global Positioning System(GPS) is a space-based satellite navigation system
that provides location and time information in all weather conditions, anywhere on or
near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
The system provides critical capabilities to military, civil and commercial users around
the world. It is maintained by the United States government and is freely accessible to
anyone with a GPS receiver.
GPS has become an efficient tool in the field of scientific use, commerce,
surveillance and tracking. This project presents a small application based on Global
Positioning System. It depicts the use of GPS module/receiver to find latitude and
longitude of its location. The data obtained from GPS receiver (GPGGA sentence) is
processed by the microcontroller to extract its latitude and longitude values.
The GPS module continuously transmits serial data (RS232 protocol) in the form
of sentences according to NMEA standards. The latitude and longitude values of the
location are contained in the GPGGA sentence (refer NMEA format). In this program,
these values are extracted from the GPGGA sentence and are displayed on LCD.
The extraction of location values is done as follows. The first six bytes of the data
received are compared with the pre-stored (GPGGA) string and if matched then only data
is further accounted for; otherwise the process is repeated again. From the comma
delimited GPGGA sentence, latitude and longitude positions are extracted by finding the
respective comma positions and extracting the data. The latitude and longitude positions
Dept of ECE, SSIT, Tumakuru 2014-15 25
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
extracted are displayed on the with. The receiver measures the TOAs (according to its
own clock) of four satellite signals. From the TOAs and the TOTs, the receiver forms
four times of flight (TOF) values, which are (given the speed of light) approximately
equivalent to receiver-satellite range differences. The receiver then computes its three-
dimensional position and clock deviation from the four TOFs.
In practice the receiver position (in three dimensional Cartesian coordinates with
origin at the earth's centre) and the offset of the receiver clock relative to GPS system
time are computed simultaneously, using the navigation equations to process the TOFs.
The receiver's earth-cantered solution location is usually converted
to latitude, longitude and height relative to an ellipsoidal earth model. The height may
then be further converted to height relative the geoids (e.g., EGM96) (essentially, mean
sea level). These coordinates may be displayed, perhaps on a moving map display and/or
recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person
carrying GPS device). Figure 5.4 shows the schematic representation of GPS system.
Fig 5.4: Schematic representation of GPS
Dept of ECE, SSIT, Tumakuru 2014-15 26
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.3 GSM (Global System for mobile):
Fig 5.5: GSM module
Architecture of the GSM Network:
A GSM network is composed of several functional entities, whose functions and
interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM
network can be divided into three broad parts. The Mobile Station is carried by the
subscriber. The Base Station Subsystem controls the radio link with the Mobile Station.
The Network Subsystem, the main part of which is the Mobile services Switching Center
(MSC), performs the switching of calls between the mobile users, and between mobile
and fixed network users. The MSC also handles the mobility management operations. Not
shown is the Operations and Maintenance Center, which oversees the proper operation
and setup of the network. The Mobile Station and the Base Station Subsystem
communicate across the Um interface, also known as the air interface or radio link. The
Base Station Subsystem communicates with the Mobile services Switching Center across
the A interface.
Mobile Station:
The mobile station (MS) consists of the mobile equipment (the terminal) and a
smart card called the Subscriber Identity Module (SIM). The SIM provides personal
mobility, so that the user can have access to subscribed services irrespective of a specific
terminal. By inserting the SIM card into another GSM terminal, the user is able to receive
calls at that terminal, make calls from that terminal, and receive other subscribed services.
The mobile equipment is uniquely identified by the International Mobile Equipment
Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity
(IMSI) used to identify the subscriber to the system, a secret key for authentication, and
Dept of ECE, SSIT, Tumakuru 2014-15 27
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
other information. The IMEI and the IMSI are independent, thereby allowing personal
mobility. The SIM card may be protected against unauthorized use by a password or
personal identity number.
Base Station Subsystem:
The Base Station Subsystem is composed of two parts, the Base Transceiver
Station (BTS) and the Base Station Controller (BSC). These communicate across the
standardized Abis interface, allowing (as in the rest of the system) operation between
components made by different suppliers. The Base Transceiver Station houses the radio
transceivers that define a cell and handles the radio-link protocols with the Mobile
Station. In a large urban area, there will potentially be a large number of BTSs deployed,
thus the requirements for a BTS are ruggedness, reliability, portability, and minimum
cost. The Base Station Controller manages the radio resources for one or more BTSs. It
handles radio-channel setup, frequency hopping, and handovers, as described below. The
BSC is the connection between the mobile station and the Mobile service Switching
Centre (MSC).
Network Subsystem:
The central component of the Network Subsystem is the Mobile services Switching
Centre (MSC). It acts like a normal switching node of the PSTN or ISDN, and
additionally provides all the functionality needed to handle a mobile subscriber, such as
registration, authentication, location updating, handovers, and call routing to a roaming
subscriber. These services are provided in conjunction with several functional entities,
which together form the Network Subsystem. The MSC provides the connection to the
fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the
Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in
ISDN and widely used in current public networks.
GSM modem characteristics: Dual Band or Triband GSM GPRS modem (EGSM 900/1800MHz) / (EGSM
900/1800 / 1900 MHz)
Designed for GPRS, data, fax, SMS and voice applications
Fully compliant with ETSI GSM Phase 2+ specifications (Normal MS)
Input voltage: 8V-40V
Input current: 8mA in idle mode, 150mA in communication GSM 900 @ 12V
Dept of ECE, SSIT, Tumakuru 2014-15 28
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Temperature range: Operating -20 to +55 degree Celsius; Storage -25 to +70
degree Celsius
Overall dimensions: 80mm x 62mm x 31mm / Weight: 200g Interfaces
RS-232 through D-TYPE 9 pin connector
RJ11 voice connector
Power supply through Molex 4 pin connector
SMA antenna connector
Toggle spring SIM holder
Red LED Power on
Green LED status of GSM / GPRS module.
Here is the figure 5.6 which shows the interfacing of GSM with microcontroller.
Fig 5.6: GSM interfaced with microcontroller
Dept of ECE, SSIT, Tumakuru 2014-15 29
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.4 KEYPAD:
Fig 5.7: 4*3 matrix keypad
PIC Microcontrollers provides a library for working with 4*4 keypad. It can also
be used to interface 4*3, 4*2 and 4*1 keypads. In our project we are using 4*3 keypad.
MikroC provides the following three functions to interface Matrix Keypad.
Keypad_Init
Keypad_Key_Press
Keypad_Key_Click
Keypad_Init:
Prototype: void Keypad_Init(void);
It initializes a particular port for working with keypad. A global variable ‘keypad
Port’ must be defined before using this function. Port need to be initialized before calling
this function.
Keypad_Key_Press:
Prototype: char Keypad_Key_Press(void);
This function reads key when a key is pressed and it returns number
corresponding (1 – 16) to the pressed key. If no key is pressed, it will return 0.
Keypad_Key_Click:
Prototype chars Keypad_Key_Click (void);
Dept of ECE, SSIT, Tumakuru 2014-15 30
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
When this function is called, it waits until some key is pressed and released. When
released it returns number corresponding (1 – 16) to the pressed key. If no key is pressed,
it will return 0. If more than one key is pressed, the function waits until all pressed keys
are released and returns number corresponds to first pressed key. Port need to be
initialized before calling this function.
Here is the figure 5.8 that shows the interfacing of keypad with microcontroller.
Fig 5.8: Keypad interfacing with microcontroller
Dept of ECE, SSIT, Tumakuru 2014-15 31
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.5 LCD(LIQUID CRYSTAL DISPLAY):
Fig 5.9: Circuit diagram of LCD
The LCD panel used in this block interfaced with micro-controller through output
port. This is a 16 character X 2Line LCD module, capable of display numbers, characters,
and graphics. The display contains two internal byte-wide registers, one for commands
(RS=0) and the second for character to be displayed (RS=1). It also contains a user
programmed Ram area (the character RAM) character that can be formed using dot
matrix that can be programmed to generate any desired. Two distinguished between these
areas, the hex command byte will be signify that the display RAM address 00h is chosen.
LCD can add a lot to our application in terms of providing a useful interface for
the user, debugging an application or just giving it a “professional” look. The most
common type of LCD controller is the Hitachi 44780 which provides a relatively simple
interface between a processor and an LCD. Using this inter is often not attempted by
inexperienced designers and programmers because it is difficult to find good
documentation on the interface, initializing the interface can be problem and the displays
themselves are expensive.
Connection to a PC parallel port is mostly simple. These displays can handle eight
bit input directly. They also need two extra lines to control which kind of data has just
arrived and when the data is meant to e stable. Those signals are also called RS (Register
Select, instruction or data register) and EN (enable).
Dept of ECE, SSIT, Tumakuru 2014-15 32
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
PIN DETAILS OF LCD:
Pin No. Name DescriptionPin no. 1 VSS Power supply (GND)Pin no. 2 VCC Power supply (+5V)Pin no. 3 VEE Contrast adjust
Pin no. 4 RS 0 = Instruction input1 = Data input
Pin no. 5 R/W 0 = Write to LCD module1 = Read from LCD module
Pin no. 6 EN Enable signalPin no. 7 D0 Data bus line 0 (LSB)Pin no. 8 D1 Data bus line 1Pin no. 9 D2 Data bus line 2Pin no. 10 D3 Data bus line 3Pin no. 11 D4 Data bus line 4Pin no. 12 D5 Data bus line 5Pin no. 13 D6 Data bus line 6Pin no. 14 D7 Data bus line 7 (MSB)Pin no. 15 LED+ Anode of LED for BacklitPin no. 16 LED- Cathode of LED for Backlit
Table No 5.1: Pin Details of LCD
Dept of ECE, SSIT, Tumakuru 2014-15 33
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.6 Relay:
Fig 5.10: Relay
Relay is one of the most important electromechanical devices highly used in
industrial applications specifically in automation. A relay is used for electronic to
electrical interfacing i.e. it is used to switch on or off electrical circuits operating at high
AC voltage using a low DC control voltage. A relay generally has two parts, a coil which
operates at the rated DC voltage and a mechanically movable switch. The electronic and
electrical circuits are electrically isolated but magnetically connected to each other; hence
any fault on either side does not affect the other side.
Relay switch consists of five terminals. Two terminals are used to give the input
DC voltage also known as the operating voltage of the relay. Relays are available in
different operating voltages like 6V, 12V, 24V etc. The rest of the three terminals are
used to connect the high voltage AC circuit. The terminals are called Common, Normally
Open (NO) and Normally Closed (NC). Relays are available in various types & categories
and in order to identify the correct configuration of the output terminals, it is best to see
the data sheet or manual.
Normally Open is connected to12V and normally close is connected to ground. By
the help of a switch, Common is connected either to Normally Open or Normally Close
depending on the condition. Here; in our project we are using five relays, four to rotate
two motors in clock wise and anticlockwise direction which is connected with two
containers and one relay with another motor which is connected with belt. Motor is
connected to common terminal of relay. Out of two terminals of input DC one is
connected to ULN2803.
Dept of ECE, SSIT, Tumakuru 2014-15 34
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
When there is voltage difference between two terminals, i.e. one terminal of
ULN2003 and another with operating voltage of relay then the EMF is induced in
between them and the Common is connected to Normally Open.
When there is no voltage difference between one terminal of ULN2003 and another
terminal of operating voltage of relay then no EMF is induced in between them and the
Common is connected to Normally Close.
Relay circuit:
Relay circuit is used to activate the relay through microcontroller. In this circuit
we have to use a Darlington transistor (Tip122) for switch on the relay. The relay is an
electromagnetic device which energies when the supply is given. In this circuit, relay is
working in the positive logic. That means when the microcontroller gives high to the
relay circuit the Darlington transistor is switched on and also the relay is ON. When the
microcontroller gives low to the relay circuit the Darlington transistor is switched off and
also the relay is OFF. The two diodes are used for protecting the microcontroller from the
load due to back EMF and EMI problems.
Fig 5.11: Circuit diagram of relay
Dept of ECE, SSIT, Tumakuru 2014-15 35
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.7 RFID (Radio-frequency identification) Reader:
Fig 5.12: RFID
Radio-frequency identification (RFID) is the wireless use of electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects. The tags contain electronically stored information. Some tags are
powered by electromagnetic from magnetic fields produced near the reader. Some types
collect energy from the interrogating radio waves and act as a passive transponder. Other
types have a local power source such as a battery and may operate at hundreds of meters
from the reader. Unlike a barcode, the tag does not necessarily need to be within line of
sight of the reader, and may be embedded in the tracked object. Radio frequency
identification (RFID) is one method for Automatic Identification and Data
Capture (AIDC).
RFID tags are used in many industries. An RFID tag attached to an automobile
during production can be used to track its progress through the assembly line.
Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags
injected, allowing positive identification of the animal.
Since RFID tags can be attached to cash, clothing, possessions, or even implanted
within people, the possibility of reading personally-linked information without consent
has raised serious privacy concerns A radio-frequency identification system uses tags,
or labels attached to the objects to be identified. Two-way radio transmitter-receivers
called interrogators or readers send a signal to the tag and read its response.
RFID tags can be passive, active or battery-assisted passive. An active tag has an
on-board battery and periodically transmits its ID signal. A battery-assisted passive
(BAP) has a small battery on board and is activated when in the presence of an RFID
Dept of ECE, SSIT, Tumakuru 2014-15 36
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag
uses the radio energy transmitted by the reader. However, to operate a passive tag, it must
be illuminated with a power level roughly a thousand times stronger than for signal
transmission. That makes a difference in interference and in exposure to radiation.
Tags may either be read-only, having a factory-assigned serial number that is used
as a key into a database, or may be read/write, where object-specific data can be written
into the tag by the system user. Field programmable tags may be writing-once, read-
multiple; "blank" tags may be written with an electronic product code by the user.
RFID tags contain at least two parts: an integrated circuit for storing and
processing information, modulating and demodulating a radio-frequency (RF) signal,
collecting DC power from the incident reader signal, and other specialized functions; and
an antenna for receiving and transmitting the signal. The tag information is stored in a
non-volatile memory. The RFID tag includes either fixed or programmable logic for
processing the transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The
RFID tag receives the message and then responds with its identification and other
information. This may be only a unique tag serial number, or may be product-related
information such as a stock number, lot or batch number, production date, or other
specific information. Since tags have individual serial numbers, the RFID system design
can discriminate among several tags that might be within the range of the RFID reader
and read them simultaneously.
RFID tags are widely used in identification badges, replacing earlier magnetic
stripe cards. These badges need only be held within a certain distance of the reader to
authenticate the holder. Tags can also be placed on vehicles, which can be read at a
distance, to allow entrance to controlled areas without having to stop the vehicle and
present a card or enter an access
Yard management, shipping and freight and distribution centers use RFID
tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock
identify the owner, identification number and type of equipment and its characteristics.
This can be used with a database to identify the lading, origin, destination, etc. of the
commodities being carried.
Dept of ECE, SSIT, Tumakuru 2014-15 37
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
In commercial aviation, RFID is used to support maintenance on commercial
aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.
Some countries are using RFID for vehicle registration and enforcement. RFID can help
detect and retrieve stolen cars.
Dept of ECE, SSIT, Tumakuru 2014-15 38
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.1.8 BUZZER:
Fig 5.13: Buzzer
A buzzer or beeper is an audio signalling device, which may be mechanical,
electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm
devices, timers and confirmation of user input such as a mouse click or keystroke. A
piezoelectric element may be driven by an oscillating electronic circuit or other audio
signal source, driven with a piezoelectric audio amplifier. Sounds commonly used to
indicate that a button has been pressed are a click, a ring or a beep.
Dept of ECE, SSIT, Tumakuru 2014-15 39
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
5.2 SOFTWARE DESCRIPTION5.2.1 Embedded C:
An embedded system is n application that contains at least one programmable
computer (typically in the form of microcontroller, a microprocessor or digital signal
processor chip) and which is used by individuals who are; in the main unaware that the
system is computer-based.in embedded C this can be done using specific inbuilt
instruction. Embedded C is controller or target specific. It allows direct communication
with memory.
5.2.2 MPLAB IDE:
MPLAB IDE is a software program that runs on a PC to develop application for
Microchip microcontroller. It is called an Integrated Development Environment, or IDE,
because it provide a single integrated environment to develop code for embedded
microcontrollers. A development system for embedded controllers is a system of
programs running on a desktop PC to help write, debug and program code. The
intelligence of embedded system applications into a microcontroller. MPLAB IDE runs
on a PC and contains all components needed to design and deploy embedded system
application.
Dept of ECE, SSIT, Tumakuru 2014-15 40
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 6
RESULT AND TESTING
6.1 Result:
While testing of this project it was found that electronic door was being locked
after loading the cargo. Then while reaching to the destination, exact location was sent to
the base station. Base station sent a random password to the vehicle & authorized person
GSM mobile after verifying the coordinates. After scanning an authorized RFID card
same password was entered and if password correct door was open.
6.2 Testing:
Fig6.1: Booting of the system
Fig: 6.2: Welcome Screen of the system
Fig6.3: After loading press switch message being displayed
Dept of ECE, SSIT, Tumakuru 2014-15 41
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Fig6.4 Electromagnetic door has been locked
Fig 6.5 Request has been sent to the base station along with exact coordinate
Dept of ECE, SSIT, Tumakuru 2014-15 42
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Fig 6.6: VB giving an exact location of cargo with the help of GSM & GPS
Dept of ECE, SSIT, Tumakuru 2014-15 43
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 7
ADVANTAGES AND LIMITATIONS
7.1 ADVANTAGES
The proposed system has following Advantages.
Use of information to identify compliant stakeholders in the industry.
Platform for exchange of information with other Government agencies.
Develop improved risk assessment systems.
Serve as data sources and as a data exchange tool for Regional cargo tracking.
Maximize revenue collection due to,
Anti-dumping/diversion of transit, export, excisable export goods;
Fast movement of goods along the Kenya supply chain;
Elimination of non-tariff barriers to trade and traffic;
Reduction of corruption cases and promotion of integrity
Increased the level of security of monitored goods.
Fast movement of goods and conveyances along the corridors.
Improve voluntary levels of compliance low cost of compliance
7.2 LIMITATIONSThe proposed system has following Limitations
System knowledge and commitment among the users. (Training)
Maintenance and capacity challenges
Hardware failures, Systems integration
Dept of ECE, SSIT, Tumakuru 2014-15 44
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 8
APPLICATIONS
Direct Benefits to Private Firms Improved reliability and service quality, usually thought of as tools
to retain good customers and grow market share and revenue.
Improved shipment and container integrity, built around a core of
security issues.
Direct Public Sector Benefits Increased Greater national security
Improved safety
Dept of ECE, SSIT, Tumakuru 2014-15 45
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
CHAPTER 9
CONCLUSION FUTURE ENHANCEMENT
9.1 ConclusionLogistic Companies will benefit greatly with the full Implementation of the
Electronic Cargo Tracking System. With a comprehensive solution for the
monitoring of transit cargo, its status, location and other pertinent information
about it in real time, hence securing the Supply chain.
9.2 Future Enhancement With the implementation of this project Logistic companies will benefit
greatly.
Insurance companies will have to pay fewer claims to logistic companies
as there will be decrease in number of loss of cargoes.
Will the further development in project it can help in preventing human
trafficking through as well.
Dept of ECE, SSIT, Tumakuru 2014-15 46
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
REFERENCES
Websites referred:
http://www.raviyp.com/embedded/183-sim900-sim908-gsm-module-autobaud-solution
Journals & Books Referred:
[1] Fleischer P.B., Nelson A.Y.,Sowah R.A.,Bremang, A., “Designand
development of GPS/GSM basedvehicle tracking
andalertsystemforcommercialinter-city buses”,Adaptive Science&Technology
(ICAST),2012IEEE 4thInternational Conference on:25-27Oct.2012Page(s):1–
6
[2] GaneshG.S.P,BalajiB,VaradhanT.A.S,“Anti-thefttracking
systemforautomobiles(autogsm)Fulltextsign-Inor Purchase”, Anti-
Counterfeiting,SecurityandIdentification(ASID),2011
IEEEInternationalConferenceon24-26June2011Page(s):17–19
[3] ZhigangLiu, AnqiZhang, ShaojunLi, “Vehicleanti-theft
trackingsystembasedonInternetof things”,Vehicular Electronics and Safety
(ICVES), 2013 IEEE InternationalConference on2013,Page(s): 48–52
[4] HuiSong,SencunZhu,GuohongCao,“SVATS:ASensor- Network-
BasedVehicleAnti-theftsystem”,INFOCOM2008.The 27thConference
onComputer Communications.IEEE
[5] BaburaoKodavati,V.K.Raju, S.SrinivasaRao, A.V.Prabu, T.Appa
Rao,Dr.Y.V.Narayana “GPSBasedAutomatic
VehicleTrackingUsingRFID”,InternationalJournal of Engineering Research
and Applications , Vol. 1, Issue 3, pp.616-62.
[6] DevyaniBajaj,NeeleshGupt,“GSMandGPSbasedvehicle
locationandtrackingsystem”,International Journal of Engineering and
Innovative Technology (IJEIT) Volume 1,Issue 1,January2012
[7] Mrs.Ramyakulandaivel,P.Ponmalar,B.Geetha,G.Saranya, “GPS and GSM
based vehicle information system”, International Journal of Communications
and EngineeringVolume 01–No.1,Issue:01March 2012.
Dept of ECE, SSIT, Tumakuru 2014-15 47
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
[8] DeepakMishra,Apurv Vas,PuneetTandon,“A novelandcost
effectiveapproachtopublic vehicletrackingsystem”,
InternationalJournalofubicomp(IJU),Vol.3,No.1,January2012.
[9] RuchikaGuptaandBVRReddy,“GPSandGPRSBasedCostEffective Human
TrackingSystem UsingMobilePhones”,Volume 2January-June 2011.
[10] MohammadA.Al-Khedher,“HybridGPS-GSMLocalization of
AutomobileTracking System”,InternationalJournal of
ComputerScience&InformationTechnology (IJCSIT)Vol3, No 6,Dec 2011.
[11] FrancisEnejoIdachaba“DesignofaGPS/GSMbasedtrackerfor the location of
stolen items and kidnapped or missing personsinNIGERIA”,ARPNJournal of
Engineeringand Applied Sciences VOL.6,NO.10,OCTOBER 2011.
[12] AdnanI.Yaqzan,IssamW.Damaj,andRachedN.Zantout“GPS-based
VehicleTrackingSystem-on-Chip”,Proceedings of
theWorldCongressonEngineering 2008VolI WCE2008, July2-
4,2008,London,U.K.
[13] T.KrishnaKishore,T.SasiVardhan,N.LakshmiNarayana,“Vehicle Tracking
Using a Reliable Embedded Data Acquisition SytemWithGPS
andGSM”,IJCSNSInternational
JournalofComputerScienceandNetworkSecurity,VOL.10No.2, February2010
[14] S.S Pethakar, N Srivastava and S.D Suryawanshi. Article:
“GPSandGSMbased Vehicle Tracing andEmployeeSecurity System”,
InternationalJournal ofComputerApplications62(6):37-42, January
2013.Published byFoundation ofComputer Science, New York, USA.
Dept of ECE, SSIT, Tumakuru 2014-15 48
top related