IOT Based Smart System Using ARM Controller
IOT Based Smart System Using ARM Controller
MASTER OF TECHNOLOGY
in
Embedded Systems
Submitted
by
S.SUREKHA
(14P31D5511)
Mr.R.V.V.KRISHNAM.Tech., (Ph.D.)
CERTIFICATE
This is to certify that Project report entitled “IOT based smart and secure Traffic
management system using ARM microcontroller” is being submitted by
S.SUREKHA (14P31D5511) in the partial fulfillment of the requirement for the
award of the degree of MASTEROF TECHNOLOGY in ELECTRONICS AND
COMMUNICATION ENGINEERING with specialization in EMBEDDED
SYSTEMS during the academic period of 2014-2016 .
EXTERNAL EXAMINER
ACKNOWLEDGEMENT
I wish to thank all the staff members in the department for their kind co-
operation and my parents to give support throughout the Project work.
Finally I acknowledge sincerely the effective services rendered by one and all
involved directly and indirectly in the entire Project.
S.SUREKHA
(14P31D5511)
CONTENTS
PAGE NO
ABSTRACT I
LIST OF FIGURES II
NOMENCLATURE IV
CHAPTER 1 INTRODUCTION 01
1.1 OBJECTIVE 01
1.2 MOTIVATION 01
3.4 FLOWCHART 11
3.5.2 RISC 13
3.10.3 HISTORY 30
3.11.6 APPLICATIONS 38
3.13 BUZZER 42
CHAPTER 4 SOFTWARE 43
4.1 EMBEDDED C 43
CHAPTER 5 RESULTS 59
CHAPTER 6 CONCLUSION & FUTURE SCOPE 62
REFERENCES 63
ABSTRACT
i
LIST OF FIGURES
3.6 ESP8266 25
4.1 THINGSPEAK 45
ii
LIST OF TABLES
NOMENCLATURE
iii
CHAPTER-1
INTRODUCTION
1.1 OBJECTIVE
In this project, we proposed an “IOT based smart and secure Traffic
management system using ARM microcontroller”. This system was implemented
based on present criteria that tracking three conditions in those one is heavy traffic
control and another one is making a root of emergency vehicle like ambulance and
VIP vehicle and finding theft or crime vehicle. Here the radio frequency identification
tags are attached to the each and every vehicle individually it cannot destroy or
removable. Apart from that when ambulance passes through the junction then
automatically we assign green light to that junction. And any crime vehicle
approaches then we can identify at what junction that theft vehicle presents then we
can catch that vehicle at that junction if possible otherwise we can catch it in the next
junction.
1.2 MOTIVATION
INDIA is a fast growing financial prudence it is the most populous country. It
is seen that terrible road congestion problems in cities. When the increase in the
growth in number of vehicles compared Infrastructure growth is slow, due to cost
bounds and space .Also, the scenario is different from the other Countries. In India
traffic control solutions required as it is non-lane based traffic. The negative effect of
congestion has to reduce traffic flow through smart management. One of the more
cost effective options is wireless networks.To provide cost better solutions
Technologies like, GSM RFID and XBeecan be used in traffic control. Using RFID
system can transfer information between RFID Reader and RFID tag through
electromagnetic energy. Some RFID systems have range to transfer information the
range is inches or centimeters, while some others may work for 100 meters or more.
Depending on requirement we can use different RFID readers. A GSM modem is a
just like a mobile phone it is special type of modem, which operates over a
subscription to a mobile operator as it accepts a SIM card. It can send SMS alert
whenever required. In this system we can use GPRS module also for alerts of
detection of crime vehicles.
1
1.3 THESIS ORGANIZATION
The thesis for the project, “IOT based smart and secure Traffic management
system using ARM microcontroller” is organized into several chapters to give precise
details about the project.
Chapter 1 in this, the objective of the project is discussed. Then the main motivation
behind the project is discussed.
Chapter 3 in this, the hardware technologies used in the project like ARM, Wi-Fi,
GSM, RFID technologies etc., are explained.
Chapter 7 inthis, the future scope andconclusion of the project are explained.
2
CHAPTER-2
LITERATURE SURVEY
3
This RFID technique deals with multivehicle, multilane, multi road junction
areas. It provides an efficient time management scheme, in which, a dynamic time
schedule is worked out in real time for the passage of each traffic column. The real-
time operation of the system emulates the judgment of a traffic policeman on duty.
The number of vehicles in each column and the routing are proprieties, upon which
the calculations and the judgments are done. The disadvantage of this work is that it
does not discuss what methods are used for communication between the emergency
vehicle and the traffic signal controller. In [9], it proposed a RFID and GPS based
automatic lane clearance system for ambulance. The focus of this work is to reduce
the delay in arrival of the ambulance to the hospital by automatically clearing the
lane, in which, ambulance is travelling, before it reaches the traffic signal. This can be
achieved by turning the traffic signal, in the path of the ambulance, to green when the
ambulance is at a certain distance from the traffic junction. The use of RFID
distinguishes between the emergency and non-emergency cases, thus preventing
unnecessary traffic congestion. The communication between the ambulance and
traffic signal post is done through the transceivers and GPS. The system is fully
automated and requires no human intervention at the traffic junctions. The
disadvantage of this system is it needs all the information about the starting point, end
point of the travel. It may not work, if the ambulance needs to take another route for
some reasons or if the starting point is not known in advance. Traffic is a critical issue
of transportation system in most of all the cities of Countries.In [11], currently a video
traffic surveillance and monitoring system commissioned in Bangalore city. It
involves a manual analysis of data by the traffic management team to determine the
traffic light duration in each of the junction.
2.2 EXISTING SYSTEM
In the existing design it is designed for getting the present location through GPS. But
Moving to desired place has become difficulty to the driver and also the predictions of
traffic density in that route.
4
CHAPTER-3
5
3.2 WOKING PRINCIPLE
BLOCK DIAGRAM:
In this system the block diagram shows how it will collects the information and
uploaded into the server. These all blocks are the major parts of this system.
6
(b) WIFI MODULE:
The CC2500 is a RF module and has transceiver, which provides an easy way
to use RF communication at 2.4 GHz. Every CC2500 is equipped with the ARM-7,
which contains Unique Identification Number (UIN). This UIN is based on the
registration number of the vehicle. One of the most important features is serial
communication without any extra hardware and no extra coding. Hence, it is a
transceiver as it provides communication in both directions, but only one direction.
The ARM-7 and CC2500 always communicate with ARM-7 via serial
communication. Rx pin of CC2500 is connected to TX (RC6) of microcontroller and
TX pin of CXC2500 is connected to Rx pin of microcontroller (RC7). Other two pins
are used to energize transceiver.
Features of Wi-Fi:
1. Operating frequency-2.4GHz.
2. Supply Voltage-2.8 to 3.4 V.
3. Urban range-100 ft.
4. RF data rate -250000bps.
This GSM modem is a highly flexible plug and play quad band GSM modem,
interface to RS232, it supports features like voice, data, SMS, GPRS.
(d) RFID:
Radio Frequency Identification (RFID) is an IT system that transmits signals
without the presence of physical gadgets in wireless communication. It is categorized
under automatic identification technology, which is well established protocol. The
working of an RFID system is very simple. The system utilizes tags that are attached
to various components to be tracked. The tags store data and information concerning
the details of the product of things to be traced. The reader reads the radio frequency
and identifies the tags. The antenna provides the means for the integrated circuit to
transmit its information to the reader. There are two types of RFID categories, active
and passive tags. The tags that do not utilize power are referred to as passive and they
are driven by an antenna that enables the tag to receive electromagnetic waves from a
reader. On the contrary, active tags rely on power and they have inbuilt power sources
that enable it to send and receive signals from RFID reader. RFID range depends on
transmit power; receive sensitivity and efficiency, antenna, frequency, tag
orientations, surroundings. Typically, the RFID range is from a few centimeters to
over hundred meters. FID reader uses frequency 125 KHz with a range of 10 cm.
(e) LCD DISPLAY:
8
(f) BUZZER:
Working:
Under the proposed work, each intersection contains RFID reader. Each lane
has its RFID to track the vehicles to passing through it. Each RFID reader has its own
data base to store the information regarding to vehicles that passes from it with
timestamp and traffic light. Every vehicle has a RFID enabled device that stores a
vehicle identification number (VIN). Every vehicle has its unique VIN number that
provides the information that regarding the priority of vehicle and type of vehicle.
With the help of VIN we can uniquely identify the vehicle and its owner. Vehicle
Identification Number In the proposed work RFID, tag will store vehicle
identification number. These numbers is divided in three parts. First part represents
the priority of the vehicles. Next part represents the type of vehicle and next, digit
represents the vehicle number. In the proposed work, different types of vehicles have
different type of priorities.
Vehicles are divided into 4 categories. First system category includes
Ambulance, Fire brigade vehicles and VIP vehicles. These vehicles have a highest
priority. The second category includes the buses school and colleges buses. These
buses need to reach their destination on time so these vehicles also need a fast service.
Third category includes the car, motorcycle and scooter and forth category includes
the heavy vehicles. Day time priority of 3rd category is high as compare to 4th
category but during night hours the priority of heavy vehicles is high.
9
3.3 SCHEMATIC DIAGRAM
This schematic diagram is drawn by using Proteus software. Port 0 and Port 1 pins of
ARM 7 Microcontroller are used to connect different modules such as GSM module,
WIFI module, LCD display, RFID reader and Traffic signals at junction.
10
3.4 FLOWCHART
11
Explanation:
In this system whenever a vehicle going to enter into the junction then RFID reader
will scans the VIN number which resides in RFID tag of that vehicle. Here it having
three casesthis scanned number verified by ARM microcontroller.
Case (i): If this VIN number is matched with emergency/VIP vehicles then it
increments vehicle count and rises the interrupt i.e., italerts with a buzzer sound , then
controller will gives the priority for this side of junction after passing the vehicle only
it will rotates the signals based on vehicle count and interrupt and uploads traffic
density into internet.
Case (ii): If this VIN number is matched with any stored theft/ crime vehicles
numbers then it increments the vehicle count and sends a SMS to the police control
room with a buzzer alert, thenit will rotates the signals based on vehicle count and
interrupt and uploads traffic density into internet. By using this we can easily catch
the vehicle at next possible junction.
Case (iii): If this VIN number is authorized then it only increments vehicle count
thenit will rotates the signals based on vehicle count and interrupt and uploads traffic
density into internet.
In this way depending upon density the traffic signal duration at each side will be
changed at the junction and this information will be uploaded into the internet so that
any user can access the traffic information.
HARDWARE DESIGN
3.5.2 RISC
One cycle execution time: each instruction of CPU was optimized due
to CPI (clock per instruction) of one cycle of RISC processors.
Pipelining: It is a technique at which instructions are divided into
different stages (fetching, decoding, execution etc.) or parts and then
executed simultaneously.
Large number of registers: A RISC processor consists of large
number of registers to prevent in large amounts of interactions with
memory.
ARM Architecture:
Microcontroller Architectures:
13
To meet requirements of embedded applications ARM is having based upon RISC
Architecture with enhancements:
CISC RISC
14
3.5.4 ARM Bus Technology
1. Bus Master: Across the same bus it initiates date transfer with another device as a
logic device (here bus Master is a ARM Processor).
2. Bus Slave: From a bus master device it transfers request (here bus slaves are
peripherals).
15
Thumb is a unique architectural strategy which employed by The
ARM7TDMI-S processor, suited to for high-volume applications it suits well with
restrictions of memory, or applications like code density is plays a key role
The Thumb set‟s 16-bit instruction length allows it to approach twice the density of
standard ARM code. Up to 65 % of the code size of ARM the thumb code is able to
provide allows for full speed execution the flash implementation in the
LPC2141/42/44/46/48 allows also in ARM mode. For short code sections and
16
performance critical it was recommended (such as and DSP algorithms and interrupt
service routines) in ARM mode. That resulted on the overall code size will be low but
30% speed can be increased over Thumb mode.
The LPC2148 having a 512 kB flash memory system. For both code and data
storage of data and code this memory useful. In several ways the programming of
flash memory accomplished. By using the serial port it may be programmed in the
system. While application is running the application program can erase in flash, it
allows data storage field or flexibility of upgrades of firmware, etc. The LPC2148
processor‟s flash memory provides 20 years of data-retention and its erase/write
cycles minimum of 100,000.
Here also for data storage and/or code On-chip static RAM may be used. As
32-bit SRAM may be accessed. A 32 kB of static RAM is provided by the LPC2148
processor respectively. In the processor LPC2148, for data storage and code storage,
data storage and execution USB can also be used as a general purpose RAM 8 kB
SRAM block intended to utilized.
Interrupt sources
Dedicated to the Vectored Interrupt Controller each peripheral device has one
interrupt line, but may contain several internal interrupt flags. These Individual
interrupt flags may also recommended more than one interrupt source.
17
3.6.3 Fast general purpose parallel I/O (GPIO) and its features
The GPIO registers can control the device pins which are not connected to a
specific function. Pins may be dynamically configured as inputs or outputs. Separate
registers allow setting or clearing any number of outputs simultaneously. The current
state of the port pins and read back may be identified by the value of the output
register. Over prior LPC2000 devices the LPC2148 processor introduced the
accelerated GPIO functions:
• For the fastest possible I/O timing in the processor the GPIO registers are relocated
to the ARM local bus.
• Leaving other bits unchanged mask registers allow sets of port bits as a group.
GPIO Features
The LPC2148 processor having two analog to digital converters. These two
converters are using single 10-bit successive approximation analog to digital
converters. While ADC0 contains 6 channels, ADC1 contains 8 channels.
ADC Features
• More than 400,000 10-bit samples per second can possible by each converter.
18
3.6.5 10-bit DACand its features
DAC Features
• 10-bit DAC.
• Buffered output.
The USB is a 4-wire serial bus that supports communication between a host
and a number (127 max) of peripherals. The host controller allocates the USB
bandwidth to attached devices through a token based protocol. The bus supports hot
plugging, unplugging, and dynamic configuration of the devices. All transactions are
initiated by the host controller.
The LPC2148 is equipped with a USB device controller that enables 12Mbit/s
data exchange with a USB host controller. It consists of a register interface, serial
interface engine, endpoint buffer memory and DMA controller. The serial interface
engine decodes the USB data stream and writes data to the appropriate end point
buffer memory. The status of a completed USB transfer or error condition is indicated
via status registers. An interrupt is also generated if enabled. A DMA controller
(available in LPC2146/48 only) can transfer data between an endpoint buffer and the
USB RAM.All transactions are initiated by the host controller in this LPC2148
processor of USB device controller.
USB Features
19
• Endpoint maximum packet size selection by software at run time.
• RAM message buffer size based on endpoint realization and maximum packet size.
The LPC2148 processor having two UARTs. The LPC2148 UART1 also
provides a full modem control handshake interface along with receive and
transmission lines. UARTs in LPC2148 having a fractional baud rate generator for its
both UARTs which feature is not available in LPC2000 microcontrollers , and 9600 is
the standard baud rate, apart from in hardware (UART1 in LPC2148 only) the auto
CTS/RTS flow-control functions fully implemented .
UART Features
• Without a need for external crystals Built-in fractional baud rate generator covering
wide range of baud rates of particular values.
20
I2C Features
• To communicate via one serial bus there are several bit rates which allowed by
Serial clock synchronization.
• To suspend and resume serial transfer Serial clock synchronization uses a handshake
mechanism
• For test and diagnostic purposes the I2C-bus can be used for several applications
because of no central master.
To reset the microcontroller within a predetermined time watch dog timer can
be used. When enabled, the watchdog will generate a system reset if the user program
fails to „feed‟ (or reload) then watchdog timer is going to reset the system it is done
when the watchdog reaches predetermined amount of time.
• It usesDebug mode.
When normal or idle operating mode is selected the real time clock is going to
provide a set of counters to measure the time. The main purpose of real time clock is
to use very little power which is nothing but supplied by battery powered system this
is useful where CPU is in idle mode.
21
RTC Features
• It canProvides Seconds, Minutes, Hours, Day of Week, Day of Month, and Day of
Year of duration.
• XTAL1 Programmable reference clock divider allows fine adjustment of the RTC
which available at external crystal/oscillator input.
P0.0 to P0.31 I/O Port 0: Port 0 is a 32-bit I/O port with individual direction
controls for each bit. Total of 31 pins of the Port 0 can be used as a general purpose
bidirectional digital I/Os while P0.31 is output only pin. The operation of port 0 pins
depends upon the pin function selected via the pin connect block.
These pins are P1.0 to P1.31 I/O. For each bit port 1 is used as a 32-bit
bidirectional I/O port. Via the pin connect block the pin functions can be selected
depends upon that operations of port 1 pins assigned.
In this project to Easy VR module the pins are connected P0.8, P0.9 are used.
These pins are connected To connect DTMF Decoder processor uses pins P0.10,
P0.11, P0.12, P0.13, and to motor driver L293D P0.14. P0.20, P0.21, P0.22, and
P0.23 are connected.
Port 1: These pins are P1.0 to P1.31 I/O. For each bit port 1 is used as a 32-bit
bidirectional I/O port. Via the pin connect block the pin functions can be selected
depends upon that operations of port 1 pins assigned.To interfaced with LCD the
processor uses pins P1.16, P1.17, P1.18, P1.19, P1.20, and P1.21. Pins 61 and 62
connected to 50MHz crystal Oscillator is connected to 61 and 62 pins of processor
and to reset the ARM-7 controller pin 57 used.
22
Total of 31 pins of the Port 0 can be used as a general purpose bidirectional
digital I/Os while P0.31 is output only pin of LPC2148 processor.
ESP8266 was designed by the Chinese company Espressif Systems for uses in
Internet of Things (IOT) systems. ESP8266 is a complete Wi-Fi system on chip that
incorporates a 32-bit processor, some RAM and depending on the vendor between
512KB and 4MB of flash memory. This allows the chip to either function as a
wireless adapter that can extend other systems with Wi-Fi functionality, or as a
standalone unit that can by itself execute simple applications. Depending on the
specific module variant (ESP-1 to ESP-12 at the time of this thesis) between 0 and 7
General Purpose Input/output (GPIO) pins are available, in addition to Rx and Tx pins
of the UART, making the module very suitable for IOT applications. The Software
Development Kit (SDK) provided by Espressif contains a lightweight implementation
of a TCP/IP control stack (lwIP) for Wi-Fi communication. The modules houses
libraries for optional services such as Dynamic Host Configuration Protocol (DHCP),
Domain Name System (DNS), and JavaScript Object Notation signal transmission,
encapsulation, encryption, collision management and roaming functionality. The chip
generally comes as part of a module, soldered to a Printed Circuit Board (PCB),
24
however it is possible to purchase only the chip itself in order to create a truly custom
module. The module variants currently available on the market may include an
antenna (PCB or ceramic) or a U-FL connector
The module comes in many different variations (ESP-01 to ESP-12), along with non-
Espressif vendors such as Olimex and NodeMCU. The main differences between
these modules are size and additional components of the PCB, with some having an
inbuilt PCB antenna and up to 7 GPIO pins, while others provide no easy access to
GPIO and no antenna, but at a lower cost and module dimensions. The processor
inside the module is a low power, 80MHz, 32bit TensilicaXtensa LX. It is classified
as a DPU, which is Tensilicas own type of CPU combining the strengths of a
traditional CPU and a DSP to achieve better performance for data-intensive tasks.
Multiple compilation tools exist for this processor with the ESP community even
attempting to design their own version of gcc compiler to achieve more efficient code
density and better performance. The amount of programmable memory varies
depending on the module manufacturer, but generally ESPs come with 512 KB, 1MB,
2MB or 4MB of flash memory. ESP8266 is interrupt driven, with a relatively simple
OS and three levels of task priority, meaning that only three user tasks that can
respond to interrupts can be defined. A function user_init() configures the module
once its provided with power, and can be used to schedule the next task, or define a
fully event-driven configuration.
Fig 3.6ESP8266
25
The module used in this thesis is an Olimex MOD-WIFI-ESP8266-DEV with all of
the basic components of ESP8266, a PCB antenna, crystal and an easily accessed
UART with support for SPI and I2C, 2Mbytes of flash, but more importantly for this
thesis it has all the available chip pins mapped out for easier access.
Being a Wi-Fi SoC, this chip requires a fair amount of power to operate its
transceiver. It has incorporated some impressive power management features,
including highly integrated components that allow for greater optimization and
increased efficiency. All this makes ESP8266 one of the least power-hungry chips in
the Wi-Fi IC industry! Unfortunately its levels of demand are still higher than of those
based on wireless technologies such as Bluetooth, or ZigBee. The official ESP8266
datasheet states this regarding current draw
However this is just the power consumption of the ESP8266EX chip, the entire
module, featuring additional hardware such as LEDs, crystals, capacitors and registers
revealed that actual consumption of the MOD-WiFi-ESP8266-DEV varied greatly
from this table. The approximate idle (while ready to receive packets) current of the
module was measured to be 70mA, with somewhat higher when receiving packets in
802.11n mode. Transmission drew 80mA current.
The module was also prone to high current spikes in the range of 300mA at
unpredictable points in time, often causing a full module restart. This problem does
seem to have been dealt with in most recent SDK, however most manufacturers still
26
choose to add additional capacitances parallel to power supply in order to prevent
such instances from occurring. The ESP8266 can operate in a total of 3 power saving
modes all of which sacrifice a portion of functionality to achieve lower power
consumption. These modes are: Light Sleep Modem Sleep Deep Sleep The Light
and Modem modes are so called Wi-Fi sleep modes. They are designed to be used
when the module is in STA mode, meaning it does not have to actively send beacons
to announce its presence and verify clients‟ statuses. The Light Sleep Wi-Fi mode is
to be used when the module needs to maintain WLAN connection without actively
transmitting or receiving data, allowing the CPU to operate at a lower voltage (or be
suspended altogether) and turning off the Wi-Fi modem between AP status beacons.
This would allow the module to save power while still answer to beacons, effectively
maintaining the wireless connection. In this mode a DTIM3 setup at the AP, with
300ms sleep and 3ms wake cycle can, according to the datasheet, lower power
consumption to 0.9mA [15]. Modem Sleep is used when the CPU needs to be active.
In this mode the Wi-Fi modem is turned off between the AP status beacons,
maintaining the connection at minimal cost while allowing the CPU to perform
without interference. A similar DTIM3 setup as in previous example leaves the
current consumption at 15mA [15]. The Deep Sleep turns of all functionality (CPU
and Wi-Fi modem), while maintaining only the RTC clock, allowing the module to be
woken up by a timed interrupt. When waking up, the module performs a complete
reset, meaning all RAM data is erased (although there is limited space in RTC
memory block that does not get erased) and the Wi-Fi connection needs to be re-
established. Espressif claims a 300s sleep and 1s wake cycle (claimed as enough to
connect to AP) results in average consumption of less than 1mA [15]. Important to
note is that Wi-Fi sleep-modes described above may not always be true. In test
conducted in this thesis they only seemed to lower the power consumption to 20-
50mA in Light Sleep and 40mA in Modem Sleep. Although conventional Deep Sleep
resulted in an average of 10uA, there were instances when the deep-sleep sequence
seemed to execute in an incorrect manner, leaving the power consumption at standby
levels (~80mA). This issue has been known to Espressif that has promised to address
it in future releases of the SDK. It should also be noted that the module is specified
for voltages between 1.7V and 3.6V, meaning it can be powered by two AA alkaline
27
batteries placed in series (achieving 3V). However the ESP will not work with a
Lithium Ion (or LiPo) based batteries without additional power regulating circuits.
ESP8266 has multiple peripherals through which it can interface with other modules
in a classic embedded fashion. In this section only the setup of the communication
link will be presented, since the exact flow of bits to achieve such communication was
handled automatically by the module and is therefore deemed of no immediate
interest for this thesis. In this case classical UART was used to decode output and
encoding data to be sent to the sensor. Similarly EM50 data logger has an UART of
its own and can do the same thing on its end. Serial asynchronous communication
does not require a common clock, however in order for the data to be processed
correctly and at right intervals a common baud rate (can be viewed as symbols per
second) needs to be set for both devices. The baud-rates supported by ESPs UART
component range from 9600 to 921600bps, while the EM50 is configured for 9600bps
as default.
28
3.10 GSM TECHNOLOGY
Digital cellular technology used for transmitting mobile voice and data
services GSM (Global System for Mobile communications) is used. In Europe and
other parts of the world GSM (Global System for Mobile communication) is a digital
mobile telephone system that is widely used.
29
Table 3.3 Development of Mobile phone System
3.10.3 History
To develop a standard for a mobile telephone system that could be used across
Europe in 1982, the European Conference of Postal and Telecommunications
Administrations (CEPT) created the Group Special Mobile (GSM). To develop a
common cellular telephone system across Europe in 1987,a memorandum of
understanding was signed by 13 countries. By SINTEF lead by TorleivMaseng was
selected finally for creating the system.
Responsibility was transferred to the European Telecommunications Standards
Institute (ETSI) and phase I of the GSM specifications were published in 1990 to
GSM. In 1991 the first GSM network was launched by Radiolinja in Finland.
Over a million subscribers were using GSM phone networks being operated
by 70 carriers across 48 countries by the end of 1993. In more than 100 countries,
GSM service was available as of the end of 1997.
30
3.10.4GSM/GPRS module
GSM/GPRS MODEM is a class of wireless MODEM devices that are designed for
communication of a computer with the GSM and GPRS network. It requires a SIM
(Subscriber Identity Module) card just like mobile phones to activate
communication with the network. Also they have IMEI (International Mobile
Equipment Identity) number similar to mobile phones for their identification. A
GSM/GPRS MODEM can perform the following operations:
31
Mobile Station (Cell phones and SIM)
A mobile phone and Subscriber Identity Module (SIM) together form a mobile
station. It is the user equipment that communicates with the mobile network. A
mobile phone comprises of Mobile Termination, Terminal Equipment and Terminal
Adapter.
32
3.10.7 SIM800 GSM Modem key features and Software features10
SIM800L module key feature
Quad-band 850/900/1800/1900MHz
GPRS multi-slot class 12/10
GPRS mobile station class B
Meet the GSM 2/2 Standard
FM: Frequency range 76 ~ 109MHz, 50KHz tuning step
Size: 15.8 * 17.8 * 2.4 mm
Weight : 1.35g
Control via AT commands (3GPP TS 27.007, 27.005 and SIMCOM enhanced AT
command set )
Supply voltage range : 3.4 ~ 4.3V
Low power consumption
Operating temperature range : -40 ~ 85 c
SIM800L module Software features
0710 MUX protocol
Embedded TCP / UDP protocol
FTP / HTTP
MMS
E-mail
DTMF detection
Interference detection
Voice
33
3.11 RFID (RADIO FREQUENCY IDENTIFIER)
3.11.1 Introduction
34
and forms and can be read through most materials with the exception of conductive
materials like water and metal, but with modifications and positioning even these can
be overcome.
1) Passive tags
Passive tags are generally smaller, lighter and less expensive than those that are active
and can be applied to objects in harsh environments, are maintenance free and will
last for years. These transponders are only activated when within the response range
of a reader. The RFID reader emits a low-power radio wave field which is used to
power up the tag so as to pass on any information that is contained on the chip.
2) Active tags
Active tags differ in that they incorporate their own power source, where as the tag is
a transmitter rather than a reflector of radio frequency signals which enables a broader
range of functionality like programmable and read/write capabilities.
3) Semi-passive tags
Semi-passive tags are similar to active tags in that they have their own power source,
but the battery only powers the microchip and does not power the broadcasting of a
signal. The response is usually powered by means of backscattering the RF energy
from the reader, where energy is reflected back to the reader as with passive tags.
3.11.3 RFID reader/ Interrogator
An RFID reader typically contains a module (transmitter and receiver), a control unit
and a coupling element (antenna). The reader has three main functions: energizing,
demodulating and decoding. In addition, readers can be fitted with an additional
interface that converts the radio waves returned from the RFID tag into a form that
can then be passed on to another system, like a computer or any programmable logic
35
controller. Anti-Collision algorithms permit the simultaneous reading of large
numbers of tagged objects, while ensuring that each tag is read only once.
RFID operates in several frequency bands. The exact frequency is controlled by the
Radio Regulatory body in each country.
EM-18 RFID Reader Module is the one the most commonly used module for Radio
Frequency Identification Projects. It features Low Cost, Small Size, Low Power
Consumption and Easy to use.
The EM-18 RFID Reader module generates and radiates RF Carrier Signals of
frequency 125 KHz through its coils. When a 125KHz Passive RFID Tag (have no
battery) is brought in to this field, will get energized from it. These RFID Tags are
usually made using a CMOS IC EM4102. It gets enough power and master clock for
its operations from the electromagnetic fields produced by RFID Reader.
37
3.11.6 Applications
RFID tags are useful for a huge variety of applications. Some of these
applications include: supply chain management, automated payment, physical access
control, counterfeit prevention, and smart homes and offices. RFID tags are also
implanted in all kinds of personal and consumer goods, for example, passports,
partially assembled cars, frozen dinners, ski-lift passes, clothing, and public
transportation tickets. Implantable RFID tags for animals allow concerned owners to
label their pets and livestock. Verichip Corp. has also created a slightly adapted
implantable RFID chip, the size of a grain of rice, for use in humans. Since its
introduction, the Verichip was approved by the U.S. Food and Drug Administration
The LCD requires 3 control lines as well as either 4 or 8 I/O lines for the data
bus. The user may select whether the LCD is to operate with a 4-bit data bus or an 8-
bit data bus. If a 4-bit data bus is used the LCD will require a total of 7 data lines (3
control lines plus the 4 lines for the data bus).
38
3.12.1 LCD Pin description
The three control lines are referred to as EN, RS, and RW. The EN line is
called "Enable." This control line is used to tell the LCD, data is sending. To send
data to the LCD, the program should make sure this line is low (0) and then set the
other two control lines and/or put data on the data bus. When the other lines are
completely ready, bring EN high (1) and wait for the minimum amount of time
required by the LCD datasheet (this varies from LCD to LCD), and end by bringing it
low (0) again.
39
The RS line is the "Register Select" line. When RS is low (0), the data is to be
treated as a command or special instruction (such as clear screen, position cursor,
etc.). When RS is high (1), the data being sent is text data which should be displayed
on the screen. For example, to display the letter "T" on the screen need set RS high.
The RW line is the "Read/Write" control line. When RW is low (0), the
information on the data bus is being written to the LCD. When RW is high (1), the
program is effectively querying (or reading) the LCD. Only one instruction ("Get
LCD status") is a read command. All others are write commands--so RW will almost
always be low.
Circuit Description:
Above is the quite simple schematic. The LCD panel's Enable and Register
Select is connected to the Control Port. The Control Port is an open collector / open
drain output. While most Parallel Ports have internal pull-up resistors, there is a few
which don't. Therefore by incorporating the two 10K external pull up resistors, the
circuit is more portable for a wider range of computers, some of which may have no
internal pull up resistors.
The connections make no effort to place the Data bus into reverse direction.
Therefore hard wire the R/W line of the LCD panel, into write mode. This will cause
no bus conflicts on the data lines. As a result cannot read back the LCD's internal
Busy Flag which tells us if the LCD has accepted and finished processing the last
40
instruction. This problem is overcome by inserting known delays into program. The
10k Potentiometer controls the contrast of the LCD panel.
SETB RW:
Handling the EN control line: As mentioned above, the EN line is used to tell
the LCD that are ready for it to execute an instruction that prepared on the data bus
and on the other control lines. Note that the EN line must be raised/ lowered
before/after each instruction sent to the LCD regardless of whether that instruction is
read or write text or instruction.
CLR EN:
And once finished setting up instruction with the other control lines and data
bus lines, always bring this line high
SETB EN:
The line must be left high for the amount of time required by the LCD as
specified in its datasheet. This is normally on the order of about 250 nanoseconds, but
checks the datasheet. In the case of a typical microcontroller running at 12 MHz, an
instruction requires 1.08 microseconds to execute so the EN line can be brought low
the very next instruction
While it is possible to write code that waits for a specific amount of time to
allow the LCD to execute instructions, this method of "waiting" is not very flexible. If
the crystal frequency is changed, the software will need to be modified. A more robust
method of programming is to use the "Get LCD Status" command to determine
whether the LCD is still busy executing the last instruction received.
41
3.13BUZZER
42
CHAPTER 4
SOFTWARE
4.1 EMBEDDED C
Embedded C uses most of the syntax and semantics of standard C, e.g., main()
function, variable definition, data type declaration, conditional statements (if, switch,
case), loops (while, for), functions, arrays and strings, structures and union, bit
operations, macros, etc.
43
It supports access to I/O and provides ease of management of large embedded
projects.
Java is also used in many embedded systems but Java programs require the
Java Virtual Machine (JVM), which consume lot of resources. Hence it is not
used for smaller embedded devices.
After all, it is easier to understand complex algorithms and their associated math
when you start with an intuitive grasp of how those algorithms work.
The term “Internet of Things” (IOT), coined by Kevin Ashtonin1999, has been
in use for several years and continues to be of interest, specifically when it comes to
technological progress. But what exactly is the IOT? Essentially, it refers to giving
objects representation in the digital realm through giving them a unique ID and
connecting them in a network. In other words, these things are connected to the
internet and are able to automatically transfer data without relying on human
interaction. Hence being “Machine to Machine” (M2M) interaction. Essentially,
M2M interaction enables networked devices to exchange data and perform actions
without the input or assistance of humans, for instance in remote monitoring. But this
is not necessarily the case. For instance, one can envision the IOT to become an
important feature of the „home of the future‟, where one can begin pre-heating the
oven just before they get home from work via a (mobile) application. Hence, the IOT
has many interesting applications that can be applied to both individuals and
corporations.
A deeper level of what occurs, especially on the server side, can be seen in Figure
6.3.1. When a device sends data through a HTTP request (communication), it is
processed by the IOT service (in this case Thingspeak), which communicates with
a virtual server. Both the server and the IOT service communicate directly with the
application. Finally, at all levels of communication from the device to the application
there is both requirements regarding security and management of the data transfer.
The µVision IDE from Keil combines project management, make facilities,
source code editing, program debugging, and complete simulation in one powerful
environment. The µVision development platform is easy-to-use and helping quickly
create embedded programs that work. The µVision editor and debugger are integrated
in a single application that provides a seamless embedded project development
environment.
45
1) Starting a new Assembler Project
1. Select New Project from the Project Menu.
2. Name the project „Toggle.a51‟
3. Click on the Save Button.
46
7. Scroll down and select the LPC2148
8. Click OK
47
2) Creating Source File:
1. Click File Menu and select New.
48
3. Copy the example to the Right into the new window. This file will toggle Ports 1
and with a delay.
4. Click on File menu and select Save as…
5. Name the file Toggle.a51
6. Click the Save Button
Adding File to the Project
1. Expand Target 1 in the Tree Menu
2. Click on Project and select Targets, Groups, and Files…
3. Click on Groups/Add Files tab
4. Under Available Groups select Source Group 1
5. Click Add Files to Group… button
6. Change file type to Asm Source file (*.a*; *.src)
7. Click on toggle.a51
8. Click Add button
9. Click Close Button
10. Click OK button when return to Target, Groups, Files… dialog box
11. Expand the Source Group 1 in the Tree menu to ensure that the file was added to
the project
49
3) Creating HEX for the Part:
1. Click on Target 1 in Tree menu
2. Click on Project Menu and select Options for Target 1
3. Select Target Tab
4. Change Xtal (Mhz) from 50.0 to 11.0592
5. Select Output Tab
6. Click on Create Hex File check box
7. Click OK Button
8. Click on Project Menu and select Rebuild all Target Files 9. In the Build Window it
should report „0 Errors (s), 0 Warnings‟
10. Now ready to Program Part
4) Testing Program in Debugger:
1. Comment out line ACALL DELAY by placing a Semicolon at the beginning. This
will allow seeing the port change immediately.
2. Click on the File Menu and select Save
3. Click on Project Menu and select rebuild all Target Files
4. In the Build Window it should report „0 Errors (s), 0 Warnings‟
5. Click on Debug Menu and Select Start/Stop Debug Session
50
5) Running the Keil Debugger:
1. The Keil Debugger should be now be Running.
2. Click on Peripherals. Select I/O Ports, Select Port 1
3. A new window should port will pop up. This represents the Port and Pins
4. Step through the code by pressing F11 on the Keyboard. The Parallel Port 1 Box
should change as completely step through the code.
5. To exit out, Click on Debug Menu and Select Start/Stop Debug Session
6) Downloading Hex File into MCU Board:
Through Serial Port of computer PCthe program flash magic is connected with
MCU th is is the method to download Hex File into Flash Memory of MCU in Board .
Proceeding to Download Hex File into MC:
1. Interface RS232 Cable between RS232 Serial Port of PC and Board UART-0
(CN3).
2. Supply power into board; in this case, can see red LED1 is in status ON.
3. Set jumper BR4 (INT1) in ON state.
4. Run Program Flash Magic, it will display result as shown in Figure 1.1
5. Start setting the initial values into program as desired, so configure values into
program as follows;
i) Select COM port corresponding with (in this example, it is COM1)
ii) Set the baud rate to 9600
iii) Set Device to be LPC2148
iv) Set Interface to be None ISP
v) Set Crystal Oscillator with MHz corresponding with the value
internal Board. In this case, it is 12.000MHz, so must set to be 12.
vi) Press ISP LOAD Switch (S1) and RESET Switch (S2) on Board “ARM7
LPC2148 Development Board” to reset MCU to run in Boot Loader
following the processes;
Press ISP LOAD Switch (S1) and hold
Press RESET Switch (S2) while ISP LOAD Switch (S1) is
being held.
Remove RESET Switch (S2) but ISP LOAD Switch (S1) is
being held.
7. Select format of erasing data to be “Erase all Flash + Code Rd Prot”.
51
7. Set Option to be “Verify after programming”.
8. Click “Browse” to select HEX File for downloading.
9. Click “Start”, Program Flash Magic will start downloading data into MCU
instantly. In this case, can see the status operation at Status Bar and must wait
for the operation until it is completed.
10. When the operation of program is complete, press RESET Switch (S2) on
Board and MCU will start running follow the downloaded program instantly.
52
53
54
55
56
57
58
CHAPTER 5
RESULTS
5.1 RESULTS
The proposed system was fully developed and tested to demonstrate its feasibility and
effectiveness. The screenshots of the developed system has been presented in Figure.
1. Application kit which is present at Traffic junction
59
3. Home page of THINGSPEAK platform.
4. After sign in with specified user id and password it will displays channels list .
60
5. Then click on IOT Traffic channel then it displays the information.
6. In IOT Traffic channel the Traffic at that particular junction will be displayed and it
will be updated for every 15-20 sec of duration.
61
CHAPTER 6
62
REFFERENCES:
63
International Journal of Applied Sciences, Engineering and Management
ISSN 2320 – 3439, Vol. 05, No. 06, November 2016, pp. 216– 220
Abstract: In this paper, we implement an Intelligent Traffic Control for Congestion, Ambulance clearance, and
Stolen Vehicle Detection. This framework was actualized in view of present criteria following the three
conditions. In those one is overwhelming activity control and another is making a foundation of crisis vehicles
like rescue vehicle and VIP vehicle and discovering robbery or wrongdoing vehicle. Here each individual
vehicle is furnished with uncommon radio frequency identification (RFID) tag (set at a vital area), which makes
it difficult to expel or annihilate. We utilize ARM7 framework on-chip to peruse the RFID labels appended to
the vehicles. It tallies number of vehicles that passes on a specific way amid a predetermined span. If there is a
match then it can identify the stolen vehicle. GSM SIM800 is utilized for sending a message to the police
control room and also when an emergency vehicle moving towards the intersection, it will impart the movement
controller in the intersection to turn on the green light. Here the framework routinely transfers the activity data
to the IOT server in secure way, which empowers everybody to get information about that traffic junction IOT
server.
INTRODUCTION
INDIA is a standout amongst the most crowded points of interest of the proposed system. Segment VI
Countries in the World and is quickly developing shows the experimental results of this work.
money related judiciousness. It have been seen that Internet of Things (IOT) is an emerging research
loathsome street clog issues in urban communities. standard and apparently the discovery of its body of
Framework development is ease back when contrasted knowledge is still in an infancy stage. So, the exact
with the development in number of vehicles, because definition, architecture, scope, and standard are still
of space and cost limits. It needs an activity control not concretely defined and many literatures on IOT
arrangements, which are not quite as same as alternate have been published in recent years. However, most
Countries? Savvy administration of activity streams scholars agree on the idea of expanding and
can lessen the negative impact of blockage. As of late, interpreting the pioneering conceptual definition of
remote systems are generally utilized as a part of the Kevin Ashton who defined IOT as “a standardized
street transport as they give more practical way for computer to understand the real world”. With
alternatives. Advances like XBee, GSM and RFID a key feature to create a smart environment together
can be utilized as a part of movement control to give with quick response to support certain decisions
cost better arrangements. RFID framework is a remote and/or operations of human, IOT based systems have
innovation that utilizations radio recurrence been proposed in several applications such as
electromagnetic vitality to convey data between the supporting disabilities, managing diabetes therapy,
RFID tag and RFID reader. Some RFID frameworks building smart home, improving safety in mining
will just work within the range of inches or operations, and using IOT for an intelligent
centimeters, while others may work for 100 meters or relationship and is sometimes interchangeably used
more. A GSM modem is a unique sort of modem, with a Ubiquitous Computing (or Ubicomp).The term
which acknowledges a SIM card and works over a IOT has a strong connection to enable communication
membership to a portable administrator, much the among objects. It is used rather in a broader sense for
same as a cell phone. The entire venture is assembled defining smart ecology than IOT. For example,
into 5 sections. Section II discusses the related work. applying sensor technology to capture data to make a
Section III talks about the present issues that exist in certain response is Ubicomp but not IOT. The simple
clearing a path to a rescue vehicles and different equation to describe IOT is,
vehicles. It additionally discusses how the proposed IOT= Physical Object + Controller, Sensor, Actuators
model will conquer the issues confronted in creating + Internet
Countries and created nations. Section IV gives the From the equation above, the Internet of Things can
execution be compared to the communication of human. For
instance, human have biological sensors such as ears,
eyes, skin, taste buds, etc. to perceive what is time and should stop. This is brought over-immersion
happening in their surroundings. Human use body [12], [13]. In [8], the utilization of RFID movement
parts to make and receive sounds and require a name control to maintain a strategic distance from issues
to enable others to get an attention. Communication that as a rule emerges with standard activity control
can only succeed when the communication medium frameworks, particularly those identified with picture
exists e.g. telephony network, mobile network, and preparing and shaft intrusion procedures are talked
air. In order to let things carry the property similar to about. The quantity of vehicles in every segment and
human‟s, sensors need to be attached to physical the directing are legitimacies, whereupon the
objects being considered. Objects, both sender and estimations and the judgments are finished. The
receiver, must have names, and digital communication detriment of this work is that it doesn't examine what
is required as depicted in my project focuses on the strategies are utilized for correspondence between the
communication between traffic lights and RFID crisis vehicle and the activity flag controller. In [9], it
technology is applied to traffic lights for them to act proposed a RFID and GPS based programmed path
as an „eye‟ to count identified tags, i.e. vehicles.. freedom framework for rescue vehicle. The
Traffic lights name each other by calling RFID concentration of this work is to lessen the deferral in
Reader name. One of the contributions of IOT to landing of the rescue vehicle to the healing center via
human operations in this scenario is that it can replace naturally clearing the path, in which, emergency
human in doing tedious exhaustive work. For vehicle is going, before it achieves the activity flag.
example, traffic data can be collected and sent out This can be accomplished by turning the activity
persistently, which is nearly impossible when manual motion, in the way of the emergency vehicle, to green
communication is applied. when the rescue vehicle is at a specific separation
Literature Survey from the movement intersection. The utilization of
RFID recognizes the crisis and non-crisis cases, along
Activity blockage is a noteworthy issue in urban areas these lines anticipating superfluous movement clog.
of creating Countries like India. Development in The correspondence between the rescue vehicle and
urban populace and the white collar class fragment movement flag post is done through the handsets and
contribute essentially to the rising number of vehicles GPS. The framework is completely robotized and
in the urban areas [6]. Blockage on streets in the long requires no human mediation at the activity
run outcomes in moderate moving activity, which intersections. The impediment of this framework is it
builds the season of travel, in this way emerges as one needs all the data about the beginning stage, end
of the significant issues in metropolitan urban purpose of the travel. It may not work, if the
communities. In [7], green wave framework was emergency vehicle needs to take another course for a
examined, which was utilized to give freedom to any few reasons or if the beginning stage is not known
crisis vehicle. A 'green wave' is the synchronization of ahead of time. Movement is a basic issue of
the green period of activity signs. With a 'green wave' transportation framework in above all the urban
setup, a vehicle going through a green flag will keep communities of Countries. This is particularly valid
on receiving green flags as it goes not far off. for Countries like India and China, where the
Notwithstanding the green wave way, the framework populace is expanding at higher rate as show in figure
will track a stolen vehicle when it goes through a 1. For instance, Bangalore city has seen an incredible
movement light. Preferred standpoint of the development in vehicle populace as of late. Thus, a
framework is that GPS inside the vehicle does not large number of the blood vessel streets and crossing
require extra power. The greatest inconvenience of points are working over the limit (i.e., v/c is more
green waves is that, when the wave is irritated, the than 1) and normal voyage speeds on a portion of the
aggravation can brings about movement issues that key streets in the focal ranges are lower than 10 Km/h
can be exacerbated by the synchronization. at the pinnacle hour.
IOT- RFID testbed for supporting traffic light control
[1] The paper investigates a prototype development of
Internet of Things (IoT) application for traffic
management. The retrofitted traffic light control
solution is proposed and developed to support
decision making of police officers. This paper
discusses the ongoing research on the building of a
smart traffic management system. The advantages of
practical problem is defined, the solution is proposed,
and the initial test-bed system is prototyped
successfully. The system can figure out the congestion
level of each road at a specific intersection with the
In such cases, the line of vehicles in a green wave help of R FID technology. A copy of information is
develops in size until it turns out to be too vast and a also concurrently sent to the neighbors to support
portion of the vehicles can't achieve the green lights in decision making at adjacent sites as well. Another
GSM modem is associated with the ARM-7 The proposed system was fully developed and tested
microcontroller. This permits the PC to utilize the to demonstrate its feasibility and effectiveness. When
GSM modem to convey over the portable system. a vehicle which is furnished with RFID tag passes
These GSM modems are most oftentimes used to give through a junction then RFID reader reads the VIN
versatile Internet network, a large portion of them can and send to ARM controller then controller verifies its
likewise be utilized for sending and getting SMS and number with stored stolen numbers. If there is a match
MMS messages. GSM modem must support a then it will be send a SMS alert to the control room.
"reached out AT summon set" for sending/accepting And if number is matched with ambulance then it will
SMS messages. GSM modems are a financially savvy allocate time slot for that side of junction. Here the
answer for getting SMS messages, on the grounds that framework routinely transfers the activity data to the
the sender is paying for the message conveyance. IOT server in secure way, which empowers
(d) RFID: everybody to get information about that traffic
Radio Frequency Identification (RFID) is an IT junction IOT server. The screenshots of the proposed
framework that transmits signals without any physical system has been presented in Figure below.
contraptions in remote correspondence. It is classified
under programmed recognizable proof innovation,
which is settled convention. The working of a RFID
framework is extremely basic. The framework uses
labels that are appended to different parts to be
followed. The labels store information and data
concerning the subtle elements of the result of things
to be followed. The peruser peruses the radio
recurrence and recognizes the labels. The reception
apparatus gives the way to the coordinated circuit to
transmit its data to the per user. There are two sorts of
RFID classifications, dynamic and uninvolved labels.
The labels that don't use power are alluded to as
detached and they are driven by a radio wire that
empowers the tag to get electromagnetic waves from a
peruser. Despite what might be expected, dynamic
Fig.3 Application board
labels depend on power and they have inbuilt power
sources that empower it to send and get signals from
RFID per user. RFID go relies on upon transmit
control; get affectability and effectiveness, radio wire,
recurrence, label introductions, environment.
Ordinarily, the RFID range is from a couple of
centimeters to more than hundred meters. FID per
user utilizes recurrence 125 KHz with a scope of 10
cm.
5. SOFTWARE REQUIREMENTS
KEIL uVISION4
Here we are using the Keil u Vision software
as
i. Editor to write/modify the code
ii.Compiler Fig.4 Graphs
iii.Debugger 7. CONCLUSION
PROTEUS PROFESSIONAL
Here we are using the Proteus professional Implementation of Smart Vehicle
software to Management System using Internet of Things had
i. Schematic design been proposed. The proposed scheme is very suitable
ii. Layout design for real time vehicle management. However, there are
iii. Circuit simulation a number of issues to be addressed before the solution
Flash Magic is used to dump the hex file into the can be tested and applied to real-life problems such as
ARM7 microcontroller. heterogeneity of devices, concurrency of the services,
THINGSPEAK is an open source platform which responding times, data volume, human factors, and
can be used as an IOT server to upload the traffic intelligence recommendations. This system is requires
information at regular intervals which empowers the very less human intervention as the system is
users to know about the traffic at precise junction in automated. It can also detects stolen vehicle at
their smart phones. possible junctions, and also it can implemented where
6. RESULT ANALYSIS the emergency vehicles needs to reach their
Seeram Surekha
In Recognition of the Publication of the Paper Entitled
Development of Smart and Secure Traffic Management System with internet of
things and ARM Microcontroller
Published In IJAEM Journal, Volume 5, Issue 6, November 2016
Editor
IJAEM
INTERNATIONAL JOURNAL OF APPLIED
SCIENCES, ENGINEERING AND
MANAGEMENT
ISSN: 2320 - 3439
R.V.V. Krishna
In Recognition of the Publication of the Paper Entitled
Development of Smart and Secure Traffic Management System with internet of
things and ARM Microcontroller
Published In IJAEM Journal, Volume 5, Issue 6, November 2016
Editor
IJAEM