Академический Документы
Профессиональный Документы
Культура Документы
Engr. Rs L.Lagrimas
Professor, College of Engineering and Industrial Technology
Rizal Technological University
Mandaluyong City, Philippines
Dear Sir:
Greetings!
We are writing to humbly request your service and expertise to serve as an adviser for
our thesis. We believe that your knowledge and insights will be valuable and will greatly
enrich our work.
Thank you for your consideration. We are hoping for a favorable response regarding to
our request.
Respectfully yours,
Researchers
VINCENT Y. CASERES
Conforme:
__________________________
ENGR. RS L. LAGRIMAS
Professor, College of Engineering and Industrial Technology
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
Presented by:
Caseres, Vincent Y.
APRIL 2018
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
CHAPTER 1
INTRODUCTION
not new to the world of technology, it is now widely used in the industry. This kind
of monitoring system will help create faster ways to identify items, provide
efficient equipment lending and provide added security. Along the roads, where
there are a lot of irresponsible and unaware motorists and pedestrians, incidents
of traffic jams and road accidents are timely and relevant mostly along the roads
of Metro Manila due to ineffective monitoring systems at times. The Metro Manila
within Metro Manila without reducing the autonomy of the local government units
agency has the authority to implement all traffic enforcement operations and
‘Beating the red light’ is an example of traffic infraction that the agency
intersection if the traffic light has already turned red. The violation may fall under
vehicle.
There are a lot of factors as to why motorists would run a red light. It
might be that these motorists are trying not to be late for office or an
appointment, or they’re catching a flight, or there are no cars and they think
they’re safe to pass especially during wee hours of the morning. These people,
of course, know that this is wrong, but why do they still do it? Mainly because
Maybe these motorists are lucky enough to evade the law one time or
violations like ‘beating the red light’. These accidents range from a minor collision
themselves.
motorist commits the infraction, the violator has no choice but to pull over and be
issued a violation receipt by the enforcer. But then there is the concept of
‘kotong’, wherein the enforcer would ask for money instead of issuing a ticket for
the violator. This current system of the MMDA for apprehending ‘beating the red
The developed system is a plate number recognition system for ‘beating the red
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
researchers.
GENERAL
in the occurrence of the event, relies only on the eye of the enforcer and
The manual apprehension system of MMDA for ‘beating the red light’ is
not very flexible. It does not provide evidence of the occurrence of the
can easily get away from this. In this system also, the traffic enforcers only
use their naked eye which could be subject to high percentage of error like
misreading of the plate number of the vehicle. This can be due to factors
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
like the vision of the enforcer, over-speeding of the car which makes it
hard for the enforcer to read the plate number or the quality of the plate
TRAFFIC JAM
along the road), extreme traffic congestion sets in. When vehicles are fully
stopped for periods of time, this is colloquially cause a traffic jam or traffic
ROAD ACCIDENTS
such violation.
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
RESEARCH QUESTIONS
Since the current apprehension system of the MMDA for ‘beating the
red light’ violators are all manual, the issues of corruption and unavailability of
corruption happens are: when a traffic enforcer compels a violating motorist into
giving money instead of issuance of violation receipt, and when the enforcer
preference of receiving money. So, with the reduced number of traffic enforcers
needed at every intersection mainly due to the presence of the proposed system
system is also a great opportunity to show how the system is of great help in
greatly lessened, they are still expected to be monitoring at some areas – the
THEORETICAL FRAMEWORK
INPUT
Materials needed
RFID tag
RFID reader
Drivers’ Car
PROCESS
Programming
Construction of Prototype
Series of testing
Consultations
OUTPUT
PC or LAPTOP
CAR INFORMATION
NAME OF OWNER
PLATE NO.
VEHICLE REGISTRATION
AUTO INSURANCE
TRAFFIC LIGHTS
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
THEORY
objects, collect data about them, and enter those data directly into computer
systems with little or no human intervention. RFID methods utilize radio waves to
an RFID tag or smart label, an RFID reader, and an antenna. RFID tags contain
an integrated circuit and an antenna, which is used to transmit data to the RFID
reader. The reader then converts the radio waves to a more usable form of data.
interface to a host computer system, where the data can be stored in a database
The proposed study will go as where the RFID Tag/s on the equipment
will passes by the RFID Reader to identify the car information and its driver.
Then, it will be stored as data on the system to be able to keep the track of the
car. The system will store in a PC or Laptop where the drivers record about
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
his/her violation (beating the red light) that will be up-to-date. The system is able
to give the record of the driver who violate. The data will be collected and the
1. RFID TAG
2. RFID READER
This device will provide the connection between the tag data and the
communicates with tags that are within its field of operation, performing
(searching for tags that meet certain criteria), writing (or encoding) to
attached to objects.
interrogating radio waves. Active tags have a local power source (such as
a battery) and may operate hundreds of meters from the RFID reader.
Unlike a barcode, the tag need not be within the line of sight of the reader,
3. Only the plate numbers regularly issued by the LTO for cars, vans and
4. Vehicles without plates or for registration are outside the scope of the
system.
5. Cases like when two vehicles are caught by the RFID Reader where one
of them committed the violation while the other came from the right
direction (the road where the traffic light is green) will be under certain
‘beating the red light’ is not also within the scope of the proposed system.
perform well.
CHAPTER II
This chapter includes the review of related literature and studies that the
and studies citing the similarities and differences are presented at the end of the
chapter.
FOREIGN LITERATURE
radar, although many of its early developments are not widely known due to the
technology trace its development to the radio based identification systems from
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
World War II when the British Air Force used radar to distinguish Allied aircraft
from enemy aircraft. Commercial development of RFID began in the late 1960s.
Arguably the first and most widespread commercial use of RFID was in the
Although this system could only detect the presence or absence of a tag, the
By the mid-1990s, implantable RFID tags that were initially used to track
identify pets. RFID is now used for hundreds of applications including theft
and library book tracking, along with the monitoring of assets in supply chain
management.
RFID technology fundamentals RFID systems consist of four main elements: the
RFID tags, the RFID reader, the antennas and computer network used to
connect the readers. The tag itself is the building block of RFID, each containing
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
an antenna and a small chip that contains a radio receiver and a modulator to
send a signal back to the reader. Tags come in a variety of shapes and sizes
allowing them to be implanted into animals and humans, and they can be
powered by the incoming radio signal (passive tags) or by a small battery (active
tags). The advantage of an active tag is that its reading range and reliability is
greater than that of a passive tag; however, passive tags can be much smaller
RFID tags can also either be promiscuous in that any RFID reader (also known
as an interrogator) can communicate with it, or secure where the reader requires
an authentication credential in order for the tag to respond. RFID readers work
frequency and power, to a tag and monitoring the tag’s response. Certain
frequencies require a license to broadcast using this part of the spectrum, though
most RFID systems use the so called unlicensed spectrum, which does not
require a radio license. Low frequency (LF), high frequency (HF) and ultra-high
frequency (UHF) bands are used within RFID systems depending on the
application. For example, the FDA has adopted the HF band for RFID systems
In a simple RFID system, the reader’s energy pulse acts simply as an on-off
switch for the tag. In more complex systems, the pulse can include commands to
the tag, such as instructions to read or write memory for more advanced
monitoring.
• Retention of the history of an asset and audit trail of the asset’s lifecycle.
alerting mechanism.
management.
The benefits of an RFID system compared with traditional barcode and ERP
or incorrect information about location, status and usage can, however, cause
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
environment for are stored in one compliant database, defense of the laboratory
RFID and the pharma industry RFID can increase the safety and visibility of
item level at each stage of the supply chain, preventing theft and effectively
integrity. As such, the FDA has recommended the use of RFID tags to better
For the analytical laboratory, managing and tracking high-end and portable
management systems. Doing this ‘well’ with minimal resource and manual
Lack of information or incorrect information about location, status and usage can,
perspective.
manner.
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
FOREIGN STUDIES
in history. As the technology grows very rapidly, RFID has received considerable
worldwide attention and widely used in monitoring and tracking ranging from
indicated that RFID has been increasingly expanded in various fields such as
retail supply chain, asset tracking, postal and courier services, education,
construction industry, medical, and etc. (Roberts, 2006) The work presented by
Tan and Chang (2010) who had developed an RFID based e- restaurant system
that enable waiters to immediately identify customers via their own RFID-based
dining table service; pay the bills, instant transmission of customer orders to
system, developed FARMA project which combined with RFID technology and
mobile wireless networking to track animal and the data in repository which
contains animal data records. The purposes of the system are to identify animal
in case it gets lost and identify some basic information about particular animals.
Similar works were done and developed a livestock monitoring system using
RFID. An RFID tag is used and attached to each livestock to monitor its
movement in and out as well as the basic information about any particular
animals. (Nor Suryani Bakeri et. al., 2007 and Ahmad Rafiq Adenan et. al., 2006)
The use of RFID also could assist in customs clearance process by reducing the
delay time. According to the authors, the use of RFID can improve the efficiency
of cargo process and reduce the inventory and labor cost. The work presented
based on the mathematical model of the customs clearance process delay and
the network of customs delay is reconstructed based on the use of RFID. RFID
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
also has been successfully applied in global postal and courier services in
One of the well-known courier service company is DHL which has been using
RFID in their services since 1988 and carried out 20 trials on active and passive
technology and successfully proved it improved the service and reduce the costs
(EPC Global, 2005). The application of RFID in global market in postal and
courier services contribute 650 billion per year and Europe was the leader in
utilizing RFID in postal and courier services (Zhang, et. al., 2006). High quality
profitability of service organizations. ((Zhang, et. al., 2006) & (Hoffman and
Bateson, 1997))
Some people have done a study to investigate the possibility of using RFID as a
tool for improving service quality in hospitality industry and primarily concern in
Oztekin et. al. (2010) has done a study using enhanced maximal covering
location problem along with critical index analysis metric to optimize the design of
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
readers. Results indicate that the proposed technique has improved by 72%
compared to the currently utilized expert placement strategy. Yan and Lee (2009)
developed RFID application in Cold Chain monitoring system to track the cold
chain product flowing in supply chain, ensure the products’ quality and comply
environment and can track the location and monitor the temperature of cold-
However, according to the author has done a research regarding the application
the advantages and challenges with the early RFID applications in terms of
university students using RFID. The system aims to deliver urgent notifications to
the intended students immediately at their respective locations. (Haron, et. al.,
2010) A quite similar work was done which integrates RFID and biometric sensor
LOCAL LITERATURE
identification are made, but the most effective is to store a serial code that serves
an antenna. The chip and the antenna together are called RF tag. The antenna
converts the radio waves into digital information that can then be passed and
passive tag and another one is an active tag. Active RFID would function with the
aid of a battery while passive RFID uses the radio frequency energy transmitted
from the reader to power the tag. Active RFID can be used from monitoring
objects over larger areas. These include scanning of several packages through
dock doors or collection of real-time data in a warehouse. Active RFID tags have
a storage capacity of 128 K bytes with a larger range of communication and the
capacity to collect data from multiple tags at a very fast pace. Passive RFID can
be used for applications for a low-cost option and limitations in terms of data
storage. It can be used where large amounts of data are not required and there
employees. Both Active and Passive RFID can be used for in several
LOCAL STUDIES
Automated UHF RFID Solution Service Provider ClarIDy Solutions, Inc. Relies on
CSL to Deliver UHF RFID Readers and Antennas for Automatic Library Project
Systems Limited (CSL), a global provider of passive RFID products and active
Philippines has transformed its library services with a unique Ultra High
Frequency (UHF) RFID solution from CSL and ClarIDy Solutions, Inc. Mapúa
Institute implemented the IDSmart™ library solution early this year at its
to better serve its faculty and students. According to Taiwanese service provider
ClarIDy Solutions, Mapúa was the first school in the Philippines to install this
UHF RFID solution, which uses CSL UHF products at Self-Service Stations, Self-
Return Stations and RFID Security Gates. "The objectives are to improve the
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
time," said Emerald L. Lansangan, Mapúa's chief knowledge officer. "With this
efficient UHF RFID system in place, faculty members and students can now
expect faster and shorter queues when borrowing and returning library materials,
and librarians are free to focus on assisting our students with their research
design, project integration and library domain know-how, offering total UHF RFID
custom RFID book tags carefully concealed in the books and encoded with the
library's existing automation system. With these tags, the library books can be
quickly and easily inventoried, checked in and checked out using a portable
drop. In addition to improving reader service and work processes throughout the
library, security also is enhanced with RFID Security Gates at the building exits.
"Convergence Systems Limited was an ideal provider for the UHF library
antennas," said Megan Wu, global sales and marketing manager of ClarIDy
Solutions. "We are excited to work with CSL and appreciate their support on the
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
efficiency and cost savings, this solution also offers real-time statistics of library
patron visits, and real-time inventory reports can be generated instantly using
CSL readers with Internet connectivity," said Jerry Garrett, managing director,
RFID frequencies because the UHF tags cost less than HF tags, and the read
ranges for UHF are much greater than those offered by HF technology."
Due to the success of this UHF RFID system, the Mapúa Institute plans to install
this library solution at its Makati City campus as well. Also in Lyceum of the
Philippine President Jose P. Laurel, was founded by Dr. Sotero H. Laurel and Mr.
Feliciano L. Torres last January 18, 2000. Its vision is to be the leading institution
not only in the CALABARZON but also in the Asia pacific region. Presently the
students and employees will have to write their names in the log sheet for their
attendance in the library. With the current system, the librarian has a hard time in
determining the statistics of thle library users. Moreover, it is hassle for the users
to log in the logbook and most of the time they forgot to log in. This continuously
observed situation led the proponent to investigate and find ways on how to
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
above, it shows that its application is endless. This explains the RFID application
aims at helping the lab administrator in monitoring the equipment from lost or
by the lab administrator but also by the top management through online
databases. The foreign studies gives an overview on the projects made possibly
by different people that are related to this study which is monitoring equipments
with the use of RFID. RFID has been used in different fields such as in
production, food, parcels, medical supplies, poultry, it has been used by alot of
people however it is not too noticable by people who lacks knowledge about
Management System (Vouldimos et. al.,2010; Nor Suryani Bakeri, et. al., 2007;
Ahmad Rafiq Adenan et. al.,2006), Cargo Services (Zhang et. al., 2006), Retail
been conducted on how schools can benefit from the use of RFID based
The implementation of this technology can also lead to other types of benefits
advanced knowledge about actual lead times experienced in the laboratories; the
analyzing the data, frame by frame, and retrieve the frame where possible
violation occurred.
Apart from this paper’s proposed system, there have been others that has
discussed and ventured on making their own Plate Number Recognition System.
applied to commercial car park systems for the use of documenting access of
parking services, secure usage of parking houses and also to prevent car theft
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
and statistical based template matching are what the system uses for the major
parts respectively.
license plates.
projections
Third Stage: fuzzy neural network is used to recognized the license plates
systems.
License Plate Recognition system. This application undergoes the same stages
as the other systems of the same functions. This system has been tested on 400
related services like automated parking, traffic light surveillance, electronic toll
collection, and vehicle surveillance for police uses. Unfortunately, the system
does not perform up to its expectations. It still requires a lot of human supervision
to find possible candidates for license plates. After locating the region of the
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
license plate, the scheme of shape contexts is used to recognize the characters
Sequence.
The use of license plate recognition systems in e-Government has been proven
helpful. And this is what Wu, et al, have confirmed in their research. They have
also dealt with the issue on how to apply license plate recognition in e-
Janota, et al, implemented this way in their proposed system. The system also
focuses on processing only one captured vehicle. The algorithm used in this
system finds holes and arcs to recognize characters. The system has also been
One last related application to this paper’s proposed system is the one
developed by Vazquez, et al. They also use multilayer neural network to identify
the symbols of the number plate, just like the previous applications. It also
consists of two processes: the training and recognition processes. The training
process is the stage where the application learns to 8 identify symbols from
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
number plates. The recognition process, on the other hand, is the stage where
CHAPTER III
RESEARCH METHODOLOGY
treatment which will be used for accurate data gathering and interpretation.
RESEARCH DESIGN
The figure below shows how the materials and devices will be placed. The
RFID Reader is placed near the traffic light in such a way that the reader
functions once the traffic light turns “RED”. The RFID Tag is carried by the
vehicles and will be recognized once the driver beats the Red Light. The car
1. The first step will be initialization of pins of the Arduino module. This will
2. Next process is the initialization of the reader. Here, to make sure the
4. Once the materials had undergone initializations, they are ready for
detection of the tags. The system updates usually every after 1000ms .
5. For instance, a vehicle carrying an RFID Tag in it crosses the limit once
the traffic light turns “RED”, and the magnetic field in the designated area
turns on. When the field detects an RFID Tag, the RFID Reader
recognizes the tag and then sends data to the system software that allows
6. The data collected from tag reads to shown, sent, stored, etc. so that
7. The data are decrypted in the tag from the system upon reception.
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
INSTRUMENTATION:
project study.
1. RFID TAG
Terephthalate (PET). The chip and antenna combo, called an inlay, is then
This device will provide the connection between the tag data and the
communicates with tags that are within its field of operation, performing any
tags that meet certain criteria), writing (or encoding) to selected tags, etc.
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
This device will be the storage of the information from the rfid tag.
4. ANTENNA
This will be used for reception of data once an RFID Tag is sensed by the
RFID Reader.
Once the traffic light turns “red”, the RFID Reader turns on and the
monitoring of violators starts. The monitoring temporarily stops once the traffic
Is a system that are provided with unique identifiers and has the ability to
transfer data over a network without human to computer interaction. The data
from the rfid system will be transfer to the other network using this system.
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
a. DATA COLLECTION
The first stage will start once the traffic light is in “red light”, which is
the time when the monitoring starts. When the antenna in the RFID
Reader detects an RFID Tag, the data stored in the tag will be transmitted
to the reader. The RFID Reader is divided into two sections: the “Reader”
The data transmitted in the IoT will be decrypted and stored in the
Q: How many read zones are needed and where will they be located?
necessary to gather data (i.e. every point where reading RFID tags is required).
and out may be the appropriate solution; in another, a single handheld RFID
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
reader may be the best fit in order to scan items within an inventory closet.
allows a user to know exactly where any given (tagged) item is on the facility
facility. In these cases, read zones would only be necessary at the facility’s
entrances/exits.
Ultimately, the amount of read zones required and where those zones
A: As with any RFID application, thorough testing is key. There are certain
methods and measures that can be put in place to mitigate potential interference
caused by metal and water (as well as other interference causing elements).
tagged, it should not discount RFID as the solution entirely. Instead, limitations
should be noted and thorough testing should be executed in order to see if such
item to be tagged will have different specifications that should be noted when
choosing the ideal tag. Some applications might require the use of several
REFERENCES
Ahmad Rafiq Adenan, Siti Zarina Mohd Muji, Mohd Helmy Abd Wahab.
Haron, N. S., Saleem, N. S., Hassan, M. H., Ariffin, M. M. and Aziz, I. A. A RID
2. Issue 3.
Herdawatie Abdul Kadir, Mohd Helmy Abd Wahab, Zarina Tukiran Mohd Razali
Mohd Tomari and Mohd Norzali Hj. Mohd. (2010). Fusion of Radio Frequency
rfid-and-fingerprint-in-boarding-school-monitoring system-b
Hsu, C-I, Shih, H-H, Wang, W-C. (2009). Applying RFID to Reduce Delay in
RIZAL TECHNOLOGICAL UNIVERSITY
College of Engineering and Industrial Technology
Chain: The Early Metro Group Pilot. 18th Bled eConference on eIntegration in
Nor Suryani Bakery, Ayob Johari, Mohd Helmy Abd Wahab, Danial, Md. Nor.
Oztekin, A., Pajouh, F. M., Delen, D., and Swim, L. K. (2010). An RFID Network
Oztaysi, B., Baysan, S., and Akpinar, F. (2009). Radio Frequency Identify
Voulodimos, A. S., Patrizakis, C. Z., Sideridis, A. B., Ntafis, V. A., and Xylouri, E.