Вы находитесь на странице: 1из 4

International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013

ISSN: 2231-5381 http://www.ijettjournal.org Page 3855



Design and Implementation of Electronic Tollgate
Collection System
Vanga Smitha
1
, K Kanthi Kumar
2
, K V Murali Mohan
3

1
Vanga Smitha is pursuing M Tech (ECE) in Holy Mary Institute of Technology and science (HITS),
Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA

2
K Kanthi Kumar, working as an Associate Professor (ECE) at Holy Mary Institute of Technology and
science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA

3
K V Murali Mohan, working as a Professor HOD ( ECE) at Holy Mary Institute of Technology and science
(HITS), Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA



Abstract:

In order to provide an efficient,
sophisticated and fully automated system a kind of
An Electronic Toll gate Collection System is
designed with PIC controller and another added
service in this system is, installing a security
system in every automotives which always read the
location of the vehicle and send to the authorized
person when requested, which gives an ease of
monitoring the vehicles for RTA department as
well as the owners when they are required. The
tollgate system is developed such that it
automatically scans the vehicle whether it is an
authenticated vehicle or not if so the system allows
the vehicle to pass through otherwise it will ask to
pay the amount manually.

I. INTRODUCTION

RFid technology is bound to change the. Bank cards
would be fitted with RFid chips which would permit
banks to quicken their reaction time when some
important customer visits the bank and enable themto
send someone to meet and wish the person. RFid
chips could also be arranged in palmlets and this
would trigger videos on in house screens to provide
more information. RFID technology allows for data to
be transmitted between two devices at close range
without physical contact. It can be made very
sophisticated and reliable, and the data stored and
transmitted can be widespread. Transmission and
legalization can be done in less than a second, Cities
having a good public transport infrastructure have
been introducing cashless payment on buses,
subways, and trains. Payment is realized by nearing a
prepaid and rechargeable cards, upon which the reader
discounts the correct amount from the card. The
frequency used (13.56MHz) has a read range of about
20 cm; no physical contact is necessary. In addition to
being a prepaid card the card can also hold other
information which can be used to identify the client.



A. Access to personal information

Personal information will be stored in an adapted card
(any card present access and other ID related
services), in accumulation to bank details. RFID
allows the ease of tracking each card, and can disable
definite readers this means RFID card users and
their communication will always be perceptible.
India has seen over 25% annual growth in
credit/debit cards and expect to grow from6million
cards in early 2003 to 10 to 25 million cards by 2010

RFID in Banking:
1. Customer convenience
2. Competitive advantage
3. Create new products

RFID products:
1. Debit Card
2. Credit Card
3. Prepaid Card




















International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013

ISSN: 2231-5381 http://www.ijettjournal.org Page 3856


II. BLOCK DIAGRAM

Toll Section:











Vehicle Section:
















III. RFID in ETC

RFID technology allows wireless storage and
automatic retrieval of data and it improves security,
cuts down on theft and counterfeiting in the supply
chain. In the supply chain RFID also helps to reduce
out of stock situations which may affect business. It
also increases visibility of products in the production
processes, enables detection of vehicles on roads as
well as automatic toll collection fromthe users. A
complete RFID system consists of tags, transponders,
computer networks and systems including databases.
There is an environment of companies that extend
platforms to support RFID development and
applications. Firms like Wal-Mart, Target and Gillette
have been active in developing and adopting RFID.
On the roads, it is used to detect the presence of
vehicles and retrieve information on the vehicle tag as
it passes through the tollgate. This tag scanning works
as if it were some bar codes being scanned in a shop
and the billing mechanically done according to the
codes arriving. However bar codes do not have
memory block for storing data as in RFID tag and
they do not use radio frequency hence have a short
reading range

In every RFID system the transponder Tags
contain information. This information can be as small
as a single binary bit although they normally start at
16 bits, or be a large array of bits demonstrating such
things as an identity code, personal medical
information, or accurately any type of information
that can be stored in digital binary format.


IV. METHODOLOGY:

The system was developed in a modular-
based method. It contains an identification module,
which has the RFID hardware to read tags as vehicles
pass through the tollgate. This module sends
information to the software module through RS232
serial connection. The software module uses the
information from the identification module to
determine the actual physical identity of the vehicle
using its EPC code and the information is used to tell
the boombarrier whether to clear the way or not. The
boombarrier systemmakes up the mechanical module
such that when the tag gets matched.


Components of RFID Read-Writer System:

To have a complete RFID system, an
interrogator, a transponder and some tags were used.
These formthe RFID hardware which is used in an
information processing system(IPS) to acquire the
total advantages of RFID. An RFID system can detect
many different RFID tags concurrently as long as they
are within the read range of the interrogator. The
interrogator acts as the sensor as well as an interface
between RFID transponders and the IPS. Antennae
are attached to the interrogator and performthe actual
Radio Frequency (RF) communication which is
described above.
A computer hosting the IPS application
pilots the interrogator and processes the data it sends.
The IPS application monitors, configures and
coordinates readers for data collection as well as the
execution of business programs as dictated by
programmed business rules and logic. The IPS
regularly is also referred to as the edge-ware or
middleware and can be stated as the intellectual
sensor network platform (ISNP). After configuration
of parameters meaningful information has to be taken
fromthe tag.

The Identification module
There are seven data lines fromthe RFID
read/write module. The important ones for reading
and writing are the lines for transmitting and
receiving data in a two way communication between
the RFID reader and the computer system. A USB-to-
RS232 converter is used to enable connect the RFID
module to the Personal Computer (PC) if it does not
have an RS232 port. The RFID module is powered
froman independent power source, in this case, a 12
V and 3A supply. A tag is brought in the region of the




PIC (16F877)
Power
Supply
RFID
Reader
LCD
Display
PC




ARM-7
(LPC2148)
Power
Supply
GSM
GPS
Motor
Driver
Motor
International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013

ISSN: 2231-5381 http://www.ijettjournal.org Page 3857

magnetic field produced by the RFID module and a
beep sound is produced. The RFID module needs to
be configured with certain communication
parameters. This can be done using the given specific
instructions and can be achieved by using the Demo
Application or an independent developed application.
The RFID module is connected to a machine via the
RS232 port which creates the serial communication
between both.


V. SOFTWARE MODULE
The microcontroller was programmed using
the C programming language and Visual Basic was
used in the serial communication between the
computer and the RFID as well as with the PIC. A
database was designed using Microsoft Access since
it can contain up to 32768 records of objects, a size of
2GB memory space which is sufficient for exhibition.
Synchronizing software called Sync Toy was used to
make obvious exchange of data between terminals in
the same network. Remote systemis also used to test
communication between the module and the PC.

VI. HARDWARE DESIGN
This involved the designing of the
automotive part, with the aimof having a stable, low-
priced, light and steadfast design. For the prototype
implementation we use wood but aluminiumcan be
used for real time boom barrier. After unbeaten
building of the gate system the whole systemwas
incorporated for testing. The RFID, server (computer
and database), PIC control, power supply and the gate
system were joined together. At the moment
Zimbabwe Revenue Auth







Accuracy
Several tests were run during the Zimbabwe
International Trade Fair (ZITF) for the whole week
and the RFID system maintained the complete
database of entries accurately. The systemmanaged to
recognize all the cars that approved through it. The
serial communication between the PIC and the
computer was also constantly tested. The results
showed that there were neither unwanted added bits
nor lost bits. There were no illustrations when the gate
failed to open when it was supposed to, neither did it
fail to close when it was supposed to. Generally
accuracy was high and the authors recommend the use
of RFID in identity detection even for car parks and
door entrances.

Security
The systemproved to be secure since it could
not be cracked without the login details. No
unauthorized user is supposed to log on to the system,
in case they may start editing their balances. However
the weakness of the networked tollgate systemis that
it is prone to the spread of viruses and leaking of
information to the external world. We recommend
that further up gradation be done to reduce this risk.
However it is very difficult for public/users to replica
RFID tags and start using themin the road because an
unrecorded/unknown tag ID is not allowed to pass.

VII. REFERENCES

[1] IET. 2009. Radio Frequency Identification Device Technology
(RFID), The Institution of
Engineering and Technology, Available at:
http://www.theiet.org/factfiles/it/rfidpage.
cfm?type=pdf, Accessed on 15/06/12.
[2] Want, R. 2006. An Introduction to RED) Technology, IEEE
Pervasive Computing, 5(1),
pp. 25-33.
[3] Stanford, V. 2003. Pervasive computing goes the last hundred
feet with RFID systems,
IEEE Pervasive Computing, 2(2), pp 914.
[4] Soldatos, J., Kefalakis, N., Leontiadis, N. et al. 2010. Core
ASPIRE Middleware
Infrastructure (Final Version), ASPIRE Consortium, ID:
WP3/D3.4b, Revision 1.9,
Availableat: http://www.fp7-
aspire.eu/fileadmin/aspire/docs/deliverables/ASPIRE_D3.4b_Final.
pdf, Accessed on:11/06/12
VIII. AUTHORES DETAILS
International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013

ISSN: 2231-5381 http://www.ijettjournal.org Page 3858



Vanga Smitha, Pursuing M.Tech
(ECE) Holy Mary Institute of
Technology and science (HITS),
Bogaram, Keesara, Hyderabad.
Affiliated to J NTUH, Hyderabad,
A.P, INDIA

K Kanthi Kumar, Associate
professor (ECE) at Holy Mary
Institute of Technology and
science (HITS), Bogaram,
Keesara, Hyderabad. Affiliated
to JNTUH, Hyderabad, A.P,
INDIA

K V Murali Mohan is working
as a Professor HOD ( ECE) at
Holy Mary Institute of
Technology and science (HITS),
Bogaram, Keesara, Hyderabad.
Affiliated to J NTUH,
Hyderabad, A.P, INDIA