Preview

Ece Project

Powerful Essays
Open Document
Open Document
12303 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ece Project
SECURITY SYSTEM USING RFID

A PROJECT REPORT
Submitted by
ANISH ANTONY (080107117005)
JISU JOHN ISAC (080107117039)
KRISHNA PRABHA R (080107117055)
KUNAL BHARDWAJ (080107117056)

In partial fulfilment for the award of the degree

of

BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING

PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY,
KANIYUR, COIMBATORE-641659.

ANNA UNIVERSITY OF TECHNOLOGY
COIMBATORE 641 047
APRIL 2012

ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047
BONAFIDE CERTIFICATE
Certified that this project report “SECURITY SYSTEM USING RFID” is the bonafide work of “ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ” who carried out the project work under my supervision.

SIGNATURE SIGNATURE
Mr.MARIA ANTONY M.E Mrs.K.MUTHULAKSHMI. M.E.(PhD)
SUPERVISOR HEAD OF THE DEPARTMENT
Department of Electronics and Department of Electronics and
Communication Engineering, Communication Engineering,
Park College of Engineering Park College of Engineering and Technology, and Technology,
Coimbatore - 641659. Coimbatore - 641659.

INTERNAL EXAMINER EXTERNAL EXAMINER

CONTENTS
CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3.1 Existing System

You May Also Find These Documents Helpful

  • Better Essays

    Cee 201 Final Project

    • 2071 Words
    • 9 Pages

    Introduction What a better way to end the year in CEE 201 with a construction project that deals with bidding. Our studies throughout the year have been focused upon engineering economics transitioning into linear programming models in order for engineers to make educated decisions in real life situations. In order to supplement this thought process, the construction game was created that deals with placing bids, ordering labor, and hiring workers to make a year’s end profit. This game is structured around placing bids against other teams within the class for three rounds over three years. If the bid is won for your team, your company completes the project and the profit is later computed. As with every reasonable game, there are rules to be followed. Each team has secured a capital of ten million dollars total for the three fiscal years. Before bids are placed, your company must purchase all the concrete and labor that will be required throughout the year. Unused money will increase by four percent each year in the stock market while additional funds beyond the ten million venture of capital funding will be secured via a loan with a ten percent annual interest rate. With purchasing concrete and construction workers, there are constraints to find certain values. Each construction worker will work up to two thousand hours per year and receive an annual salary of fifty thousand dollars. Unions demand that hired workers are paid whether they are actually put to work or not and the unions have agreed that workers may divide their hours of labor between multiple projects. Each cubic yard of concrete costs one hundred dollars and includes cost of purchase and transportation. Unused labor does not carry over into the following year, but concrete does. Unused concrete can be salvaged for ten dollars per cubic yard at the end of year three. Unused labor will be sold to a temporary agency for fifteen dollars an…

    • 2071 Words
    • 9 Pages
    Better Essays
  • Good Essays

    The story and history of Appalachia is rich and their shared geography, cultural traits and common historical experience ties the people of Appalachia together. The Appalachian Mountains were inhabited by a diverse population of Native Americans. They included the Iroquois who were the dominant group in the region. They later split into the northern Iroquois and southern Cherokees. The counties of Virginia, East Tennessee, western North Carolina and eastern Kentucky were the strongest areas of unionist sentiment in Appalachia.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ece241 Project

    • 583 Words
    • 3 Pages

    Recommended Design Techniques for ECE241 Project Franjo Plavec Department of Electrical and Computer Engineering University of Toronto DISCLAIMER: The information contained in this document does NOT contain official grading policy. The information provided here is based on my personal experience with ECE241 course projects in the previous years. Its purpose is to warn you of some common mistakes and answer some common questions student in earlier years had. As grading policies and project requirements change from year to year, please consult course web site or your instructor for official policies. THIS DOCUMENT MAY CONTAIN SOME MISTAKES. I will do my best to point those mistakes to you if I discover any, but I cannot make any guarantees. All information in this document is MY PERSONAL PREFERRED WAY OF DOING VARIOUS TASKS RELATED TO HARDWARE DESIGN. It is by no means the only possible way to perform these tasks. Also, this document does not cover, nor does it attempt to cover all aspects of various problems discussed. Therefore, you should not make any implications on aspects of the problems not mentioned in this document. In other words, if the document states X, and you try to do Y, which is “very similar to X”, do not assume that statements this document makes for X necessarily hold for Y. CHECK YOUR ASSUMPTIONS against your textbook, course notes, your instructor’s and/or TA’s advice, compilation and simulation results from Quartus, and finally, common sense. Verilog and Quartus Issues When using Verilog for the first time in a real project, users are often tempted to use fancy features of the language to make their lives easier. Unfortunately, if one succumbs to those temptations, they usually make their lives harder. The main reason for that is that Verilog, the way it is used in ECE241 labs and the way Quartus II interprets it, is not a programming language. Verilog is a hardware description language, meaning that various blocks of code directly map into…

    • 583 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    MGT 420 Midterm Exam

    • 1644 Words
    • 7 Pages

    Asset tracking software equipped with RFID hardware can give the convenience of tracking and identifying your assets uniquely in real time. When it is combined with suitable sensors and bar code scanners, it can be applied in various industrial tracking applications in order to produce and send alarms when there are any movements or disturbances on the asset or just maintain inventory.…

    • 1644 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    RFID cloners, cryptography and Bayesian Math, is something Cory Doctorow knows well. The author this book is a , speaker, teacher, writer of novels and short stories and editor of a…

    • 484 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Applied Project

    • 271 Words
    • 2 Pages

    Knowing what research approach is more appropriate than another with a particular research question or population of interest relies heavily upon the type of conclusion that can be drawn from the research. It is stated in the text that, “It is important to evaluate the needs and circumstances of your research project before selecting a design”. (Landrum, R. E. (2012). Having said this, it is inevitable that the researcher is aware of the many factors that go along with research such as, the number of independent variables that are being manipulated, the areas of learning and memory and many more. Therefore, “Often the research question you are interested in dictates the type of design used”. (Landrum, R. E. (2012 sec. 3.1).…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Why Avi chose to write about a nameless boy instead of a lord or prince. Avi probably chose this way to show you what life was like among the peasants. Lords and princes would get possessions given to them, but the peasants needed to work for everything. Avi displays the struggle that the peasants went through. Peasants are not respected by anyone and have to work to make any kind of living. A prince or lord would just have to take the crown from their mother or father and would not be obliged to work for anything everything would be passed to them. In conclusion Avi sought to present to you the struggle of the peasants not another story about a prince or lord that just has…

    • 128 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Educare Ltd Project Report

    • 3316 Words
    • 14 Pages

    Below is the Network Diagram for Educare Ltd project. It shows a breakdown of the activities into small pieces and all activities needed to complete the project. (Field & Keller,…

    • 3316 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Ece Observation

    • 1363 Words
    • 6 Pages

    The child I chose to observe was a 6 year old boy that I will refer to as Timmy. Timmy is an intelligent, active little boy who reportedly struggles with behavior. Timmy lives with his parents. He has two 14 year old half sisters one of each belonging to his mom and dad prior to them meeting and getting married. The sisters live in the home with Timmy part time. I observed Timmy in his afternoon childcare classroom from 10:55am-11:55am. The classroom was spacious with large windows along one of the walls over looking the playground. The remainder of the walls displayed art work created by the children. The room had clearly defined centers such as a Writing center with pencils, colored paper and pumpkin shaped paper punchers. A Library with two small couches, a house plant and an assortment of books. A Sensory center with orange water, small real pumpkins and circle shaped measuring utensils. A Block center with cars, a long wooden ramp, safety glasses and large brick blocks. The classroom also had Dramatic play, Art, Group and Science centers.…

    • 1363 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Project Sneaky Analysis

    • 215 Words
    • 1 Page

    The nature of the opportunity is to spread awareness of existing devices that can steal information causing identify theft, bankruptcy, and many more malicious activities to harm society. Technology can harm society due to the unawareness of the capabilities of new devices being created. New devices are created every day and the vulnerabilities are not yet known until a hacker or a malicious person attempts to test them. Radio-frequency Identification (RFID) scanners are made to make smart chips easier to read and reduce time in process that takes time to go over documents. Project Sneaky takes that life simplicity and shows the vulnerabilities within RFID scanning process throughout the technological world.…

    • 215 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Ec Assignment

    • 807 Words
    • 4 Pages

    The legal issue of this case is to determine whether the exemption clause was incorporated into the contract between Alex and Cedar Motors and its legal effect. Furthermore, was Benny bounded by exemption clause then?…

    • 807 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    buck boost converter

    • 6145 Words
    • 25 Pages

    We wish to express our deep sense of gratitude to Dr. Akshai Agrawal, Hon’ble Vice…

    • 6145 Words
    • 25 Pages
    Satisfactory Essays
  • Satisfactory Essays

    COMPLICATED QUESTIONS

    • 716 Words
    • 3 Pages

    Analog circuits are not limited they can measure even the second decimal points. Compared to digital circuits are inherently limited in their precision that why they must count in fixed units .Example in most of digital thermometer for instance have only one digit to the right of decimal example, they can indicate a temperature of 87.7 but can’t indicate 87.65.Hence one among of advantage of analog field.…

    • 716 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Rfid

    • 422 Words
    • 2 Pages

    According to Violino (2005), radio frequency identification (RFID) is a system that able to transmit the identity of a product or person through accessing the form of a unique serial number wirelessly by using radio waves. In addition, radio frequency identification (RFID) technology has to work together with RFID tag and RFID reader to complete the data collection process, RFID tag consists of microchips that able to store as much as two kilobytes of data which attached to a radio antenna mounted on a substrate while RFID reader is a device that contains one or more antennas that release radio waves and receive signals back from tag then RFID reader is needed to retrieve the data stored on RFID tag and transferring the information in digital form to a computer system (Violino 2005).The integration of data enable the information such as the precise location and inventory level of products share between supplier and customers has definitely speed up the entire supply chain process.…

    • 422 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ECS Tutorial 1

    • 113 Words
    • 1 Page

    themselves to the rest of the class. Each student is required to stand up and introduce…

    • 113 Words
    • 1 Page
    Satisfactory Essays

Related Topics