SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 296
RFID BASED AUTOMATED BANK LOCKER SYSTEM
Swetha J1
1
Department of Electronics and Communication Engineering, PSG College of Technology, Coimbatore, India
Abstract
Banks provide locker system for their customers for safekeeping. In the current locker system, there is no separate banker to take care
and attend to people wishing to access lockers. Every tim a customer wishes to access his locker, he must wait until a banker becomes
free so that he can authenticate access to the locker. This results in waste of time for both the banker as well as the customer, as the
customer has to wait until the banker becomes free and the banker has to stop his work and attend to the customer. This project aims
to change the existing system and automate the locker system using RFID tags for customer identification. Every customer is given a
unique RFID card with a unique number so that the customer can be identified and access can be granted to the customer’s locker.
Keywords—RFID tag, RFID based locker, automated locker, time saving, easy access, 8051 microcontroller.
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In the recent years, in spite of increased security and protection
in banks, there are many thefts happening in banks. As the
technology keeps growing, the need for safe and secure lockers
keeps growing. The solution to this problem can be met with
this project. It greatly reduces the waiting time and increases
the security.
2. EXISTING SCENARIOS
In most of the banks, the locker systems involve manual lock.
Whenever the user wishes the use the locker, he should be
assisted by the bank employee which leads to waste of time for
both the customer and the employee. The major drawbacks of
such manual lock systems are lack of security and the waiting
time of the customers. It should be noted that the person
accompanying the customer can be any employee who is free at
that instant of time. Solely, time is wasted. This can be
overcome by any automatic locker system. There are many
techniques in which this can be implemented. In this project,
RFID tags are used which holds the user’s information like
locker number, username, etc, this RFID tag when read by the
RFID reader will automatically open and close the locker.
Thereby, security is guaranteed and the customers waiting time
is drastically reduced.
3. METHODS USED
RFID technology is the fast growing technology in the recent
years. RFID is similar to bar code technology but uses the radio
waves to capture the data from the tags rather than optical
scanning. One of the key characteristics of RFID is that it does
not require any tag or label to be seen to read it’s stored data.
The RFID system interfaced with microcontroller requires the
controller to continuously scan the input from the RFID reader.
RFID reader module is also called as interrogator. They convert
the radio waves returned from the RFID tag into a form tat can
be passed on to controllers, which can make use of it. RFID
system consists of two separate components: a tag and a reader.
Tags are analogous to barcode labels and reader functions
similarly to barcode scanners.
4. ARCHITECTURE OF THE SYSTEM
Fig 1 Block Diagram for the System
From the block diagram, it can be seen that RFID reader is
interfaced to port 3.0. TXD of RFID reader is connected to
RXD pin (port 3.0) of AT89S51. RFID tags when read by the
reader will display the relevant information on LCD.LCD is
interfaced to the microcontroller through port 2. The LCD is
used for displaying the user’s ID and status of the locker. In this
project, we have considered two customers whose lockers are
being controlled by stepper motor 1 and stepper motor 2. User 1
stepper motor is interfaced to lower bits of port 0 and user 2
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 297
stepper motor is interfaced to the upper bits of port 0. When
user 1 is granted access, stepper motor 1 will rotate in
anticlockwise direction which indicates the locker is opened.
Similarly, when user 2 is granted access, stepper motor 2 will
rotate in anticlockwise direction which indicates the locker is
opened. Whenever the user is done with his work, he will close
his locker by pressing the corresponding switch provided. This
will automatically enable the lock. Two switches are interfaced
to port 1.4 and 1.5 respectively.
5. HARDWARE COMPONENTS
5.1 AT89S51 Microcontroller
The AT89S51 is a low power, high performance CMOS 8-bit
microcontroller with 4K bytes of In-system programmable flash
memory. The device is manufactured using Atmel’s high non-
volatile memory technology and is compatible with the industry
standard 80C51 instruction set and pin out. The on-chip flash
allows the program memory to be reprogrammed in-system or
by a conventional non-volatile memory programmer. The
AT89S51 provides the following standard features: 4K bytes of
Flash, 128 bytes of RAM, 32 I/O lines, Watchdog timer, two
data pointers, two 16-bit timer/counters, a five-vector two-level
interrupt architecture, a full duplex serial port, on-chip
oscillator, and clock circuitry. In addition, the AT89S51 is
designed with static logic for operation down to zero frequency
and supports two software selectable power saving modes. The
Idle Mode stops the CPU while allowing the RAM,
timer/counters, serial port, and interrupt system to continue
functioning. The Power-down mode saves the RAM contents
but freezes the oscillator, disabling all other chip functions until
the next external interrupt or hardware reset. The datasheet for
AT89S51 is also enclosed.
Fig 2 AT89S51 Microcontroller
5.2 RFID Module and RFID Tag
RFID stands for Radio frequency identification. It is an
automatic identification technology where digital data encoded
in an RFID tag is read by the RFID reader. An RFID system
consists of a reader device and a tag (transponder). A tag has a
unique serial number which is identified by the reader. In this
project, RFID has been interfaced with microcontroller to
provide secured access. The relevant messages are also
displayed on a 16x2 LCD.
RFID Reader Module, are also called as interrogators. They
convert radio waves returned from the RFID tag into a form
that can be passed on to Controllers, which can make use of it.
RFID tags and readers have to be tuned to the same frequency
in order to communicate. RFID systems use many different
frequencies. The tag contains an antenna connected to a small
microchip. The reader functions similarly to a barcode scanner;
however, while a barcode scanner uses a laser beam to scan the
barcode, an RFID scanner uses electromagnetic waves. To
transmit these waves, the reader uses an antenna that transmits a
signal, communicating with the tags antenna. The tags antenna
receives data from the reader and transmits its particular chip
information to the reader. The data on the chip is usually stored
in one of two types of memory. The most common is Read-
Only Memory (ROM) as its name suggests, read-only memory
cannot be altered once programmed onto the chip during the
manufacturing process. The second type of memory is
Read/Write Memory; though it is also programmed during the
manufacturing process, it can later be altered by certain devices.
Fig 3 RFID Module
Fig 4 RFID Tags
5.3 Stepper Motor
A stepper motor (or step motor) is a brushless DC electric
motor that divides a full rotation into a number of equal steps.
The motor's position can then be commanded to move and hold
at one of these steps without any feedback sensor (an open-loop
controller), as long as the motor is carefully sized to the
application. The use of stepper motor in this project is to mimic
the locker operation.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 298
Fig 5 Stepper Motor
5.4 Liquid Crystal Display
LCD (Liquid Crystal Display) screen is an electronic module
used in a wide range of applications. A 16x2 LCD is a very
basic module and is very common in various devices and
circuits. They are preferred over seven segment displays. There
are many advantages when compared to seven segment
displays. They are: LCDs can display characters, numbers and
even graphics. There are refreshing controllers present inside
the LCDs so 8051 need not refresh the displays. It is cost
efficient and the current dissipation is low.
Fig 6 Liquid Crystal Display
6. ALGORITHM AND WORKING OF THE
SYSTEM
Step 1: Start
Step 2: Wait until RFID card is detected.
Step 3: Read card data and identify the customer.
Step 4: Unlock the locker corresponding to the customer.
Step 5: Wait until the customer locks the locker.
Step 6: Repeat from step 2.
Fig 7 Working Model
Initially, when the connections are given and when the entire
model is switched on, a message is displayed on the LCD
“CUSTOMER ID:”. When the RFID tag is brought into the
sensing area, the RFID reader reads the data (user ID) form the
tag and displays the ID on the screen. The microcontroller
AT89S51 process the data i.e. identifies whether it is user 1 or
user 2 and allows access to the corresponding user. For
example, if user 1 is granted access, then the stepper motor 1
will rotate in anticlockwise direction which indicates that locker
1 is opened and the user 1 can use it. The message displayed on
the LCD is “LOCKER 1 OPENED”. As soon as the user has
completed his work, he will press the switch 1. The control
goes to the stepper motor 1 and it will rotate in the clockwise
direction which indicates that the lock has been enabled. The
corresponding message displayed is “LOCKER 1 CLOSED”.
The control again to the beginning where the message will once
again be displayed as “CUSTOMER ID:”. An important point
to be noted is that at any instant during this process, if user 2
wishes to access the locker, he will be denied access. This
process works in a similar way for user 2. If user 2 is granted
access, then the stepper motor 2 will rotate in anticlockwise
direction which indicates that locker 2 is opened and the user 2
can use it. The message displayed on the LCD is “LOCKER 2
OPENED”. As soon as the user has completed his work, he will
press the switch 2. The control goes to the stepper motor 2 and
it will rotate in the clockwise direction which indicates that the
lock has been enabled. The corresponding message displayed is
“LOCKER 2 CLOSED”. The control again to the beginning
where the message will once again be displayed as
“CUSTOMER ID:”.
7. CONCLUSIONS
This projct is mainly aimed at reducing banker’s workload.
Time is considerably saved by this RFID based automated bank
locker system as there is no need for any authentication by the
bank employee. As this project is implemented using siftware
tools Keil µVision, the outputs can be easily checked before
they are embedded on the hardware. This project has the potuts
can be easily checked before they are embedded on the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 299
hardware. This project has the potentiaal to greatly reduce the
manpower required during the access of bank lockers by the
customers and also greatly saves time for both the banker and
the customer. This project can be extended for more number of
customers and banks by using RFID cards with identification
numbers of more length.
ACKNOWLEDGEMENTS
I would like to express my sincere gratitude and profound
thanks to Dr.R.Rudramoorthy, Principal, PSG College of
Technology for his inevitable encouragement and support,
Dr.S.Subha Rani, Professor and Head, Department of
Electronics and Communication Engineering, my faculty guide,
Dr.K.V.Anusuya, Assistant Professor, Department of
Electronics and Communication Engineering.
REFERENCES
[1] Raj Kamal, Embedded Systems: Architecture,
Programming And Design, 2008 edition, published by
McGraw Hill Education Private Limited.
[2] Mazidi Muhammed Ali, The 8051 Microcontroller And
Embedded Systems Using Assembly And C, second
edition, published by Pearson education.
[3] Kenneth J. Ayala, The 8051 Microcontroller, 2004
edition.
[4] Deepak Gupta EM Magazine, RFID Interface To 8051.

Más contenido relacionado

La actualidad más candente

Bi directional visitor counter rewat
Bi directional visitor counter   rewatBi directional visitor counter   rewat
Bi directional visitor counter rewat
vishwesh sharma
 
Digital Alarm Clock 446 project report
Digital Alarm Clock 446 project reportDigital Alarm Clock 446 project report
Digital Alarm Clock 446 project report
Akash Mhankale
 
Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot ppt
Varun B P
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
avinash yada
 
Automatic room temperature control
Automatic room temperature controlAutomatic room temperature control
Automatic room temperature control
debabratrath
 

La actualidad más candente (20)

Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Bi directional visitor counter rewat
Bi directional visitor counter   rewatBi directional visitor counter   rewat
Bi directional visitor counter rewat
 
Patient Health Monitoring System Using Arduino & ESP8266
Patient Health Monitoring System Using Arduino & ESP8266Patient Health Monitoring System Using Arduino & ESP8266
Patient Health Monitoring System Using Arduino & ESP8266
 
automatic railway gate controll using ir sensor
automatic railway gate controll using ir sensorautomatic railway gate controll using ir sensor
automatic railway gate controll using ir sensor
 
A bi directional visitors counter
A bi directional visitors counterA bi directional visitors counter
A bi directional visitors counter
 
Automatic fire fighting robot
Automatic fire fighting robotAutomatic fire fighting robot
Automatic fire fighting robot
 
Mayank_Bluetooth Controlled Lock
Mayank_Bluetooth Controlled LockMayank_Bluetooth Controlled Lock
Mayank_Bluetooth Controlled Lock
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECGIOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
IOT BASED HEALTH MONITORING BY USING PULSE OXIMETER AND ECG
 
Digital Alarm Clock 446 project report
Digital Alarm Clock 446 project reportDigital Alarm Clock 446 project report
Digital Alarm Clock 446 project report
 
Watch dog
Watch dogWatch dog
Watch dog
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot ppt
 
Arduino Base Door Automation System.ppt
Arduino Base Door Automation System.pptArduino Base Door Automation System.ppt
Arduino Base Door Automation System.ppt
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
Bidirectional Visitor Counter using IR sensors and Arduino Uno R3Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
 
Automatic room temperature control
Automatic room temperature controlAutomatic room temperature control
Automatic room temperature control
 

Destacado

Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
ramesh chatty
 
rfid based traffic control system by using gsm
rfid based traffic control system by using gsmrfid based traffic control system by using gsm
rfid based traffic control system by using gsm
ramesh chatty
 

Destacado (20)

Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
public transport system using RFID and GSM
public transport system using RFID and GSMpublic transport system using RFID and GSM
public transport system using RFID and GSM
 
Rfid based traffic controller using gsm
Rfid based traffic controller using gsmRfid based traffic controller using gsm
Rfid based traffic controller using gsm
 
Banking locker security using Image processing
Banking locker security using Image processingBanking locker security using Image processing
Banking locker security using Image processing
 
rfid based traffic control system by using gsm
rfid based traffic control system by using gsmrfid based traffic control system by using gsm
rfid based traffic control system by using gsm
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Automatic identification of animal using visual and motion saliency
Automatic identification of animal using visual and motion saliencyAutomatic identification of animal using visual and motion saliency
Automatic identification of animal using visual and motion saliency
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...
 
Matlab based comparative studies on selected mppt
Matlab based comparative studies on selected mpptMatlab based comparative studies on selected mppt
Matlab based comparative studies on selected mppt
 
An experiental investigation of effect of cutting parameters and tool materia...
An experiental investigation of effect of cutting parameters and tool materia...An experiental investigation of effect of cutting parameters and tool materia...
An experiental investigation of effect of cutting parameters and tool materia...
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
A survey on ranking sql queries using skyline and user
A survey on ranking sql queries using skyline and userA survey on ranking sql queries using skyline and user
A survey on ranking sql queries using skyline and user
 
Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...
 
Intelligent pollution monitoring using wireless
Intelligent pollution monitoring using wirelessIntelligent pollution monitoring using wireless
Intelligent pollution monitoring using wireless
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
Analysis effect of drilling parameters on hole
Analysis effect of drilling parameters on holeAnalysis effect of drilling parameters on hole
Analysis effect of drilling parameters on hole
 
Survey on traditional and evolutionary clustering
Survey on traditional and evolutionary clusteringSurvey on traditional and evolutionary clustering
Survey on traditional and evolutionary clustering
 

Similar a Rfid based automated bank locker system

Parking Lot Security System using RFID Technology
Parking Lot Security System using RFID TechnologyParking Lot Security System using RFID Technology
Parking Lot Security System using RFID Technology
ijtsrd
 
12.automatic toll gate billing system using rfid.
12.automatic toll gate billing system using rfid.12.automatic toll gate billing system using rfid.
12.automatic toll gate billing system using rfid.
Sai Krishna
 

Similar a Rfid based automated bank locker system (20)

IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerDesign and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
 
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
IRJET- Smart Monitoring System for Industrial Automation (IoT Based)
 
RFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket AutomationRFID Based Smart Trolley for Supermarket Automation
RFID Based Smart Trolley for Supermarket Automation
 
Sdfgh
SdfghSdfgh
Sdfgh
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
Parking Lot Security System using RFID Technology
Parking Lot Security System using RFID TechnologyParking Lot Security System using RFID Technology
Parking Lot Security System using RFID Technology
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
AUTOMATED PETROL PUMP USING RFID TECHNOLOGY
AUTOMATED PETROL PUMP USING RFID TECHNOLOGYAUTOMATED PETROL PUMP USING RFID TECHNOLOGY
AUTOMATED PETROL PUMP USING RFID TECHNOLOGY
 
12.automatic toll gate billing system using rfid.
12.automatic toll gate billing system using rfid.12.automatic toll gate billing system using rfid.
12.automatic toll gate billing system using rfid.
 
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 
Rotary RFID Parking Management Solution Controlled By Microcontroller
Rotary RFID Parking Management Solution Controlled By MicrocontrollerRotary RFID Parking Management Solution Controlled By Microcontroller
Rotary RFID Parking Management Solution Controlled By Microcontroller
 
Rotary RFID Parking Management Solution Controlled By Microcontroller
Rotary RFID Parking Management Solution Controlled By MicrocontrollerRotary RFID Parking Management Solution Controlled By Microcontroller
Rotary RFID Parking Management Solution Controlled By Microcontroller
 
Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)Mypptinslideshare 180508104046 (1)
Mypptinslideshare 180508104046 (1)
 
IRJET - RFID based Petrol Pump Automation System
IRJET - RFID based Petrol Pump Automation SystemIRJET - RFID based Petrol Pump Automation System
IRJET - RFID based Petrol Pump Automation System
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
IRJET- RFID based Authentication and Access of Vehicles
IRJET-  	  RFID based Authentication and Access of VehiclesIRJET-  	  RFID based Authentication and Access of Vehicles
IRJET- RFID based Authentication and Access of Vehicles
 

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 

Rfid based automated bank locker system

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 296 RFID BASED AUTOMATED BANK LOCKER SYSTEM Swetha J1 1 Department of Electronics and Communication Engineering, PSG College of Technology, Coimbatore, India Abstract Banks provide locker system for their customers for safekeeping. In the current locker system, there is no separate banker to take care and attend to people wishing to access lockers. Every tim a customer wishes to access his locker, he must wait until a banker becomes free so that he can authenticate access to the locker. This results in waste of time for both the banker as well as the customer, as the customer has to wait until the banker becomes free and the banker has to stop his work and attend to the customer. This project aims to change the existing system and automate the locker system using RFID tags for customer identification. Every customer is given a unique RFID card with a unique number so that the customer can be identified and access can be granted to the customer’s locker. Keywords—RFID tag, RFID based locker, automated locker, time saving, easy access, 8051 microcontroller. -----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION In the recent years, in spite of increased security and protection in banks, there are many thefts happening in banks. As the technology keeps growing, the need for safe and secure lockers keeps growing. The solution to this problem can be met with this project. It greatly reduces the waiting time and increases the security. 2. EXISTING SCENARIOS In most of the banks, the locker systems involve manual lock. Whenever the user wishes the use the locker, he should be assisted by the bank employee which leads to waste of time for both the customer and the employee. The major drawbacks of such manual lock systems are lack of security and the waiting time of the customers. It should be noted that the person accompanying the customer can be any employee who is free at that instant of time. Solely, time is wasted. This can be overcome by any automatic locker system. There are many techniques in which this can be implemented. In this project, RFID tags are used which holds the user’s information like locker number, username, etc, this RFID tag when read by the RFID reader will automatically open and close the locker. Thereby, security is guaranteed and the customers waiting time is drastically reduced. 3. METHODS USED RFID technology is the fast growing technology in the recent years. RFID is similar to bar code technology but uses the radio waves to capture the data from the tags rather than optical scanning. One of the key characteristics of RFID is that it does not require any tag or label to be seen to read it’s stored data. The RFID system interfaced with microcontroller requires the controller to continuously scan the input from the RFID reader. RFID reader module is also called as interrogator. They convert the radio waves returned from the RFID tag into a form tat can be passed on to controllers, which can make use of it. RFID system consists of two separate components: a tag and a reader. Tags are analogous to barcode labels and reader functions similarly to barcode scanners. 4. ARCHITECTURE OF THE SYSTEM Fig 1 Block Diagram for the System From the block diagram, it can be seen that RFID reader is interfaced to port 3.0. TXD of RFID reader is connected to RXD pin (port 3.0) of AT89S51. RFID tags when read by the reader will display the relevant information on LCD.LCD is interfaced to the microcontroller through port 2. The LCD is used for displaying the user’s ID and status of the locker. In this project, we have considered two customers whose lockers are being controlled by stepper motor 1 and stepper motor 2. User 1 stepper motor is interfaced to lower bits of port 0 and user 2
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 297 stepper motor is interfaced to the upper bits of port 0. When user 1 is granted access, stepper motor 1 will rotate in anticlockwise direction which indicates the locker is opened. Similarly, when user 2 is granted access, stepper motor 2 will rotate in anticlockwise direction which indicates the locker is opened. Whenever the user is done with his work, he will close his locker by pressing the corresponding switch provided. This will automatically enable the lock. Two switches are interfaced to port 1.4 and 1.5 respectively. 5. HARDWARE COMPONENTS 5.1 AT89S51 Microcontroller The AT89S51 is a low power, high performance CMOS 8-bit microcontroller with 4K bytes of In-system programmable flash memory. The device is manufactured using Atmel’s high non- volatile memory technology and is compatible with the industry standard 80C51 instruction set and pin out. The on-chip flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. The AT89S51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, two 16-bit timer/counters, a five-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S51 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next external interrupt or hardware reset. The datasheet for AT89S51 is also enclosed. Fig 2 AT89S51 Microcontroller 5.2 RFID Module and RFID Tag RFID stands for Radio frequency identification. It is an automatic identification technology where digital data encoded in an RFID tag is read by the RFID reader. An RFID system consists of a reader device and a tag (transponder). A tag has a unique serial number which is identified by the reader. In this project, RFID has been interfaced with microcontroller to provide secured access. The relevant messages are also displayed on a 16x2 LCD. RFID Reader Module, are also called as interrogators. They convert radio waves returned from the RFID tag into a form that can be passed on to Controllers, which can make use of it. RFID tags and readers have to be tuned to the same frequency in order to communicate. RFID systems use many different frequencies. The tag contains an antenna connected to a small microchip. The reader functions similarly to a barcode scanner; however, while a barcode scanner uses a laser beam to scan the barcode, an RFID scanner uses electromagnetic waves. To transmit these waves, the reader uses an antenna that transmits a signal, communicating with the tags antenna. The tags antenna receives data from the reader and transmits its particular chip information to the reader. The data on the chip is usually stored in one of two types of memory. The most common is Read- Only Memory (ROM) as its name suggests, read-only memory cannot be altered once programmed onto the chip during the manufacturing process. The second type of memory is Read/Write Memory; though it is also programmed during the manufacturing process, it can later be altered by certain devices. Fig 3 RFID Module Fig 4 RFID Tags 5.3 Stepper Motor A stepper motor (or step motor) is a brushless DC electric motor that divides a full rotation into a number of equal steps. The motor's position can then be commanded to move and hold at one of these steps without any feedback sensor (an open-loop controller), as long as the motor is carefully sized to the application. The use of stepper motor in this project is to mimic the locker operation.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 298 Fig 5 Stepper Motor 5.4 Liquid Crystal Display LCD (Liquid Crystal Display) screen is an electronic module used in a wide range of applications. A 16x2 LCD is a very basic module and is very common in various devices and circuits. They are preferred over seven segment displays. There are many advantages when compared to seven segment displays. They are: LCDs can display characters, numbers and even graphics. There are refreshing controllers present inside the LCDs so 8051 need not refresh the displays. It is cost efficient and the current dissipation is low. Fig 6 Liquid Crystal Display 6. ALGORITHM AND WORKING OF THE SYSTEM Step 1: Start Step 2: Wait until RFID card is detected. Step 3: Read card data and identify the customer. Step 4: Unlock the locker corresponding to the customer. Step 5: Wait until the customer locks the locker. Step 6: Repeat from step 2. Fig 7 Working Model Initially, when the connections are given and when the entire model is switched on, a message is displayed on the LCD “CUSTOMER ID:”. When the RFID tag is brought into the sensing area, the RFID reader reads the data (user ID) form the tag and displays the ID on the screen. The microcontroller AT89S51 process the data i.e. identifies whether it is user 1 or user 2 and allows access to the corresponding user. For example, if user 1 is granted access, then the stepper motor 1 will rotate in anticlockwise direction which indicates that locker 1 is opened and the user 1 can use it. The message displayed on the LCD is “LOCKER 1 OPENED”. As soon as the user has completed his work, he will press the switch 1. The control goes to the stepper motor 1 and it will rotate in the clockwise direction which indicates that the lock has been enabled. The corresponding message displayed is “LOCKER 1 CLOSED”. The control again to the beginning where the message will once again be displayed as “CUSTOMER ID:”. An important point to be noted is that at any instant during this process, if user 2 wishes to access the locker, he will be denied access. This process works in a similar way for user 2. If user 2 is granted access, then the stepper motor 2 will rotate in anticlockwise direction which indicates that locker 2 is opened and the user 2 can use it. The message displayed on the LCD is “LOCKER 2 OPENED”. As soon as the user has completed his work, he will press the switch 2. The control goes to the stepper motor 2 and it will rotate in the clockwise direction which indicates that the lock has been enabled. The corresponding message displayed is “LOCKER 2 CLOSED”. The control again to the beginning where the message will once again be displayed as “CUSTOMER ID:”. 7. CONCLUSIONS This projct is mainly aimed at reducing banker’s workload. Time is considerably saved by this RFID based automated bank locker system as there is no need for any authentication by the bank employee. As this project is implemented using siftware tools Keil µVision, the outputs can be easily checked before they are embedded on the hardware. This project has the potuts can be easily checked before they are embedded on the
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 05 | May-2014, Available @ http://www.ijret.org 299 hardware. This project has the potentiaal to greatly reduce the manpower required during the access of bank lockers by the customers and also greatly saves time for both the banker and the customer. This project can be extended for more number of customers and banks by using RFID cards with identification numbers of more length. ACKNOWLEDGEMENTS I would like to express my sincere gratitude and profound thanks to Dr.R.Rudramoorthy, Principal, PSG College of Technology for his inevitable encouragement and support, Dr.S.Subha Rani, Professor and Head, Department of Electronics and Communication Engineering, my faculty guide, Dr.K.V.Anusuya, Assistant Professor, Department of Electronics and Communication Engineering. REFERENCES [1] Raj Kamal, Embedded Systems: Architecture, Programming And Design, 2008 edition, published by McGraw Hill Education Private Limited. [2] Mazidi Muhammed Ali, The 8051 Microcontroller And Embedded Systems Using Assembly And C, second edition, published by Pearson education. [3] Kenneth J. Ayala, The 8051 Microcontroller, 2004 edition. [4] Deepak Gupta EM Magazine, RFID Interface To 8051.