Вы находитесь на странице: 1из 23

 EXISTING METHOD

 PROPOSED METHOD
 BLOCK DIAGRAM
 HARDWARE REQUIRED
 SOFTWARE REQUIRED
 ADVANTAGES
 CONCLUSION
 Occurrence identified with the ATM is expanding quickly which is a
major issue. ATM security is utilized to allot insurance against
thievery. The wrongdoings identified with ATM are spreading step by
step. The security given by the ATM is keen enough. The security
given by utilizing CCTV (shut - circuit TV) or by utilizing guard isn't
adequate on the grounds that control rooms are reacting after
robbery is happened
 This proposed innovation center to design constant observing. The
framework is placed in to impact utilizing arduino microcontroller,
PIR (Passive Infra-Red) sensor and GSM (Global System for Mobile
Communication framework), Buzzer System, movbile cam which
make the framework progressively ensured. For controlling reason
GSM is anticipated sending the ready notices to the regulatory
telephone.
 Signal sounds will be frightened so as to make uneasy the focal point
of burglar. The control room focus on video film subsequent to
accepting ready notice of that particular ATM focus and appropriate
moves are made. The proposed reconnaissance framework gives
stockpiling viable and vitality effective.
 ARDUINO
 RFID MODULE
 GSM MODULE
 LCD
 DC MOTOR
Microcontroller ATmega168/328
Operating Voltage 5V
Input Voltage
7-12V
(recommended)
Input Voltage (limits) 6-20V
Digital I/O Pins 14 (of which 6 provide PWM output)
Analog Input Pins 6
DC Current per I/O Pin 40 mA
DC Current for 3.3V Pin 50 mA
16 KB (ATmega168) or 32 KB (ATmega328) of
Flash Memory
which 2 KB used by bootloader
SRAM 1 KB (ATmega168) or 2 KB (ATmega328)
EEPROM 512 bytes (ATmega168) or 1 KB (ATmega328)
Clock Speed 16 MHz
Ethernet
RFID
Reader

RFID Tag RF Antenna Network Workstation


A paper label
with RFID inside

an antenna,
printed, etched
or stamped ...

… and a chip … on a substrate


attached to it e.g. a plastic
foil ...
Tags can be attached to almost anything:
◦ Items, cases or pallets of products, high value goods
◦ vehicles, assets, livestock or personnel
Passive Tags
◦ Do not require power – Draws from Interrogator Field
◦ Lower storage capacities (few bits to 1 KB)
◦ Shorter read ranges (4 inches to 15 feet)
◦ Usually Write-Once-Read-Many/Read-Only tags
◦ Cost around 25 cents to few dollars
Active Tags
◦ Battery powered
◦ Higher storage capacities (512 KB)
◦ Longer read range (300 feet)
◦ Typically can be re-written by RF Interrogators
◦ Cost around 50 to 250 dollars
 Read-only tags
◦ Tag ID is assigned at the factory during manufacturing
 Can never be changed
 No additional data can be assigned to the tag
 Write once, read many (WORM) tags
◦ Data written once, e.g., during packing or manufacturing
 Tag is locked once data is written
 Similar to a compact disc or DVD
 Read/Write
◦ Tag data can be changed over time
 Part or all of the data section can be locked
 Reader functions:
◦ Remotely power tags
◦ Establish a bidirectional data link
◦ Inventory tags, filter results
◦ Communicate with networked server(s)
◦ Can read 100-300 tags per second
 Readers (interrogators) can be at a fixed point such
as
◦ Entrance/exit
◦ Point of sale
 Readers can also be mobile/hand-held
A DC motor is an electric motor that runs on DC electricity. It
works on the principle of electromagnetism. A current carrying
conductor when placed in an external magnetic field will
experience a force proportional to the current in the conductor.

They are various methods used to control the speed of a DC


motor. Some of them are:
1. Armature control method
2. Flux control method
3. Ward Leonard system
 The MAX232 is a dual driver/receiver that includes a capacitive voltage
generator to supply EIA-232 voltage levels from a single 5-V supply. Each
receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These
receivers have a typical threshold of 1.3 V and a typical hysteresis of 0.5 V,
and can accept ±30-V inputs. Each driver converts TTL/CMOS input levels
into EIA-232 levels.
 GSM modem is a specialized type of modem which accepts a SIM card, and

operates over a subscription to a mobile operator, just like a mobile phone.


From the mobile operator perspective, a GSM modem looks just like a mobile
phone

 When a GSM modem is connected to a computer, this allows the computer to use the
GSM modem to communicate over the mobile network. While these GSM modems are
most frequently used to provide mobile internet connectivity, many of them can also be
used for sending and receiving SMS and MMS messages.

 .
 The Arduino Uno can be programmed with the Arduino software.
Select "Arduino Uno from the Tools > Board menu (according to the
microcontroller on your board).For details, see the reference and
tutorials. The ATmega328 on the Arduino Uno comes preburned
with a boot loader that allows you to upload new code to it without
the use of an external hardware programmer. It communicates
using the original STK500 protocol (reference, C header files).We
can also bypass the boot loader and programs the microcontroller
through the ICSP (In-Circuit Serial Programming) header; see these
instructions for details. The ATmega16U2 (or 8U2 in the rev1 and
rev2 boards) firmware source code is available. The
ATmega16U2/8U2 is loaded with a DFU boot loader, which can be
activated by:
 On Rev1 boards: connecting the solder jumper on the back of the
board (near the map of Italy) and then resetting the 8U2.
 On Rev2 or later boards: there is a resistor that pulling the
8U2/16U2 HWB line to ground, making it easier to put into DFU
mode.
 It is progressively secure and compelling innovation.
 It won't just recognize the substance of individual it
additionally take photograph of the burglar.
 It won't enable the criminal to escape from the ATM
focus by shutting the entryways of the ATM focus.
 It likewise sends the message to the record holder about
the criminals.
 Due to the usage of this innovation we doesn't require
guardian.
 It is an ATM model which gives security and the insurance to the
ATM machines by utilizing Facial check programming including
facial acknowledgment frameworks to the personality affirmation
procedure utilized in ATMs can lessen constrained exchanges, all
things considered, and on account of the unapproved get to it not
just send data it additionally send the photograph of the hoodlum
to the control room and the record holder.
 By utilizing all the more such sort of innovation we can make the
exchange through the ATM increasingly adequate and secure.
 By accomplishing more work on this innovation we can give the
protected, secure, adequate and supportive ATM exchange process
in field of banking framework everywhere throughout the world.
REFERENCE:
[1] Dr.Suryaprasad J, Praveen Kumar B O, Roopa D Arjun A Novel Low-Cost Intelligent
Shopping Cart, Proceedings of the 2nd IEEE International Conference on Networked
Embedded Systems for Enterprise Applications, NESEA 2011, Perth, Australia, December
8-9, 2011

[2] Zeeshan Ali, Prof. Reena Sonkusare, ”RFID Based Smart Shopping and Billing”,
International Journal of Advanced Research in Computer and Communication
Engineering, Vol. 2, Issue 12, December 2013 [

3] Larson, Bradlow and Fader, “An Exploratory Look of Supermarket Shopping Paths,”
International Journal of Research in Marketing, April 2005. Available:
http://www.searchlores.org/realicra/PT_1006.pdf

[4] G. Roussos and B. College, ―Enabling Rfid in Retailǁ, Computer, IEEE,vol. 39, no. 3,
2006.

[5] Ankit Anil Agarwal, Saurabh Kumar Sultania, Gourav Jaiswal, Prateek Jain.ǁ RFID Based
Automatic Shopping Cartǁ, Control Theory and Informatics Vol 1, No.1, 2011.3 [6]
Motorola, transforming the customer experience with RFID (White Paper)
Queries

Вам также может понравиться