SlideShare a Scribd company logo
1 of 48
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 1
CHAPTER 1
INTRODUCTION
The global supply chain is the network of suppliers, manufacturing centers,
warehouses, distribution centers, and retail outlets that transforms raw materials into
finished products and delivers them to consumers. Security of the system has traditionally
focused on reducing shrinkage—the loss of cargo shipments through theft and misrouting
and has brought increased attention to the risks containerized shipping presents. After
September 11, 2001, the security of a supply chain has become a major concern to the
public and private sectors. In particular, the ocean segment of a supply chain is most
vulnerable to security threats. More than 90% of world trade involves containers aboard
ships, amounting to about 20 million containers trips annually. For the US, 17,000
containers arrive at US ports each day. Both the government and industries have begun to
examine ways to address the threat of terrorism and the potential of having weapons of
mass destruction (WMD) in materials flowing through a supply chain.
WMD can result in significant loss in human lives, destruction of infrastructure,
and erosion of public and business confidence. Ultimately, global trade and prosperity are
threatened.
1.1 Objectives:
Cargo monitoring system (CMS) is a set of hardware and software that allows
control/monitor containers from the point of departure to final destination. The main
objectives of such system:
 Goods safety;
 Illegal and smuggled goods control;
 Information about cargo traffic and standing;
 Real – time monitoring of hazardous and high value goods.
Sometimes it occurs such situations when the containers are loaded with the
illegal goods or unloaded without the owner’s acceptance. In order to avoid such
situations, it is proposed to monitor cargo transit via GPS tracking system. To ensure
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 2
proper and timely response to the intrusive cargo openings, containers are equipped with
the mobile GPS device and GSM modem. Additionally door opening sensor is mounted
inside the container.
GPS device fixates the coordinates of container and transfers information to the
main server via GSM network at fixed intervals. The user can connect to the graphic user
interface and monitor container traffic as well as door status (was opened or not) with any
computer, connected to the Internet. In case when the door is opened, the alert, composed
of exact time, coordinates and cargo number is sent to the user’s mobile telephone or
email.
1.2 Components of Electronic Cargo Tracking System:
 Tracking reader (GPS receiver, RFID reader & GPRS / GSM modem).
 Electronic seal.
 CTS software platform
1.3 Implementation:
The CTS is being implemented using Radio Frequency Identification (RFID) and
GPS/GPRS technology. All trucks/vehicles, tankers and containers carrying goods on
transit, exports & under control are fitted with a tracking device and electronic lock
which sends the lock status, truck location and any violation information on real time
basis.
1.4 Problem statement:
In addition to ongoing monitoring of the locks and the vehicles, supervisors will use
handheld devices to receive/send all information regarding the freights/containers on-line.
The Cargo Tracking & Protection System presents all freights, containers and vehicle’s
information on a Google Earth, using the GPS location of each component via the GSM
network.
1.5 Existing System:
A present technology of locking and monitoring the Cargos does not provide effective
solutions for the situation. A little corruption among the employees can easily deceive the
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 3
Fig.1.1. A Ship carrying cargoes
whole security system. Since these Cargos contains material of high value and in high
quantity , therefore these containers are more prone to the pilferage and to protect the
material we need a sound technique which minimizes the loss due to involvement of the
corrupt employees.
1.6 Proposed System:
The proposed solution consists of several complexes while the main ones is:
Cargo tracking solution for monitoring of the goods.
1.7 Working:
After loading the materials in the containers the electronic lock is activated. This lock
continuously monitors the global positioning coordinates of the container and sends the
data to the base station if requested.
During the course of the journey the electronic lock cannot be open as it requires a series
of security check before opening. At the destination the driver has to press a button to
acknowledge the completion of journey. When the switch is pressed the lock sends the
current GPS coordinates to the base station. At the base station the received coordinates
are compared with the database to confirm whether the container has reached the right
destination or not. If confirmed correctly it will send the password and ID number of the
driver to the lock and the password to the driver via GSM.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 4
Then the driver has to prove his identity to the lock by producing a RFID card.
After verifying the correct ID number the lock will ask for password and after verifying
the correct password it will open the electromagnetic lock. Any activity of pilferage in
between the journey can be tracked by sending the GPS coordinates and activation of
alarm immediately. The whole routing of the journey of the container can be traced by
viewing GPS coordinates on the PC at base station using GOOGLE EARTH.
We can extend this project by installing RFID readers to the container which will
count and log the quantity of material coming inside or going inside of the container at
any particular time.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 5
CHAPTER 2
LITERATURE SURVEY
1 Lecturer Ms. Sarojrani Pattnaik1, Dr. M.S.Khan2
Synergy Institute of Engineering and Technology, Dhenkanal, Orissa, India,
Email: rani_saroj7@yahoomail.com
2 Professor, Synergy Institute of Engineering and Technology, Dhenkanal,
Orissa, India,
Abstract:
Prior to September 11, 2001, supply chain security concerns were related to Controlling
theft and reducing contraband such as illegal drugs, illegal immigrants, and export of
stolen goods. But after September 11, 2001, the threat of terrorist attacks has heightened
the need to assure supply chain security. The proposals should be there to create more
confidence in supply chain security, while maintaining smooth flows of goods and
services in a global supply chain. Resulting from security breaches, can be disastrous.
One of the most efficient strategies to ensure supply chain security is to apply the lessons
of successful quality improvement programs. In this paper, an attempt has been made to
describe how the principles of Total Quality Management (TQM) can actually be used to
design and operate processes to assure supply chain security information exchange among
trading partners, ports, shipping companies and the governments nor does it call for
heightened inspection and scrutiny of the goods flowing through a supply chain. The
Quality movement is that the higher quality can be attained at lower cost by proper
management and operational design. The central theme of the quality movement is also
applicable in supply chain security. By using the right management approach, new
technology, and re-engineered operational processes, higher supply chain at lower cost
can also be achieved.
Keywords: Supply Chain; Supply Chain Security; Six Sigma; Total Quality Management:
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 6
Impact of RFID Technology on Tracking of Export Goods in Kenya
Joseph K. Siror*, Liang Guangun, Pang Kaifang, Sheng Huanye, Wang Dong
Computer Science & Engineering,
Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai, 200240, China
josephsiror@gmail.com,liang_guanqun@yahoo.com.cn,
kaifang_pang@gmail.com, hsheng@sjtu.edu.cn, wangdong@cs.sjtu.edu.cn
Abstract -
In this paper the impact of RFID based tracking to address the challenges of
diversion of export goods into the local market in Kenya is discussed. Goods would be
moved out of the export factories on pretext that it was destined to foreign markets,
however, along the way the goods would be dumped and documents falsified to indicate
that goods had left the country, thus evading taxes and gaining unfair advantage. An
RFID based in- Transit Visibility system was designed and piloted to address the
challenges. The system was used to track export cargo from the factories to the port or
frontier offices. The system design, workings and pilot results are discussed in this paper.
Results from the pilot demonstrated that RFID based tracking has a great impact on
curbing diversion and considerable benefits to transporters and other stakeholders thro
Keywords: RFID, Container Tracking, In-Transit Visibility, Real Time Location
Tracking, Cargo Security, Intelligent Tracking ugh increased efficiency and reduced turn-
around
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 7
Creating Resilient and Secure Supply Chains Interim Report of Progress and
Learnings August 8, 2003
This report was pre pared by James B. Rice, Jr. of the MIT Centre for
Transportation and Logistics (CTL) and Federico Caniato of Politecnico di Milano for the
Supply Chain Response to Terrorism Project team with contributions from team members
Jonathan Fleck,Deena Disraelly, Don Lowtan, Reshma Lensing and Chris Pickett. This
work was conductedunder the direction of Professor Yossi Sheffi, CTL Director. Please
contact James B. Rice,Jr. of CTL (jrice@mit.edu or 617.258.8584) if you have any
questions or if you would like to discuss this research project was initiated to investigate
how terrorism and the threat of terrorism are affecting supply chains. The project is
entitled “Supply Chain Response to Global Terrorism” to recognize that there have been a
number of different responses which affect a firm’s ability to handle disruptions such as
terrorism. To fully appreciate the impact of the responses on the firm and its supply chain,
the project scope initially entailed studying the response to terrorist attacks (and similar
disruptions)from several different perspectives: the risk management community and
insurance industry response, the U.S. Government response, the response from shippers
and carriers and agents along the supply network, 11 the experience of past disasters, and
the use of real options 12 to assess the potential value of flexibility in supply chain design
in responding to disruption. The research to date has included a broad literature review
from these different perspectives as well as base interviews with 20 firms (primarily
shippers). The data from the interviews and literature review were synthesized and
analyzed into this body of observations and insights. A more detailed review of the
methodology and limitations on the use of the data is report
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 8
The Detection and Prevention of Cargo Theft
Many companies suffer losses through cargo theft, particularly small businesses, yet it is
an area of business crime that receives scant attention. A single truck load of cargo can be
worth as much as $3 million. The risk of theft, especially if the goods have a black market
value, is very real. Worldwide, the direct cost of cargo theft is estimated at about US$30
billion per year, within direct costs many times higher. Cargo theft occurs in freight-
forwarding yards, warehouses and during transportation in trucks, as airfreight and on
ships. Cargo is particularly vulnerable while in the process of being loaded or unloaded
from trucks, or through documentary fraud. For a small business operating on a just-in-
time basis, the loss of freight may threaten viability—particularly if insurance coveris
inadequate or compensation payments are contested. Further, the illegal saleof stolen
cargo undercuts prices in legitimate businesses. This paper provides an overview of cargo
theft, and discusses some target-hardening, freight forwardingand inventory control
strategies that can be adopted by smaller Organisations to reduce the risks. Cargo theft
creates substantial economic losses, however many incidents are not formally reported
and media attention is rare. Cargo can be stolen either by employees or by external
offenders. The modus operandi can involve hold-ups, theft from freight yards, theft from
containers, theft off trucks, or documentary fraud. The cargo can be legitimately in
transit, already illegally in the possession of other offenders, or being transported in a way
that avoids excise duty or other taxes.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 9
CHAPTER 3
SYSTEM DESIGN
3.1 Block Diagram:
Fig.3.1: Base Station
PC GSMMODULE
SIM900
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 10
Fig.3.2: Block Diagram of the system
PIC 18LF46K22
Microcontroller
GPSMODULE
GSMMODULE
SIM300
KEYPAD RFID READER
16x2 LCD
Buzzer
ELECTROMAGNETIC
LOCKING MECHANISM
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 11
3.1.1 Cargo Tracking - Electric Lock
Each container will be sealed with an Electric lock which will monitor the
container location and goods status in order to prevent and alert in case of unauthorized
opening, sabotage or theft. Each lock will contain all shipment details. This information
will be filled by the customs and revenue authorities in the beginning of each journey and
will be read along the way and in the port using a handheld terminal device.
This System aims at providing a sound mechanism to prevent the pilferage in the Cargo
containers by implying an electronic lock and minimizing the human interference in the
security of the Cargo containers.
This mechanism secures the containers by an electronic lock which will require a
series of security check during opening of the lock. The lock is controlled and monitored
by the base station.
3.1.2 LCD DISPLAY (16 X 2)
Alphanumeric displays are used in a wide range of applications, including
palmtop Computers, word processors, photocopiers, point of sale terminals, medical
Instruments, cellular phones, etc. The 16 x 2 intelligent alphanumeric dot matrix Display
is capable of displaying 224 different characters and symbols. A full list of the characters
and symbols is printed on pages 7/8 (note these symbols can vary between brand of LCD
used).
Fig 3.3.: LCD DISPLAY (16 X 2)
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 12
3.1.3 GPS (GlobalPositioning System)
The Global Positioning System (GPS) is a space-based satellite navigation system
that provides location and time information in all weather conditions, anywhere on or
near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
The system provides critical capabilities to military, civil and commercial users around
the world. It is maintained by the United States government and is freely accessible to
anyone with a GPS receiver.
The GPS project was developed in 1973 to overcome the limitations of previous
navigation systems, integrating ideas from several predecessors, including a number of
classified engineering design studies from the 1960s. GPS was created and realized by the
U.S. Department of Defence (DoD) and was originally run with 24 satellites. It became
fully operational in 1995.
Each GPS satellite continually broadcasts a signal (carrier frequency with modulation)
that include:
 A pseudorandom code (sequence of ones and zeros) that is known to the
receiver. By time-aligning a receiver-generated version and the receiver-
measured version of the code, the time of arrival (TOA) of a defined point in
the code sequence, called an epoch, can be found in the receiver clock time
scale
 A message that includes the time of transmission (TOT) of the code epoch (in
GPS system time scale) and the satellite position at that time.
Conceptually, the receiver measures the TOAs (according to its own clock) of four
satellite signals. From the TOAs and the TOTs, the receiver forms four times of flight
(TOF) values, which are (given the speed of light) approximately equivalent to receiver-
satellite range differences. The receiver then computes its three-dimensional position and
clock deviation from the four TOFs.
In practice the receiver position (in three dimensional Cartesian coordinates with
origin at the earth's centre) and the offset of the receiver clock relative to GPS system
time are computed simultaneously, using the navigation equations to process the TOFs.
The receiver's earth-cantered solution location is usually converted
to latitude, longitude and height relative to an ellipsoidal earth model. The height may
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 13
then be further converted to height relative thegeoids(e.g.,EGM96) (essentially, mean sea
level). These coordinates may be displayed, perhaps on a moving map display and/or
recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person
carrying GPS device).
3.1.4 GSM (GlobalSystem for Mobile Communications)
GSM (Global System for Mobile Communications), (originally Groupe Spécial Mobile),
is a standard developed by the European Telecommunications Standards Institute (ETSI)
to describe protocols for second generation (2G) digital cellular networks used by mobile
phones. It is the default global standard for mobile communications with over 90%
market share, and is available in over 219 countries and territories.
The GSM standard was developed as a replacement for first generation (1G)
analogue cellular networks, and originally described a digital, circuit-switched network
optimized for full duplex voice telephony. This was expanded over time to include data
communications, first by circuit-switched transport, then packet data transport
via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM
Evolution
Fig 3.4.: Structure of GSM Network
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 14
Frequency of operation for 2G is 900 MHz or 1800 MHz bands & for 3G it goes up to
2100 MHz.
One of the key features of GSM is the Subscriber Identity Module, commonly
known as a SIM card. The SIM is a detachable smart card containing the user's
subscription information and phone book. This allows the user to retain his or her
information after switching handsets. Alternatively, the user can also change operators
while retaining the handset simply by changing the SIM. Some operators will block this
by allowing the phone to use only a single SIM, or only a SIM issued by them; this
practice is known as SIM locking.
3.1.5 RFID (Radio-frequency identification) Reader
Radio-frequency identification (RFID) is the wireless use of electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects. The tags contain electronically stored information. Some tags are
powered by electromagnetic from magnetic fields produced near the reader. Some types
collect energy from the interrogating radio waves and act as a passive transponder. Other
types have a local power source such as a battery and may operate at hundreds of meters
from the reader. Radio frequency identification (RFID) is one method for Automatic
Identification and Data Capture (AIDC).
RFID tags are used in many industries. An RFID tag attached to an automobile during
production can be used to track its progress through the assembly line. Pharmaceuticals
can be tracked through warehouses. Livestock and pets may have tags injected, allowing
positive identification of the animal.
Since RFID tags can be attached to cash, clothing, possessions, or even implanted
within people, the possibility of reading personally-linked information without consent
has raised serious privacy concerns
A radio-frequency identification system uses tags, or labels attached to the objects
to be identified. Two-way radio transmitter-receivers called interrogators or readers send
a signal to the tag and read its response.
RFID tags can be passive, active or battery-assisted passive. An active tag has an
on-board battery and periodically transmits its ID signal. A battery-assisted passive
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 15
(BAP) has a small battery on board and is activated when in the presence of an RFID
reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag
uses the radio energy transmitted by the reader. However, to operate a passive tag, it must
be illuminated with a power level roughly a thousand times stronger than for signal
transmission. That makes a difference in interference and in exposure to radiation.
RFID tags contain at least two parts: an integrated circuit for storing and processing
information, modulating and demodulating a radio-frequency (RF) signal, collecting DC
power from the incident reader signal, and other specialized functions; and an antenna for
receiving and transmitting the signal. The tag information is stored in a non-volatile
memory. The RFID tag includes either fixed or programmable logic for processing the
transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The
RFID tag receives the message and then responds with its identification and other
information. This may be only a unique tag serial number, or may be product-related
information such as a stock number, lot or batch number, production date, or other
specific information. Since tags have individual serial numbers, the RFID system design
can discriminate among several tags that might be within the range of the RFID reader
and read them simultaneously.
RFID tags are widely used in identification badges, replacing earlier magnetic
stripe cards. These badges need only be held within a certain distance of the reader to
authenticate the holder. Tags can also be placed on vehicles, which can be read at a
distance, to allow entrance to controlled areas without having to stop the vehicle and
present a card or enter an access
Yard management, shipping and freight and distribution centres use RFID
tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock
identify the owner, identification number and type of equipment and its characteristics.
This can be used with a database to identify the lading, origin, destination, etc. of the
commodities being carried.
In commercial aviation, RFID is used to support maintenance on commercial
aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 16
Some countries are using RFID for vehicle registration and enforcement. RFID can help
detect and retrieve stolen cars.
3.1.6 Electromagnetic Locking Mechanism
An electromagnetic lock, magnetic lock, or maglock is a locking device that
consists of an electromagnet and an armature plate. There are two main types of electric
locking devices. Locking devices can be either "fail safe" or "fail secure". A fail-secure
locking device remains locked when power is lost. Fail-safe locking devices are unlocked
when de-energized. Direct pull electromagnetic locks are inherently fail-safe. Typically
the electromagnet portion of the lock is attached to the door frame and a mating armature
plate is attached to the door. The two components are in contact when the door is closed.
When the electromagnet is energized, a current passing through the electromagnet creates
a magnetic flux that causes the armature plate to attract to the electromagnet, creating a
locking action. Because the mating area of the electromagnet and armature is relatively
large, the force created by the magnetic flux is strong enough to keep the door locked
even under stress.
Typical single door electromagnetic locks are offered in both 600 lbs. and 1200
lbs.The power for an electromagnet lock is DC (Direct Current), around 6 W. The current
is around 0.5 A when the voltage supply is 12 V DC. Generally, the specification of the
electromagnet locks is dual voltages 12/24 V DC
3.1.7 PIC18LF46K22 Microcontroller
The PIC18 microcontroller family provides PIC micro devices in 18- to 80-pin packages
that are both socket and software upwardly compatible to the PIC16 family. The PIC18
family includes all the popular peripherals, such as MSSP, ESCI, CCP, flexible 8- and 16-
bit timers, PSP, 10-bit ADC, WDT, and POR and CAN 2.0B Active for the maximum
flexible solution. Most PIC18 devices will provide FLASH program memory in sizes
from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes; operating from 2.0 to
5.5volts, at speeds from DC to 40 MHz Optimized for high-level languages like ANSI
C, the PIC18 family offers a highly flexible solution for complex embedded applications.
 High Performance RISC CPU:
 C-Language friendly architecture
 PIC16 source code compatible
 Linear program memory addressing to 2 Mbyte
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 17
 Linear data memory addressing up to 4 Kbytes
 Up to 10 MIPs operation:
 DC - 40 MHz osc/clock input
 4 MHz - 10 MHz clock with PLL active
 16-bit wide instructions, 8-bit wide data path
 Priority levels for interrupts
 8 x 8 Single Cycle Hardware Multiplier
 Peripheral Features:
 High current sink/source 25 mA/25 mA
 Up to four external interrupt pins
 Up to three 16-bit timer/counters
 Up to two 8-bit timer/counters with 8-bit period
 register (time-base for PWM)
 Secondary LP oscillator clock option - Timer1
 Up to five Capture/Compare/PWM (CCP) modules
 CCP pins can be configured as:
 Capture input: 16-bit, resolution 6.25 ns (TCY/16)
 Compare: 16-bit, max. resolution 100 ns (TCY)
 PWM output: PWM resolution is 1- to 10-bit
 Max. PWM frequency @: 8-bit resolution = 156 kHz
 10-bit resolution = 39 kHz
 Master Synchronous Serial Port (MSSP) module
 Two modes of operation:
 3-wire SPITM (supports all 4 SPI modes)
 I2CTM Master and Slave mode
 Up to 2 Addressable USART modules (ESCI)
 Supports interrupt on Address bit
 Parallel Slave Port (PSP) module
 Analog Features:
 10-bit Analog-to-Digital Converter module (A/D) with:
 Fast sampling rate
 Up to 16 channels input multiplexor
 Conversion available during SLEEP
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 18
 DNL = ±1 LSb, INL = ±1 LSb
 Programmable Low Voltage Detection (LVD) module
 Supports interrupt-on-low voltage detection
 Programmable Brown-out Reset (BOR)
 Comparators
 Special Microcontroller Features:
 Oscillator Start-up Timer (OST)
 Watchdog Timer (WDT) with its own on-chip RC oscillator
 for reliable operation
 Programmable code protection
 In-Circuit Serial Programming TM (ICSPTM) via two pins
 CMOS Technology:
 Fully static design
 Wide operating voltage range (2.0V to 5.5V)
 Industrial and Extended temperature ranges
 Power Managed Features:
 Internal RC oscillator for ADC operation during SLEEP
 SLEEP mode (IPD < 1 µA typ.)
 up to 23 individually selectable wake-up events
 3 edge selectable wake-up inputs
 4 state change wake-up inputs
 Internal RC oscillator for WDT (period wake-up)
 RAM retention mode (VDD as low as 1.5V)
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 19
CHAPTER 4
SYSTEM IMPLEMENTATION
4.1 Schematics:
Fig 4.1: Schematic of system implementation
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 20
4.2 Flowchartof the system
Start
Wait button to be pressed after loading
Lock Button
Pressed?
Activate Magnetic
Lock
Wait for lock button to be pressed
for Unloading at destination
Lock Button
Pressed ?
Enter into GPS function to get the co-ordinates and send it to
Base station
Co-orindates sent ?
Wait for Password message from base station
Message received ?
Display location matched, Scan RFID
Is RFID
Matched ?
Display RFID matched, Enter Password
Is Password
Matched ?
Open Door
Lock Door and Activate
Buffer
Stop
Yes
No
No
Yes
No
Yes
Display Location not matched
and Wait for message
No
Yes
RFID Not
Matched
No
Yes
No
Yes
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 21
CHAPTER 5
HARDWARE AND SOFTWARE DESCRIPTION
5.1 HARDWARE DESCRIPTION
5.1.1 MICROCONTROLLER
Fig 5.1: PIC18LF46K22
It is the heart of the project, it is the decision maker and it controls all other device
interfaced with it. Here we are using PIC18LF46K22 microcontroller.
PIC18LF4K22 is a 8-bit, 40 Pin, Low-Power, High-Performance Microcontrollers
with XLP Technology. The PIC18 family includes all the popular peripherals, such as
MSSP, ESCI, CCP, flexible 8- and 16-bit timers, PSP, 10-bit ADC, WDT, and POR and
CAN 2.0B Active for the maximum flexible solution. Most PIC18 devices will provide
FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4
Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz Optimized for
high-level languages like ANSI C, the PIC18 family offers a highly flexible solution for
complex embedded applications.
Features:
 High Performance RISC CPU:
 C-Language friendly architecture
 PIC16 source code compatible
 Linear program memory addressing to 2 Mbyte
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 22
 Linear data memory addressing up to 4 Kbytes
 Up to 10 MIPs operation:
 DC - 40 MHz osc/clock input
 4 MHz - 10 MHz clock with PLL active
 16-bit wide instructions, 8-bit wide data path
 Priority levels for interrupts
 8 x 8 Single Cycle Hardware Multiplier
 Peripheral Features:
 High current sink/source 25 mA/25 mA
 Up to four external interrupt pins
 Up to three 16-bit timer/counters
 Up to two 8-bit timer/counters with 8-bit period
 register (time-base for PWM)
 Secondary LP oscillator clock option - Timer1
 Up to five Capture/Compare/PWM (CCP) modules
 CCP pins can be configured as:
 Capture input: 16-bit, resolution 6.25 ns (TCY/16)
 Compare: 16-bit, max. resolution 100 ns (TCY)
 PWM output: PWM resolution is 1- to 10-bit
 Max. PWM frequency @: 8-bit resolution = 156 kHz
 10-bit resolution = 39 kHz
 Master Synchronous Serial Port (MSSP) module
 Two modes of operation:
 3-wire SPITM (supports all 4 SPI modes)
 I2CTM Master and Slave mode
 Up to 2 Addressable USART modules (ESCI)
 Supports interrupt on Address bit
 Parallel Slave Port (PSP) module
 Analog Features:
 10-bit Analog-to-Digital Converter module (A/D) with:
 Fast sampling rate
 Up to 16 channels input multiplexor
 Conversion available during SLEEP
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 23
 DNL = ±1 LSb, INL = ±1 LSb
 Programmable Low Voltage Detection (LVD) module
 Supports interrupt-on-low voltage detection
 Programmable Brown-out Reset (BOR)
 Comparators
 Special Microcontroller Features:
 Power-on Reset (POR), Power-up Timer (PWRT) and
 Oscillator Start-up Timer (OST)
 Watchdog Timer (WDT) with its own on-chip RC oscillator
 for reliable operation
 Programmable code protection
 In-Circuit Serial Programming TM (ICSPTM) via two pins
 CMOS Technology:
 Fully static design
 Wide operating voltage range (2.0V to 5.5V)
 Industrial and Extended temperature ranges
 Power Managed Features:
 Dynamically switch to secondary LP oscillator
 Internal RC oscillator for ADC operation during SLEEP
 SLEEP mode (IPD < 1 µA typ.)
 up to 23 individually selectable wake-up events
 edge selectable wake-up inputs
 4 state change wake-up inputs
 Internal RC oscillator for WDT (period wake-up)
 RAM retention mode (VDD as low as 1.5V)
 Up to 6 more Power Managed modes available on
 selected models (PIC18F1320/2320/4320 and PIC18F1220/2220/4220)
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 24
5.1.1 PIN DIAGRAM OF PIC18F46K22
DIP
Fig 5.2 Pin diagram of PIC18LF46K22
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 25
5.1.2 GPS (Global Positioning System):
Fig 5.3: GPS module
The Global Positioning System(GPS) is a space-based satellite navigation system
that provides location and time information in all weather conditions, anywhere on or
near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
The system provides critical capabilities to military, civil and commercial users around
the world. It is maintained by the United States government and is freely accessible to
anyone with a GPS receiver.
GPS has become an efficient tool in the field of scientific use, commerce,
surveillance and tracking. This project presents a small application based on Global
Positioning System. It depicts the use of GPS module/receiver to find latitude and
longitude of its location. The data obtained from GPS receiver (GPGGA sentence) is
processed by the microcontroller to extract its latitude and longitude values.
The GPS module continuously transmits serial data (RS232 protocol) in the form
of sentences according to NMEA standards. The latitude and longitude values of the
location are contained in the GPGGA sentence (refer NMEA format). In this program,
these values are extracted from the GPGGA sentence and are displayed on LCD.
The extraction of location values is done as follows. The first six bytes of the data
received are compared with the pre-stored (GPGGA) string and if matched then only data
is further accounted for; otherwise the process is repeated again. From the comma
delimited GPGGA sentence, latitude and longitude positions are extracted by finding the
respective comma positions and extracting the data. The latitude and longitude positions
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 26
extracted are displayed on the with. The receiver measures the TOAs (according to its
own clock) of four satellite signals. From the TOAs and the TOTs, the receiver forms
four times of flight (TOF) values, which are (given the speed of light) approximately
equivalent to receiver-satellite range differences. The receiver then computes its three-
dimensional position and clock deviation from the four TOFs.
In practice the receiver position (in three dimensional Cartesian coordinates with
origin at the earth's centre) and the offset of the receiver clock relative to GPS system
time are computed simultaneously, using the navigation equations to process the TOFs.
The receiver's earth-cantered solution location is usually converted
to latitude, longitude and height relative to an ellipsoidal earth model. The height may
then be further converted to height relative the geoids (e.g., EGM96) (essentially, mean
sea level). These coordinates may be displayed, perhaps on a moving map display and/or
recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person
carrying GPS device). Figure 5.4 shows the schematic representation of GPS system.
Fig 5.4: Schematic representation of GPS
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 27
5.1.3 GSM (Global System for mobile):
Fig 5.5: GSM module
Architecture of the GSM Network:
A GSM network is composed of several functional entities, whose functions and
interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM
network can be divided into three broad parts. The Mobile Station is carried by the
subscriber. The Base Station Subsystem controls the radio link with the Mobile Station.
The Network Subsystem, the main part of which is the Mobile services Switching Center
(MSC), performs the switching of calls between the mobile users, and between mobile
and fixed network users. The MSC also handles the mobility management operations. Not
shown is the Operations and Maintenance Center, which oversees the proper operation
and setup of the network. The Mobile Station and the Base Station Subsystem
communicate across the Um interface, also known as the air interface or radio link. The
Base Station Subsystem communicates with the Mobile services Switching Center across
the A interface.
Mobile Station:
The mobile station (MS) consists of the mobile equipment (the terminal) and a
smart card called the Subscriber Identity Module (SIM). The SIM provides personal
mobility, so that the user can have access to subscribed services irrespective of a specific
terminal. By inserting the SIM card into another GSM terminal, the user is able to receive
calls at that terminal, make calls from that terminal, and receive other subscribed services.
The mobile equipment is uniquely identified by the International Mobile Equipment
Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity
(IMSI) used to identify the subscriber to the system, a secret key for authentication, and
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 28
other information. The IMEI and the IMSI are independent, thereby allowing personal
mobility. The SIM card may be protected against unauthorized use by a password or
personal identity number.
Base Station Subsystem:
The Base Station Subsystem is composed of two parts, the Base Transceiver
Station (BTS) and the Base Station Controller (BSC). These communicate across the
standardized Abis interface, allowing (as in the rest of the system) operation between
components made by different suppliers. The Base Transceiver Station houses the radio
transceivers that define a cell and handles the radio-link protocols with the Mobile
Station. In a large urban area, there will potentially be a large number of BTSs deployed,
thus the requirements for a BTS are ruggedness, reliability, portability, and minimum
cost. The Base Station Controller manages the radio resources for one or more BTSs. It
handles radio-channel setup, frequency hopping, and handovers, as described below. The
BSC is the connection between the mobile station and the Mobile service Switching
Centre (MSC).
Network Subsystem:
The central component of the Network Subsystem is the Mobile services Switching
Centre (MSC). It acts like a normal switching node of the PSTN or ISDN, and
additionally provides all the functionality needed to handle a mobile subscriber, such as
registration, authentication, location updating, handovers, and call routing to a roaming
subscriber. These services are provided in conjunction with several functional entities,
which together form the Network Subsystem. The MSC provides the connection to the
fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the
Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in
ISDN and widely used in current public networks.
 GSM modem characteristics:
 Dual Band or Triband GSM GPRS modem (EGSM 900/1800MHz) / (EGSM
900/1800 / 1900 MHz)
 Designed for GPRS, data, fax, SMS and voice applications
 Fully compliant with ETSI GSM Phase 2+ specifications (Normal MS)
 Input voltage: 8V-40V
 Input current: 8mA in idle mode, 150mA in communication GSM 900 @ 12V
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 29
 Temperature range: Operating -20 to +55 degree Celsius; Storage -25 to +70
degree Celsius
 Overall dimensions: 80mm x 62mm x 31mm / Weight: 200g Interfaces
 RS-232 through D-TYPE 9 pin connector
 RJ11 voice connector
 Power supply through Molex 4 pin connector
 SMA antenna connector
 Toggle spring SIM holder
 Red LED Power on
 Green LED status of GSM / GPRS module.
Here is the figure 5.6 which shows the interfacing of GSM with microcontroller.
Fig 5.6: GSM interfaced with microcontroller
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 30
5.1.4 KEYPAD:
Fig 5.7: 4*3 matrix keypad
PIC Microcontrollers provides a library for working with 4*4 keypad. It can also
be used to interface 4*3, 4*2 and 4*1 keypads. In our project we are using 4*3 keypad.
MikroC provides the following three functions to interface Matrix Keypad.
 Keypad_Init
 Keypad_Key_Press
 Keypad_Key_Click
Keypad_Init:
Prototype: void Keypad_Init(void);
It initializes a particular port for working with keypad. A global variable ‘keypad
Port’ must be defined before using this function. Port need to be initialized before calling
this function.
Keypad_Key_Press:
Prototype: char Keypad_Key_Press(void);
This function reads key when a key is pressed and it returns number
corresponding (1 – 16) to the pressed key. If no key is pressed, it will return 0.
Keypad_Key_Click:
Prototype chars Keypad_Key_Click (void);
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 31
When this function is called, it waits until some key is pressed and released. When
released it returns number corresponding (1 – 16) to the pressed key. If no key is pressed,
it will return 0. If more than one key is pressed, the function waits until all pressed keys
are released and returns number corresponds to first pressed key. Port need to be
initialized before calling this function.
Here is the figure 5.8 that shows the interfacing of keypad with microcontroller.
Fig 5.8: Keypad interfacing with microcontroller
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 32
5.1.5 LCD(LIQUID CRYSTAL DISPLAY):
Fig 5.9: Circuit diagram of LCD
The LCD panel used in this block interfaced with micro-controller through output
port. This is a 16 character X 2Line LCD module, capable of display numbers, characters,
and graphics. The display contains two internal byte-wide registers, one for commands
(RS=0) and the second for character to be displayed (RS=1). It also contains a user
programmed Ram area (the character RAM) character that can be formed using dot
matrix that can be programmed to generate any desired. Two distinguished between these
areas, the hex command byte will be signify that the display RAM address 00h is chosen.
LCD can add a lot to our application in terms of providing a useful interface for
the user, debugging an application or just giving it a “professional” look. The most
common type of LCD controller is the Hitachi 44780 which provides a relatively simple
interface between a processor and an LCD. Using this inter is often not attempted by
inexperienced designers and programmers because it is difficult to find good
documentation on the interface, initializing the interface can be problem and the displays
themselves are expensive.
Connection to a PC parallel port is mostly simple. These displays can handle eight
bit input directly. They also need two extra lines to control which kind of data has just
arrived and when the data is meant to e stable. Those signals are also called RS (Register
Select, instruction or data register) and EN (enable).
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 33
PIN DETAILS OF LCD:
Pin No. Name Description
Pin no. 1 VSS Power supply (GND)
Pin no. 2 VCC Power supply (+5V)
Pin no. 3 VEE Contrast adjust
Pin no. 4 RS
0 = Instruction input
1 = Data input
Pin no. 5 R/W
0 = Write to LCD module
1 = Read from LCD module
Pin no. 6 EN Enable signal
Pin no. 7 D0 Data bus line 0 (LSB)
Pin no. 8 D1 Data bus line 1
Pin no. 9 D2 Data bus line 2
Pin no. 10 D3 Data bus line 3
Pin no. 11 D4 Data bus line 4
Pin no. 12 D5 Data bus line 5
Pin no. 13 D6 Data bus line 6
Pin no. 14 D7 Data bus line 7 (MSB)
Pin no. 15 LED+ Anode of LED for Backlit
Pin no. 16 LED- Cathode of LED for Backlit
Table No 5.1: Pin Details of LCD
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 34
5.1.6 Relay:
Fig 5.10: Relay
Relay is one of the most important electromechanical devices highly used in
industrial applications specifically in automation. A relay is used for electronic to
electrical interfacing i.e. it is used to switch on or off electrical circuits operating at high
AC voltage using a low DC control voltage. A relay generally has two parts, a coil which
operates at the rated DC voltage and a mechanically movable switch. The electronic and
electrical circuits are electrically isolated but magnetically connected to each other; hence
any fault on either side does not affect the other side.
Relay switch consists of five terminals. Two terminals are used to give the input
DC voltage also known as the operating voltage of the relay. Relays are available in
different operating voltages like 6V, 12V, 24V etc. The rest of the three terminals are
used to connect the high voltage AC circuit. The terminals are called Common, Normally
Open (NO) and Normally Closed (NC). Relays are available in various types & categories
and in order to identify the correct configuration of the output terminals, it is best to see
the data sheet or manual.
Normally Open is connected to12V and normally close is connected to ground. By
the help of a switch, Common is connected either to Normally Open or Normally Close
depending on the condition. Here; in our project we are using five relays, four to rotate
two motors in clock wise and anticlockwise direction which is connected with two
containers and one relay with another motor which is connected with belt. Motor is
connected to common terminal of relay. Out of two terminals of input DC one is
connected to ULN2803.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 35
When there is voltage difference between two terminals, i.e. one terminal of
ULN2003 and another with operating voltage of relay then the EMF is induced in
between them and the Common is connected to Normally Open.
When there is no voltage difference between one terminal of ULN2003 and another
terminal of operating voltage of relay then no EMF is induced in between them and the
Common is connected to Normally Close.
Relay circuit:
Relay circuit is used to activate the relay through microcontroller. In this circuit
we have to use a Darlington transistor (Tip122) for switch on the relay. The relay is an
electromagnetic device which energies when the supply is given. In this circuit, relay is
working in the positive logic. That means when the microcontroller gives high to the
relay circuit the Darlington transistor is switched on and also the relay is ON. When the
microcontroller gives low to the relay circuit the Darlington transistor is switched off and
also the relay is OFF. The two diodes are used for protecting the microcontroller from the
load due to back EMF and EMI problems.
Fig 5.11: Circuit diagram of relay
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 36
5.1.7 RFID (Radio-frequencyidentification) Reader:
Fig 5.12: RFID
Radio-frequency identification (RFID) is the wireless use of electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects. The tags contain electronically stored information. Some tags are
powered by electromagnetic from magnetic fields produced near the reader. Some types
collect energy from the interrogating radio waves and act as a passive transponder. Other
types have a local power source such as a battery and may operate at hundreds of meters
from the reader. Unlike a barcode, the tag does not necessarily need to be within line of
sight of the reader, and may be embedded in the tracked object. Radio frequency
identification (RFID) is one method for Automatic Identification and Data
Capture (AIDC).
RFID tags are used in many industries. An RFID tag attached to an automobile
during production can be used to track its progress through the assembly line.
Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags
injected, allowing positive identification of the animal.
Since RFID tags can be attached to cash, clothing, possessions, or even implanted
within people, the possibility of reading personally-linked information without consent
has raised serious privacy concerns A radio-frequency identification system uses tags,
or labels attached to the objects to be identified. Two-way radio transmitter-receivers
called interrogators or readers send a signal to the tag and read its response.
RFID tags can be passive, active or battery-assisted passive. An active tag has an
on-board battery and periodically transmits its ID signal. A battery-assisted passive
(BAP) has a small battery on board and is activated when in the presence of an RFID
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 37
reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag
uses the radio energy transmitted by the reader. However, to operate a passive tag, it must
be illuminated with a power level roughly a thousand times stronger than for signal
transmission. That makes a difference in interference and in exposure to radiation.
Tags may either be read-only, having a factory-assigned serial number that is used
as a key into a database, or may be read/write, where object-specific data can be written
into the tag by the system user. Field programmable tags may be writing-once, read-
multiple; "blank" tags may be written with an electronic product code by the user.
RFID tags contain at least two parts: an integrated circuit for storing and
processing information, modulating and demodulating a radio-frequency (RF) signal,
collecting DC power from the incident reader signal, and other specialized functions; and
an antenna for receiving and transmitting the signal. The tag information is stored in a
non-volatile memory. The RFID tag includes either fixed or programmable logic for
processing the transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The
RFID tag receives the message and then responds with its identification and other
information. This may be only a unique tag serial number, or may be product-related
information such as a stock number, lot or batch number, production date, or other
specific information. Since tags have individual serial numbers, the RFID system design
can discriminate among several tags that might be within the range of the RFID reader
and read them simultaneously.
RFID tags are widely used in identification badges, replacing earlier magnetic
stripe cards. These badges need only be held within a certain distance of the reader to
authenticate the holder. Tags can also be placed on vehicles, which can be read at a
distance, to allow entrance to controlled areas without having to stop the vehicle and
present a card or enter an access
Yard management, shipping and freight and distribution centers use RFID
tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock
identify the owner, identification number and type of equipment and its characteristics.
This can be used with a database to identify the lading, origin, destination, etc. of the
commodities being carried.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 38
In commercial aviation, RFID is used to support maintenance on commercial
aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.
Some countries are using RFID for vehicle registration and enforcement. RFID can help
detect and retrieve stolen cars.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 39
5.1.8 BUZZER:
Fig 5.13: Buzzer
A buzzer or beeper is an audio signalling device, which may be mechanical,
electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm
devices, timers and confirmation of user input such as a mouse click or keystroke. A
piezoelectric element may be driven by an oscillating electronic circuit or other audio
signal source, driven with a piezoelectric audio amplifier. Sounds commonly used to
indicate that a button has been pressed are a click, a ring or a beep.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 40
5.2 SOFTWARE DESCRIPTION
5.2.1 Embedded C:
An embedded system is n application that contains at least one programmable
computer (typically in the form of microcontroller, a microprocessor or digital signal
processor chip) and which is used by individuals who are; in the main unaware that the
system is computer-based.in embedded C this can be done using specific inbuilt
instruction. Embedded C is controller or target specific. It allows direct communication
with memory.
5.2.2 MPLAB IDE:
MPLAB IDE is a software program that runs on a PC to develop application for
Microchip microcontroller. It is called an Integrated Development Environment, or IDE,
because it provide a single integrated environment to develop code for embedded
microcontrollers. A development system for embedded controllers is a system of
programs running on a desktop PC to help write, debug and program code. The
intelligence of embedded system applications into a microcontroller. MPLAB IDE runs
on a PC and contains all components needed to design and deploy embedded system
application.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 41
CHAPTER 6
RESULT AND TESTING
6.1 Result:
While testing of this project it was found that electronic door was being locked
after loading the cargo. Then while reaching to the destination, exact location was sent to
the base station. Base station sent a random password to the vehicle & authorized person
GSM mobile after verifying the coordinates. After scanning an authorized RFID card
same password was entered and if password correct door was open.
6.2 Testing:
Fig6.1: Booting of the system
Fig: 6.2: Welcome Screen of the system
Fig6.3: After loading press switch message being displayed
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 42
Fig6.4 Electromagnetic door has been locked
Fig 6.5 Request has been sent to the base station along with exact coordinate
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 43
Fig 6.6: VB giving an exact location of cargo with the help of GSM & GPS
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 44
CHAPTER 7
ADVANTAGES AND LIMITATIONS
7.1 ADVANTAGES
The proposed system has following Advantages.
 Use of information to identify compliant stakeholders in the industry.
 Platform for exchange of information with other Government agencies.
 Develop improved risk assessment systems.
 Serve as data sources and as a data exchange tool for Regional cargo tracking.
 Maximize revenue collection due to,
 Anti-dumping/diversion of transit, export, excisable export goods;
 Fast movement of goods along the Kenya supply chain;
 Elimination of non-tariff barriers to trade and traffic;
 Reduction of corruption cases and promotion of integrity
 Increased the level of security of monitored goods.
 Fast movement of goods and conveyances along the corridors.
Improve voluntary levels of compliance low cost of compliance
7.2 LIMITATIONS
The proposed system has following Limitations
 System knowledge and commitment among the users. (Training)
 Maintenance and capacity challenges
 Hardware failures, Systems integration
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 45
CHAPTER 8
APPLICATIONS
DirectBenefits to Private Firms
 Improved reliability and service quality, usually thought of as tools
to retain good customers and grow market share and revenue.
 Improved shipment and container integrity, built around a core of
security issues.
DirectPublic SectorBenefits
 Increased Greater national security
 Improved safety
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 46
CHAPTER 9
CONCLUSION FUTURE ENHANCEMENT
9.1 Conclusion
Logistic Companies will benefit greatly with the full Implementation of the
Electronic Cargo Tracking System. With a comprehensive solution for the
monitoring of transit cargo, its status, location and other pertinent information
about it in real time, hence securing the Supply chain.
9.2 Future Enhancement
 With the implementation of this project Logistic companies will benefit
greatly.
 Insurance companies will have to pay fewer claims to logistic companies
as there will be decrease in number of loss of cargoes.
 Will the further development in project it can help in preventing human
trafficking through as well.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 47
REFERENCES
Websites referred:
http://www.raviyp.com/embedded/183-sim900-sim908-gsm-module-autobaud-solution
Journals & Books Referred:
[1] Fleischer P.B., Nelson A.Y.,Sowah R.A.,Bremang, A., “Designand
development of GPS/GSM basedvehicle tracking
andalertsystemforcommercialinter-city buses”,Adaptive Science&Technology
(ICAST),2012IEEE 4thInternational Conference on:25-27Oct.2012Page(s):1–
6
[2] GaneshG.S.P,BalajiB,VaradhanT.A.S,“Anti-thefttracking
systemforautomobiles(autogsm)Fulltextsign-Inor Purchase”, Anti-
Counterfeiting,SecurityandIdentification(ASID),2011
IEEEInternationalConferenceon24-26June2011Page(s):17–19
[3] ZhigangLiu, AnqiZhang, ShaojunLi, “Vehicleanti-theft
trackingsystembasedonInternetof things”,Vehicular Electronics and Safety
(ICVES), 2013 IEEE InternationalConference on2013,Page(s): 48–52
[4] HuiSong,SencunZhu,GuohongCao,“SVATS:ASensor- Network-
BasedVehicleAnti-theftsystem”,INFOCOM2008.The 27thConference
onComputer Communications.IEEE
[5] BaburaoKodavati,V.K.Raju, S.SrinivasaRao, A.V.Prabu, T.Appa
Rao,Dr.Y.V.Narayana “GPSBasedAutomatic
VehicleTrackingUsingRFID”,InternationalJournal of Engineering Research
and Applications , Vol. 1, Issue 3, pp.616-62.
[6] DevyaniBajaj,NeeleshGupt,“GSMandGPSbasedvehicle
locationandtrackingsystem”,International Journal of Engineering and
Innovative Technology (IJEIT) Volume 1,Issue 1,January2012
[7] Mrs.Ramyakulandaivel,P.Ponmalar,B.Geetha,G.Saranya, “GPS and GSM
based vehicle information system”, International Journal of Communications
and EngineeringVolume 01–No.1,Issue:01March 2012.
Tracking and Checking Cargo Containers Pilferage Using Electronic Lock
Dept of ECE, SSIT, Tumakuru 2014-15 48
[8] DeepakMishra,Apurv Vas,PuneetTandon,“A novelandcost
effectiveapproachtopublic vehicletrackingsystem”,
InternationalJournalofubicomp(IJU),Vol.3,No.1,January2012.
[9] RuchikaGuptaandBVRReddy,“GPSandGPRSBasedCostEffective Human
TrackingSystem UsingMobilePhones”,Volume 2January-June 2011.
[10] MohammadA.Al-Khedher,“HybridGPS-GSMLocalization of
AutomobileTracking System”,InternationalJournal of
ComputerScience&InformationTechnology (IJCSIT)Vol3, No 6,Dec 2011.
[11] FrancisEnejoIdachaba“DesignofaGPS/GSMbasedtrackerfor the location of
stolen items and kidnapped or missing personsinNIGERIA”,ARPNJournal of
Engineeringand Applied Sciences VOL.6,NO.10,OCTOBER 2011.
[12] AdnanI.Yaqzan,IssamW.Damaj,andRachedN.Zantout“GPS-based
VehicleTrackingSystem-on-Chip”,Proceedings of
theWorldCongressonEngineering 2008VolI WCE2008, July2-
4,2008,London,U.K.
[13] T.KrishnaKishore,T.SasiVardhan,N.LakshmiNarayana,“Vehicle Tracking
Using a Reliable Embedded Data Acquisition SytemWithGPS
andGSM”,IJCSNSInternational
JournalofComputerScienceandNetworkSecurity,VOL.10No.2, February2010
[14] S.S Pethakar, N Srivastava and S.D Suryawanshi. Article: “GPSandGSMbased
Vehicle Tracing andEmployeeSecurity System”, InternationalJournal
ofComputerApplications62(6):37-42, January 2013.Published byFoundation
ofComputer Science, New York, USA.

More Related Content

Similar to 8 introduction to references

Cross-border e-commerce trade facilitation and simplication
Cross-border e-commerce trade facilitation and simplicationCross-border e-commerce trade facilitation and simplication
Cross-border e-commerce trade facilitation and simplicationJonathan285782
 
RFID based Airport Management
RFID based Airport Management RFID based Airport Management
RFID based Airport Management iaitoinfotech
 
Road to Secure and Intelligent Customs
Road to Secure and Intelligent CustomsRoad to Secure and Intelligent Customs
Road to Secure and Intelligent Customsrobertzeldy
 
1.smart transportation 2 (3).pptx
1.smart transportation 2 (3).pptx1.smart transportation 2 (3).pptx
1.smart transportation 2 (3).pptxMdMahfoozAlam5
 
IoT VISION FOR SMART PORTS
IoT VISION FOR SMART PORTSIoT VISION FOR SMART PORTS
IoT VISION FOR SMART PORTSLynn Aziz
 
Gst5083 mis w1 a2 schiphol
Gst5083 mis w1 a2  schipholGst5083 mis w1 a2  schiphol
Gst5083 mis w1 a2 schipholgesna39
 
Overview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel SystemOverview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel SystemKunj Joshi 🎤
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
How technology is impacting the logistics industry
How technology is impacting the logistics industryHow technology is impacting the logistics industry
How technology is impacting the logistics industryNatalie Jones
 
IRJET- Vehicle Attendance and Monitoring System
IRJET- Vehicle Attendance and Monitoring SystemIRJET- Vehicle Attendance and Monitoring System
IRJET- Vehicle Attendance and Monitoring SystemIRJET Journal
 
CIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring Showcase
CIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring ShowcaseCIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring Showcase
CIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring ShowcaseDon Miller
 
IRJET- Architectural Optimization of Luggage Tracking System
IRJET- Architectural Optimization of Luggage Tracking SystemIRJET- Architectural Optimization of Luggage Tracking System
IRJET- Architectural Optimization of Luggage Tracking SystemIRJET Journal
 
The impact of technology on logistics
The impact of technology on logisticsThe impact of technology on logistics
The impact of technology on logisticsNatalie Jones
 
Intelligent logistics solution based on 5g router with sim card slot.pdf
Intelligent logistics solution based on 5g router with sim card slot.pdfIntelligent logistics solution based on 5g router with sim card slot.pdf
Intelligent logistics solution based on 5g router with sim card slot.pdfE-Lins Technology Co. Ltd.
 
IoT in Logistics and Supply Chain.pdf
IoT in Logistics and Supply Chain.pdfIoT in Logistics and Supply Chain.pdf
IoT in Logistics and Supply Chain.pdfTechugo
 
An Improved Travel safety using iTrack System
An Improved Travel safety using iTrack SystemAn Improved Travel safety using iTrack System
An Improved Travel safety using iTrack SystemAmrut Pakhale
 
IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.
IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.
IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.Techugo
 

Similar to 8 introduction to references (20)

[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
 
Cross-border e-commerce trade facilitation and simplication
Cross-border e-commerce trade facilitation and simplicationCross-border e-commerce trade facilitation and simplication
Cross-border e-commerce trade facilitation and simplication
 
Timann-box
Timann-boxTimann-box
Timann-box
 
RFID based Airport Management
RFID based Airport Management RFID based Airport Management
RFID based Airport Management
 
Road to Secure and Intelligent Customs
Road to Secure and Intelligent CustomsRoad to Secure and Intelligent Customs
Road to Secure and Intelligent Customs
 
1.smart transportation 2 (3).pptx
1.smart transportation 2 (3).pptx1.smart transportation 2 (3).pptx
1.smart transportation 2 (3).pptx
 
IoT VISION FOR SMART PORTS
IoT VISION FOR SMART PORTSIoT VISION FOR SMART PORTS
IoT VISION FOR SMART PORTS
 
Gst5083 mis w1 a2 schiphol
Gst5083 mis w1 a2  schipholGst5083 mis w1 a2  schiphol
Gst5083 mis w1 a2 schiphol
 
Overview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel SystemOverview of Supply Chain and Logistics Technology & Parcel System
Overview of Supply Chain and Logistics Technology & Parcel System
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
How technology is impacting the logistics industry
How technology is impacting the logistics industryHow technology is impacting the logistics industry
How technology is impacting the logistics industry
 
IRJET- Vehicle Attendance and Monitoring System
IRJET- Vehicle Attendance and Monitoring SystemIRJET- Vehicle Attendance and Monitoring System
IRJET- Vehicle Attendance and Monitoring System
 
CIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring Showcase
CIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring ShowcaseCIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring Showcase
CIMC-Globe Tracker Port of Shenzhen Asset Tracking/Monitoring Showcase
 
IRJET- Architectural Optimization of Luggage Tracking System
IRJET- Architectural Optimization of Luggage Tracking SystemIRJET- Architectural Optimization of Luggage Tracking System
IRJET- Architectural Optimization of Luggage Tracking System
 
The impact of technology on logistics
The impact of technology on logisticsThe impact of technology on logistics
The impact of technology on logistics
 
disruptive technologies
disruptive technologiesdisruptive technologies
disruptive technologies
 
Intelligent logistics solution based on 5g router with sim card slot.pdf
Intelligent logistics solution based on 5g router with sim card slot.pdfIntelligent logistics solution based on 5g router with sim card slot.pdf
Intelligent logistics solution based on 5g router with sim card slot.pdf
 
IoT in Logistics and Supply Chain.pdf
IoT in Logistics and Supply Chain.pdfIoT in Logistics and Supply Chain.pdf
IoT in Logistics and Supply Chain.pdf
 
An Improved Travel safety using iTrack System
An Improved Travel safety using iTrack SystemAn Improved Travel safety using iTrack System
An Improved Travel safety using iTrack System
 
IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.
IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.
IoT in Logistics and Supply Chain- Role, Benefits and Use Cases.
 

More from Devanshu Suman

More from Devanshu Suman (8)

93 appendix pic18(l)f2 x4xk22 (1)
93 appendix pic18(l)f2 x4xk22 (1)93 appendix pic18(l)f2 x4xk22 (1)
93 appendix pic18(l)f2 x4xk22 (1)
 
91 appendix 16 x2 lcd
91 appendix 16 x2 lcd91 appendix 16 x2 lcd
91 appendix 16 x2 lcd
 
10 chapters name
10 chapters name10 chapters name
10 chapters name
 
7 list of figure
7 list of figure7 list of figure
7 list of figure
 
6 contents
6 contents6 contents
6 contents
 
4 acknowledgement
4 acknowledgement4 acknowledgement
4 acknowledgement
 
3 dedicated to our beloved parents
3 dedicated to our beloved parents3 dedicated to our beloved parents
3 dedicated to our beloved parents
 
2 certificate
2 certificate2 certificate
2 certificate
 

Recently uploaded

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 

Recently uploaded (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

8 introduction to references

  • 1. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 1 CHAPTER 1 INTRODUCTION The global supply chain is the network of suppliers, manufacturing centers, warehouses, distribution centers, and retail outlets that transforms raw materials into finished products and delivers them to consumers. Security of the system has traditionally focused on reducing shrinkage—the loss of cargo shipments through theft and misrouting and has brought increased attention to the risks containerized shipping presents. After September 11, 2001, the security of a supply chain has become a major concern to the public and private sectors. In particular, the ocean segment of a supply chain is most vulnerable to security threats. More than 90% of world trade involves containers aboard ships, amounting to about 20 million containers trips annually. For the US, 17,000 containers arrive at US ports each day. Both the government and industries have begun to examine ways to address the threat of terrorism and the potential of having weapons of mass destruction (WMD) in materials flowing through a supply chain. WMD can result in significant loss in human lives, destruction of infrastructure, and erosion of public and business confidence. Ultimately, global trade and prosperity are threatened. 1.1 Objectives: Cargo monitoring system (CMS) is a set of hardware and software that allows control/monitor containers from the point of departure to final destination. The main objectives of such system:  Goods safety;  Illegal and smuggled goods control;  Information about cargo traffic and standing;  Real – time monitoring of hazardous and high value goods. Sometimes it occurs such situations when the containers are loaded with the illegal goods or unloaded without the owner’s acceptance. In order to avoid such situations, it is proposed to monitor cargo transit via GPS tracking system. To ensure
  • 2. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 2 proper and timely response to the intrusive cargo openings, containers are equipped with the mobile GPS device and GSM modem. Additionally door opening sensor is mounted inside the container. GPS device fixates the coordinates of container and transfers information to the main server via GSM network at fixed intervals. The user can connect to the graphic user interface and monitor container traffic as well as door status (was opened or not) with any computer, connected to the Internet. In case when the door is opened, the alert, composed of exact time, coordinates and cargo number is sent to the user’s mobile telephone or email. 1.2 Components of Electronic Cargo Tracking System:  Tracking reader (GPS receiver, RFID reader & GPRS / GSM modem).  Electronic seal.  CTS software platform 1.3 Implementation: The CTS is being implemented using Radio Frequency Identification (RFID) and GPS/GPRS technology. All trucks/vehicles, tankers and containers carrying goods on transit, exports & under control are fitted with a tracking device and electronic lock which sends the lock status, truck location and any violation information on real time basis. 1.4 Problem statement: In addition to ongoing monitoring of the locks and the vehicles, supervisors will use handheld devices to receive/send all information regarding the freights/containers on-line. The Cargo Tracking & Protection System presents all freights, containers and vehicle’s information on a Google Earth, using the GPS location of each component via the GSM network. 1.5 Existing System: A present technology of locking and monitoring the Cargos does not provide effective solutions for the situation. A little corruption among the employees can easily deceive the
  • 3. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 3 Fig.1.1. A Ship carrying cargoes whole security system. Since these Cargos contains material of high value and in high quantity , therefore these containers are more prone to the pilferage and to protect the material we need a sound technique which minimizes the loss due to involvement of the corrupt employees. 1.6 Proposed System: The proposed solution consists of several complexes while the main ones is: Cargo tracking solution for monitoring of the goods. 1.7 Working: After loading the materials in the containers the electronic lock is activated. This lock continuously monitors the global positioning coordinates of the container and sends the data to the base station if requested. During the course of the journey the electronic lock cannot be open as it requires a series of security check before opening. At the destination the driver has to press a button to acknowledge the completion of journey. When the switch is pressed the lock sends the current GPS coordinates to the base station. At the base station the received coordinates are compared with the database to confirm whether the container has reached the right destination or not. If confirmed correctly it will send the password and ID number of the driver to the lock and the password to the driver via GSM.
  • 4. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 4 Then the driver has to prove his identity to the lock by producing a RFID card. After verifying the correct ID number the lock will ask for password and after verifying the correct password it will open the electromagnetic lock. Any activity of pilferage in between the journey can be tracked by sending the GPS coordinates and activation of alarm immediately. The whole routing of the journey of the container can be traced by viewing GPS coordinates on the PC at base station using GOOGLE EARTH. We can extend this project by installing RFID readers to the container which will count and log the quantity of material coming inside or going inside of the container at any particular time.
  • 5. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 5 CHAPTER 2 LITERATURE SURVEY 1 Lecturer Ms. Sarojrani Pattnaik1, Dr. M.S.Khan2 Synergy Institute of Engineering and Technology, Dhenkanal, Orissa, India, Email: rani_saroj7@yahoomail.com 2 Professor, Synergy Institute of Engineering and Technology, Dhenkanal, Orissa, India, Abstract: Prior to September 11, 2001, supply chain security concerns were related to Controlling theft and reducing contraband such as illegal drugs, illegal immigrants, and export of stolen goods. But after September 11, 2001, the threat of terrorist attacks has heightened the need to assure supply chain security. The proposals should be there to create more confidence in supply chain security, while maintaining smooth flows of goods and services in a global supply chain. Resulting from security breaches, can be disastrous. One of the most efficient strategies to ensure supply chain security is to apply the lessons of successful quality improvement programs. In this paper, an attempt has been made to describe how the principles of Total Quality Management (TQM) can actually be used to design and operate processes to assure supply chain security information exchange among trading partners, ports, shipping companies and the governments nor does it call for heightened inspection and scrutiny of the goods flowing through a supply chain. The Quality movement is that the higher quality can be attained at lower cost by proper management and operational design. The central theme of the quality movement is also applicable in supply chain security. By using the right management approach, new technology, and re-engineered operational processes, higher supply chain at lower cost can also be achieved. Keywords: Supply Chain; Supply Chain Security; Six Sigma; Total Quality Management:
  • 6. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 6 Impact of RFID Technology on Tracking of Export Goods in Kenya Joseph K. Siror*, Liang Guangun, Pang Kaifang, Sheng Huanye, Wang Dong Computer Science & Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai, 200240, China josephsiror@gmail.com,liang_guanqun@yahoo.com.cn, kaifang_pang@gmail.com, hsheng@sjtu.edu.cn, wangdong@cs.sjtu.edu.cn Abstract - In this paper the impact of RFID based tracking to address the challenges of diversion of export goods into the local market in Kenya is discussed. Goods would be moved out of the export factories on pretext that it was destined to foreign markets, however, along the way the goods would be dumped and documents falsified to indicate that goods had left the country, thus evading taxes and gaining unfair advantage. An RFID based in- Transit Visibility system was designed and piloted to address the challenges. The system was used to track export cargo from the factories to the port or frontier offices. The system design, workings and pilot results are discussed in this paper. Results from the pilot demonstrated that RFID based tracking has a great impact on curbing diversion and considerable benefits to transporters and other stakeholders thro Keywords: RFID, Container Tracking, In-Transit Visibility, Real Time Location Tracking, Cargo Security, Intelligent Tracking ugh increased efficiency and reduced turn- around
  • 7. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 7 Creating Resilient and Secure Supply Chains Interim Report of Progress and Learnings August 8, 2003 This report was pre pared by James B. Rice, Jr. of the MIT Centre for Transportation and Logistics (CTL) and Federico Caniato of Politecnico di Milano for the Supply Chain Response to Terrorism Project team with contributions from team members Jonathan Fleck,Deena Disraelly, Don Lowtan, Reshma Lensing and Chris Pickett. This work was conductedunder the direction of Professor Yossi Sheffi, CTL Director. Please contact James B. Rice,Jr. of CTL (jrice@mit.edu or 617.258.8584) if you have any questions or if you would like to discuss this research project was initiated to investigate how terrorism and the threat of terrorism are affecting supply chains. The project is entitled “Supply Chain Response to Global Terrorism” to recognize that there have been a number of different responses which affect a firm’s ability to handle disruptions such as terrorism. To fully appreciate the impact of the responses on the firm and its supply chain, the project scope initially entailed studying the response to terrorist attacks (and similar disruptions)from several different perspectives: the risk management community and insurance industry response, the U.S. Government response, the response from shippers and carriers and agents along the supply network, 11 the experience of past disasters, and the use of real options 12 to assess the potential value of flexibility in supply chain design in responding to disruption. The research to date has included a broad literature review from these different perspectives as well as base interviews with 20 firms (primarily shippers). The data from the interviews and literature review were synthesized and analyzed into this body of observations and insights. A more detailed review of the methodology and limitations on the use of the data is report
  • 8. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 8 The Detection and Prevention of Cargo Theft Many companies suffer losses through cargo theft, particularly small businesses, yet it is an area of business crime that receives scant attention. A single truck load of cargo can be worth as much as $3 million. The risk of theft, especially if the goods have a black market value, is very real. Worldwide, the direct cost of cargo theft is estimated at about US$30 billion per year, within direct costs many times higher. Cargo theft occurs in freight- forwarding yards, warehouses and during transportation in trucks, as airfreight and on ships. Cargo is particularly vulnerable while in the process of being loaded or unloaded from trucks, or through documentary fraud. For a small business operating on a just-in- time basis, the loss of freight may threaten viability—particularly if insurance coveris inadequate or compensation payments are contested. Further, the illegal saleof stolen cargo undercuts prices in legitimate businesses. This paper provides an overview of cargo theft, and discusses some target-hardening, freight forwardingand inventory control strategies that can be adopted by smaller Organisations to reduce the risks. Cargo theft creates substantial economic losses, however many incidents are not formally reported and media attention is rare. Cargo can be stolen either by employees or by external offenders. The modus operandi can involve hold-ups, theft from freight yards, theft from containers, theft off trucks, or documentary fraud. The cargo can be legitimately in transit, already illegally in the possession of other offenders, or being transported in a way that avoids excise duty or other taxes.
  • 9. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 9 CHAPTER 3 SYSTEM DESIGN 3.1 Block Diagram: Fig.3.1: Base Station PC GSMMODULE SIM900
  • 10. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 10 Fig.3.2: Block Diagram of the system PIC 18LF46K22 Microcontroller GPSMODULE GSMMODULE SIM300 KEYPAD RFID READER 16x2 LCD Buzzer ELECTROMAGNETIC LOCKING MECHANISM
  • 11. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 11 3.1.1 Cargo Tracking - Electric Lock Each container will be sealed with an Electric lock which will monitor the container location and goods status in order to prevent and alert in case of unauthorized opening, sabotage or theft. Each lock will contain all shipment details. This information will be filled by the customs and revenue authorities in the beginning of each journey and will be read along the way and in the port using a handheld terminal device. This System aims at providing a sound mechanism to prevent the pilferage in the Cargo containers by implying an electronic lock and minimizing the human interference in the security of the Cargo containers. This mechanism secures the containers by an electronic lock which will require a series of security check during opening of the lock. The lock is controlled and monitored by the base station. 3.1.2 LCD DISPLAY (16 X 2) Alphanumeric displays are used in a wide range of applications, including palmtop Computers, word processors, photocopiers, point of sale terminals, medical Instruments, cellular phones, etc. The 16 x 2 intelligent alphanumeric dot matrix Display is capable of displaying 224 different characters and symbols. A full list of the characters and symbols is printed on pages 7/8 (note these symbols can vary between brand of LCD used). Fig 3.3.: LCD DISPLAY (16 X 2)
  • 12. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 12 3.1.3 GPS (GlobalPositioning System) The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. The system provides critical capabilities to military, civil and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver. The GPS project was developed in 1973 to overcome the limitations of previous navigation systems, integrating ideas from several predecessors, including a number of classified engineering design studies from the 1960s. GPS was created and realized by the U.S. Department of Defence (DoD) and was originally run with 24 satellites. It became fully operational in 1995. Each GPS satellite continually broadcasts a signal (carrier frequency with modulation) that include:  A pseudorandom code (sequence of ones and zeros) that is known to the receiver. By time-aligning a receiver-generated version and the receiver- measured version of the code, the time of arrival (TOA) of a defined point in the code sequence, called an epoch, can be found in the receiver clock time scale  A message that includes the time of transmission (TOT) of the code epoch (in GPS system time scale) and the satellite position at that time. Conceptually, the receiver measures the TOAs (according to its own clock) of four satellite signals. From the TOAs and the TOTs, the receiver forms four times of flight (TOF) values, which are (given the speed of light) approximately equivalent to receiver- satellite range differences. The receiver then computes its three-dimensional position and clock deviation from the four TOFs. In practice the receiver position (in three dimensional Cartesian coordinates with origin at the earth's centre) and the offset of the receiver clock relative to GPS system time are computed simultaneously, using the navigation equations to process the TOFs. The receiver's earth-cantered solution location is usually converted to latitude, longitude and height relative to an ellipsoidal earth model. The height may
  • 13. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 13 then be further converted to height relative thegeoids(e.g.,EGM96) (essentially, mean sea level). These coordinates may be displayed, perhaps on a moving map display and/or recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person carrying GPS device). 3.1.4 GSM (GlobalSystem for Mobile Communications) GSM (Global System for Mobile Communications), (originally Groupe Spécial Mobile), is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks used by mobile phones. It is the default global standard for mobile communications with over 90% market share, and is available in over 219 countries and territories. The GSM standard was developed as a replacement for first generation (1G) analogue cellular networks, and originally described a digital, circuit-switched network optimized for full duplex voice telephony. This was expanded over time to include data communications, first by circuit-switched transport, then packet data transport via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM Evolution Fig 3.4.: Structure of GSM Network
  • 14. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 14 Frequency of operation for 2G is 900 MHz or 1800 MHz bands & for 3G it goes up to 2100 MHz. One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking. 3.1.5 RFID (Radio-frequency identification) Reader Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Radio frequency identification (RFID) is one method for Automatic Identification and Data Capture (AIDC). RFID tags are used in many industries. An RFID tag attached to an automobile during production can be used to track its progress through the assembly line. Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags injected, allowing positive identification of the animal. Since RFID tags can be attached to cash, clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised serious privacy concerns A radio-frequency identification system uses tags, or labels attached to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its response. RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive
  • 15. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 15 (BAP) has a small battery on board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That makes a difference in interference and in exposure to radiation. RFID tags contain at least two parts: an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader signal, and other specialized functions; and an antenna for receiving and transmitting the signal. The tag information is stored in a non-volatile memory. The RFID tag includes either fixed or programmable logic for processing the transmission and sensor data, respectively. An RFID reader transmits an encoded radio signal to interrogate the tag. The RFID tag receives the message and then responds with its identification and other information. This may be only a unique tag serial number, or may be product-related information such as a stock number, lot or batch number, production date, or other specific information. Since tags have individual serial numbers, the RFID system design can discriminate among several tags that might be within the range of the RFID reader and read them simultaneously. RFID tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. Tags can also be placed on vehicles, which can be read at a distance, to allow entrance to controlled areas without having to stop the vehicle and present a card or enter an access Yard management, shipping and freight and distribution centres use RFID tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock identify the owner, identification number and type of equipment and its characteristics. This can be used with a database to identify the lading, origin, destination, etc. of the commodities being carried. In commercial aviation, RFID is used to support maintenance on commercial aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines.
  • 16. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 16 Some countries are using RFID for vehicle registration and enforcement. RFID can help detect and retrieve stolen cars. 3.1.6 Electromagnetic Locking Mechanism An electromagnetic lock, magnetic lock, or maglock is a locking device that consists of an electromagnet and an armature plate. There are two main types of electric locking devices. Locking devices can be either "fail safe" or "fail secure". A fail-secure locking device remains locked when power is lost. Fail-safe locking devices are unlocked when de-energized. Direct pull electromagnetic locks are inherently fail-safe. Typically the electromagnet portion of the lock is attached to the door frame and a mating armature plate is attached to the door. The two components are in contact when the door is closed. When the electromagnet is energized, a current passing through the electromagnet creates a magnetic flux that causes the armature plate to attract to the electromagnet, creating a locking action. Because the mating area of the electromagnet and armature is relatively large, the force created by the magnetic flux is strong enough to keep the door locked even under stress. Typical single door electromagnetic locks are offered in both 600 lbs. and 1200 lbs.The power for an electromagnet lock is DC (Direct Current), around 6 W. The current is around 0.5 A when the voltage supply is 12 V DC. Generally, the specification of the electromagnet locks is dual voltages 12/24 V DC 3.1.7 PIC18LF46K22 Microcontroller The PIC18 microcontroller family provides PIC micro devices in 18- to 80-pin packages that are both socket and software upwardly compatible to the PIC16 family. The PIC18 family includes all the popular peripherals, such as MSSP, ESCI, CCP, flexible 8- and 16- bit timers, PSP, 10-bit ADC, WDT, and POR and CAN 2.0B Active for the maximum flexible solution. Most PIC18 devices will provide FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz Optimized for high-level languages like ANSI C, the PIC18 family offers a highly flexible solution for complex embedded applications.  High Performance RISC CPU:  C-Language friendly architecture  PIC16 source code compatible  Linear program memory addressing to 2 Mbyte
  • 17. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 17  Linear data memory addressing up to 4 Kbytes  Up to 10 MIPs operation:  DC - 40 MHz osc/clock input  4 MHz - 10 MHz clock with PLL active  16-bit wide instructions, 8-bit wide data path  Priority levels for interrupts  8 x 8 Single Cycle Hardware Multiplier  Peripheral Features:  High current sink/source 25 mA/25 mA  Up to four external interrupt pins  Up to three 16-bit timer/counters  Up to two 8-bit timer/counters with 8-bit period  register (time-base for PWM)  Secondary LP oscillator clock option - Timer1  Up to five Capture/Compare/PWM (CCP) modules  CCP pins can be configured as:  Capture input: 16-bit, resolution 6.25 ns (TCY/16)  Compare: 16-bit, max. resolution 100 ns (TCY)  PWM output: PWM resolution is 1- to 10-bit  Max. PWM frequency @: 8-bit resolution = 156 kHz  10-bit resolution = 39 kHz  Master Synchronous Serial Port (MSSP) module  Two modes of operation:  3-wire SPITM (supports all 4 SPI modes)  I2CTM Master and Slave mode  Up to 2 Addressable USART modules (ESCI)  Supports interrupt on Address bit  Parallel Slave Port (PSP) module  Analog Features:  10-bit Analog-to-Digital Converter module (A/D) with:  Fast sampling rate  Up to 16 channels input multiplexor  Conversion available during SLEEP
  • 18. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 18  DNL = ±1 LSb, INL = ±1 LSb  Programmable Low Voltage Detection (LVD) module  Supports interrupt-on-low voltage detection  Programmable Brown-out Reset (BOR)  Comparators  Special Microcontroller Features:  Oscillator Start-up Timer (OST)  Watchdog Timer (WDT) with its own on-chip RC oscillator  for reliable operation  Programmable code protection  In-Circuit Serial Programming TM (ICSPTM) via two pins  CMOS Technology:  Fully static design  Wide operating voltage range (2.0V to 5.5V)  Industrial and Extended temperature ranges  Power Managed Features:  Internal RC oscillator for ADC operation during SLEEP  SLEEP mode (IPD < 1 µA typ.)  up to 23 individually selectable wake-up events  3 edge selectable wake-up inputs  4 state change wake-up inputs  Internal RC oscillator for WDT (period wake-up)  RAM retention mode (VDD as low as 1.5V)
  • 19. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 19 CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 Schematics: Fig 4.1: Schematic of system implementation
  • 20. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 20 4.2 Flowchartof the system Start Wait button to be pressed after loading Lock Button Pressed? Activate Magnetic Lock Wait for lock button to be pressed for Unloading at destination Lock Button Pressed ? Enter into GPS function to get the co-ordinates and send it to Base station Co-orindates sent ? Wait for Password message from base station Message received ? Display location matched, Scan RFID Is RFID Matched ? Display RFID matched, Enter Password Is Password Matched ? Open Door Lock Door and Activate Buffer Stop Yes No No Yes No Yes Display Location not matched and Wait for message No Yes RFID Not Matched No Yes No Yes
  • 21. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 21 CHAPTER 5 HARDWARE AND SOFTWARE DESCRIPTION 5.1 HARDWARE DESCRIPTION 5.1.1 MICROCONTROLLER Fig 5.1: PIC18LF46K22 It is the heart of the project, it is the decision maker and it controls all other device interfaced with it. Here we are using PIC18LF46K22 microcontroller. PIC18LF4K22 is a 8-bit, 40 Pin, Low-Power, High-Performance Microcontrollers with XLP Technology. The PIC18 family includes all the popular peripherals, such as MSSP, ESCI, CCP, flexible 8- and 16-bit timers, PSP, 10-bit ADC, WDT, and POR and CAN 2.0B Active for the maximum flexible solution. Most PIC18 devices will provide FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz Optimized for high-level languages like ANSI C, the PIC18 family offers a highly flexible solution for complex embedded applications. Features:  High Performance RISC CPU:  C-Language friendly architecture  PIC16 source code compatible  Linear program memory addressing to 2 Mbyte
  • 22. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 22  Linear data memory addressing up to 4 Kbytes  Up to 10 MIPs operation:  DC - 40 MHz osc/clock input  4 MHz - 10 MHz clock with PLL active  16-bit wide instructions, 8-bit wide data path  Priority levels for interrupts  8 x 8 Single Cycle Hardware Multiplier  Peripheral Features:  High current sink/source 25 mA/25 mA  Up to four external interrupt pins  Up to three 16-bit timer/counters  Up to two 8-bit timer/counters with 8-bit period  register (time-base for PWM)  Secondary LP oscillator clock option - Timer1  Up to five Capture/Compare/PWM (CCP) modules  CCP pins can be configured as:  Capture input: 16-bit, resolution 6.25 ns (TCY/16)  Compare: 16-bit, max. resolution 100 ns (TCY)  PWM output: PWM resolution is 1- to 10-bit  Max. PWM frequency @: 8-bit resolution = 156 kHz  10-bit resolution = 39 kHz  Master Synchronous Serial Port (MSSP) module  Two modes of operation:  3-wire SPITM (supports all 4 SPI modes)  I2CTM Master and Slave mode  Up to 2 Addressable USART modules (ESCI)  Supports interrupt on Address bit  Parallel Slave Port (PSP) module  Analog Features:  10-bit Analog-to-Digital Converter module (A/D) with:  Fast sampling rate  Up to 16 channels input multiplexor  Conversion available during SLEEP
  • 23. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 23  DNL = ±1 LSb, INL = ±1 LSb  Programmable Low Voltage Detection (LVD) module  Supports interrupt-on-low voltage detection  Programmable Brown-out Reset (BOR)  Comparators  Special Microcontroller Features:  Power-on Reset (POR), Power-up Timer (PWRT) and  Oscillator Start-up Timer (OST)  Watchdog Timer (WDT) with its own on-chip RC oscillator  for reliable operation  Programmable code protection  In-Circuit Serial Programming TM (ICSPTM) via two pins  CMOS Technology:  Fully static design  Wide operating voltage range (2.0V to 5.5V)  Industrial and Extended temperature ranges  Power Managed Features:  Dynamically switch to secondary LP oscillator  Internal RC oscillator for ADC operation during SLEEP  SLEEP mode (IPD < 1 µA typ.)  up to 23 individually selectable wake-up events  edge selectable wake-up inputs  4 state change wake-up inputs  Internal RC oscillator for WDT (period wake-up)  RAM retention mode (VDD as low as 1.5V)  Up to 6 more Power Managed modes available on  selected models (PIC18F1320/2320/4320 and PIC18F1220/2220/4220)
  • 24. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 24 5.1.1 PIN DIAGRAM OF PIC18F46K22 DIP Fig 5.2 Pin diagram of PIC18LF46K22
  • 25. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 25 5.1.2 GPS (Global Positioning System): Fig 5.3: GPS module The Global Positioning System(GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. The system provides critical capabilities to military, civil and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver. GPS has become an efficient tool in the field of scientific use, commerce, surveillance and tracking. This project presents a small application based on Global Positioning System. It depicts the use of GPS module/receiver to find latitude and longitude of its location. The data obtained from GPS receiver (GPGGA sentence) is processed by the microcontroller to extract its latitude and longitude values. The GPS module continuously transmits serial data (RS232 protocol) in the form of sentences according to NMEA standards. The latitude and longitude values of the location are contained in the GPGGA sentence (refer NMEA format). In this program, these values are extracted from the GPGGA sentence and are displayed on LCD. The extraction of location values is done as follows. The first six bytes of the data received are compared with the pre-stored (GPGGA) string and if matched then only data is further accounted for; otherwise the process is repeated again. From the comma delimited GPGGA sentence, latitude and longitude positions are extracted by finding the respective comma positions and extracting the data. The latitude and longitude positions
  • 26. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 26 extracted are displayed on the with. The receiver measures the TOAs (according to its own clock) of four satellite signals. From the TOAs and the TOTs, the receiver forms four times of flight (TOF) values, which are (given the speed of light) approximately equivalent to receiver-satellite range differences. The receiver then computes its three- dimensional position and clock deviation from the four TOFs. In practice the receiver position (in three dimensional Cartesian coordinates with origin at the earth's centre) and the offset of the receiver clock relative to GPS system time are computed simultaneously, using the navigation equations to process the TOFs. The receiver's earth-cantered solution location is usually converted to latitude, longitude and height relative to an ellipsoidal earth model. The height may then be further converted to height relative the geoids (e.g., EGM96) (essentially, mean sea level). These coordinates may be displayed, perhaps on a moving map display and/or recorded and/or used by other system (e.g., vehicle guidance, Exactly Locating a person carrying GPS device). Figure 5.4 shows the schematic representation of GPS system. Fig 5.4: Schematic representation of GPS
  • 27. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 27 5.1.3 GSM (Global System for mobile): Fig 5.5: GSM module Architecture of the GSM Network: A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations and Maintenance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services. The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and
  • 28. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 28 other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below. The BSC is the connection between the mobile station and the Mobile service Switching Centre (MSC). Network Subsystem: The central component of the Network Subsystem is the Mobile services Switching Centre (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks.  GSM modem characteristics:  Dual Band or Triband GSM GPRS modem (EGSM 900/1800MHz) / (EGSM 900/1800 / 1900 MHz)  Designed for GPRS, data, fax, SMS and voice applications  Fully compliant with ETSI GSM Phase 2+ specifications (Normal MS)  Input voltage: 8V-40V  Input current: 8mA in idle mode, 150mA in communication GSM 900 @ 12V
  • 29. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 29  Temperature range: Operating -20 to +55 degree Celsius; Storage -25 to +70 degree Celsius  Overall dimensions: 80mm x 62mm x 31mm / Weight: 200g Interfaces  RS-232 through D-TYPE 9 pin connector  RJ11 voice connector  Power supply through Molex 4 pin connector  SMA antenna connector  Toggle spring SIM holder  Red LED Power on  Green LED status of GSM / GPRS module. Here is the figure 5.6 which shows the interfacing of GSM with microcontroller. Fig 5.6: GSM interfaced with microcontroller
  • 30. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 30 5.1.4 KEYPAD: Fig 5.7: 4*3 matrix keypad PIC Microcontrollers provides a library for working with 4*4 keypad. It can also be used to interface 4*3, 4*2 and 4*1 keypads. In our project we are using 4*3 keypad. MikroC provides the following three functions to interface Matrix Keypad.  Keypad_Init  Keypad_Key_Press  Keypad_Key_Click Keypad_Init: Prototype: void Keypad_Init(void); It initializes a particular port for working with keypad. A global variable ‘keypad Port’ must be defined before using this function. Port need to be initialized before calling this function. Keypad_Key_Press: Prototype: char Keypad_Key_Press(void); This function reads key when a key is pressed and it returns number corresponding (1 – 16) to the pressed key. If no key is pressed, it will return 0. Keypad_Key_Click: Prototype chars Keypad_Key_Click (void);
  • 31. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 31 When this function is called, it waits until some key is pressed and released. When released it returns number corresponding (1 – 16) to the pressed key. If no key is pressed, it will return 0. If more than one key is pressed, the function waits until all pressed keys are released and returns number corresponds to first pressed key. Port need to be initialized before calling this function. Here is the figure 5.8 that shows the interfacing of keypad with microcontroller. Fig 5.8: Keypad interfacing with microcontroller
  • 32. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 32 5.1.5 LCD(LIQUID CRYSTAL DISPLAY): Fig 5.9: Circuit diagram of LCD The LCD panel used in this block interfaced with micro-controller through output port. This is a 16 character X 2Line LCD module, capable of display numbers, characters, and graphics. The display contains two internal byte-wide registers, one for commands (RS=0) and the second for character to be displayed (RS=1). It also contains a user programmed Ram area (the character RAM) character that can be formed using dot matrix that can be programmed to generate any desired. Two distinguished between these areas, the hex command byte will be signify that the display RAM address 00h is chosen. LCD can add a lot to our application in terms of providing a useful interface for the user, debugging an application or just giving it a “professional” look. The most common type of LCD controller is the Hitachi 44780 which provides a relatively simple interface between a processor and an LCD. Using this inter is often not attempted by inexperienced designers and programmers because it is difficult to find good documentation on the interface, initializing the interface can be problem and the displays themselves are expensive. Connection to a PC parallel port is mostly simple. These displays can handle eight bit input directly. They also need two extra lines to control which kind of data has just arrived and when the data is meant to e stable. Those signals are also called RS (Register Select, instruction or data register) and EN (enable).
  • 33. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 33 PIN DETAILS OF LCD: Pin No. Name Description Pin no. 1 VSS Power supply (GND) Pin no. 2 VCC Power supply (+5V) Pin no. 3 VEE Contrast adjust Pin no. 4 RS 0 = Instruction input 1 = Data input Pin no. 5 R/W 0 = Write to LCD module 1 = Read from LCD module Pin no. 6 EN Enable signal Pin no. 7 D0 Data bus line 0 (LSB) Pin no. 8 D1 Data bus line 1 Pin no. 9 D2 Data bus line 2 Pin no. 10 D3 Data bus line 3 Pin no. 11 D4 Data bus line 4 Pin no. 12 D5 Data bus line 5 Pin no. 13 D6 Data bus line 6 Pin no. 14 D7 Data bus line 7 (MSB) Pin no. 15 LED+ Anode of LED for Backlit Pin no. 16 LED- Cathode of LED for Backlit Table No 5.1: Pin Details of LCD
  • 34. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 34 5.1.6 Relay: Fig 5.10: Relay Relay is one of the most important electromechanical devices highly used in industrial applications specifically in automation. A relay is used for electronic to electrical interfacing i.e. it is used to switch on or off electrical circuits operating at high AC voltage using a low DC control voltage. A relay generally has two parts, a coil which operates at the rated DC voltage and a mechanically movable switch. The electronic and electrical circuits are electrically isolated but magnetically connected to each other; hence any fault on either side does not affect the other side. Relay switch consists of five terminals. Two terminals are used to give the input DC voltage also known as the operating voltage of the relay. Relays are available in different operating voltages like 6V, 12V, 24V etc. The rest of the three terminals are used to connect the high voltage AC circuit. The terminals are called Common, Normally Open (NO) and Normally Closed (NC). Relays are available in various types & categories and in order to identify the correct configuration of the output terminals, it is best to see the data sheet or manual. Normally Open is connected to12V and normally close is connected to ground. By the help of a switch, Common is connected either to Normally Open or Normally Close depending on the condition. Here; in our project we are using five relays, four to rotate two motors in clock wise and anticlockwise direction which is connected with two containers and one relay with another motor which is connected with belt. Motor is connected to common terminal of relay. Out of two terminals of input DC one is connected to ULN2803.
  • 35. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 35 When there is voltage difference between two terminals, i.e. one terminal of ULN2003 and another with operating voltage of relay then the EMF is induced in between them and the Common is connected to Normally Open. When there is no voltage difference between one terminal of ULN2003 and another terminal of operating voltage of relay then no EMF is induced in between them and the Common is connected to Normally Close. Relay circuit: Relay circuit is used to activate the relay through microcontroller. In this circuit we have to use a Darlington transistor (Tip122) for switch on the relay. The relay is an electromagnetic device which energies when the supply is given. In this circuit, relay is working in the positive logic. That means when the microcontroller gives high to the relay circuit the Darlington transistor is switched on and also the relay is ON. When the microcontroller gives low to the relay circuit the Darlington transistor is switched off and also the relay is OFF. The two diodes are used for protecting the microcontroller from the load due to back EMF and EMI problems. Fig 5.11: Circuit diagram of relay
  • 36. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 36 5.1.7 RFID (Radio-frequencyidentification) Reader: Fig 5.12: RFID Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object. Radio frequency identification (RFID) is one method for Automatic Identification and Data Capture (AIDC). RFID tags are used in many industries. An RFID tag attached to an automobile during production can be used to track its progress through the assembly line. Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags injected, allowing positive identification of the animal. Since RFID tags can be attached to cash, clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised serious privacy concerns A radio-frequency identification system uses tags, or labels attached to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its response. RFID tags can be passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID
  • 37. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 37 reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader. However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That makes a difference in interference and in exposure to radiation. Tags may either be read-only, having a factory-assigned serial number that is used as a key into a database, or may be read/write, where object-specific data can be written into the tag by the system user. Field programmable tags may be writing-once, read- multiple; "blank" tags may be written with an electronic product code by the user. RFID tags contain at least two parts: an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader signal, and other specialized functions; and an antenna for receiving and transmitting the signal. The tag information is stored in a non-volatile memory. The RFID tag includes either fixed or programmable logic for processing the transmission and sensor data, respectively. An RFID reader transmits an encoded radio signal to interrogate the tag. The RFID tag receives the message and then responds with its identification and other information. This may be only a unique tag serial number, or may be product-related information such as a stock number, lot or batch number, production date, or other specific information. Since tags have individual serial numbers, the RFID system design can discriminate among several tags that might be within the range of the RFID reader and read them simultaneously. RFID tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. Tags can also be placed on vehicles, which can be read at a distance, to allow entrance to controlled areas without having to stop the vehicle and present a card or enter an access Yard management, shipping and freight and distribution centers use RFID tracking. In the railroad industry, RFID tags mounted on locomotives and rolling stock identify the owner, identification number and type of equipment and its characteristics. This can be used with a database to identify the lading, origin, destination, etc. of the commodities being carried.
  • 38. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 38 In commercial aviation, RFID is used to support maintenance on commercial aircraft. RFID tags are used to identify baggage and cargo at several airports and airlines. Some countries are using RFID for vehicle registration and enforcement. RFID can help detect and retrieve stolen cars.
  • 39. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 39 5.1.8 BUZZER: Fig 5.13: Buzzer A buzzer or beeper is an audio signalling device, which may be mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse click or keystroke. A piezoelectric element may be driven by an oscillating electronic circuit or other audio signal source, driven with a piezoelectric audio amplifier. Sounds commonly used to indicate that a button has been pressed are a click, a ring or a beep.
  • 40. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 40 5.2 SOFTWARE DESCRIPTION 5.2.1 Embedded C: An embedded system is n application that contains at least one programmable computer (typically in the form of microcontroller, a microprocessor or digital signal processor chip) and which is used by individuals who are; in the main unaware that the system is computer-based.in embedded C this can be done using specific inbuilt instruction. Embedded C is controller or target specific. It allows direct communication with memory. 5.2.2 MPLAB IDE: MPLAB IDE is a software program that runs on a PC to develop application for Microchip microcontroller. It is called an Integrated Development Environment, or IDE, because it provide a single integrated environment to develop code for embedded microcontrollers. A development system for embedded controllers is a system of programs running on a desktop PC to help write, debug and program code. The intelligence of embedded system applications into a microcontroller. MPLAB IDE runs on a PC and contains all components needed to design and deploy embedded system application.
  • 41. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 41 CHAPTER 6 RESULT AND TESTING 6.1 Result: While testing of this project it was found that electronic door was being locked after loading the cargo. Then while reaching to the destination, exact location was sent to the base station. Base station sent a random password to the vehicle & authorized person GSM mobile after verifying the coordinates. After scanning an authorized RFID card same password was entered and if password correct door was open. 6.2 Testing: Fig6.1: Booting of the system Fig: 6.2: Welcome Screen of the system Fig6.3: After loading press switch message being displayed
  • 42. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 42 Fig6.4 Electromagnetic door has been locked Fig 6.5 Request has been sent to the base station along with exact coordinate
  • 43. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 43 Fig 6.6: VB giving an exact location of cargo with the help of GSM & GPS
  • 44. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 44 CHAPTER 7 ADVANTAGES AND LIMITATIONS 7.1 ADVANTAGES The proposed system has following Advantages.  Use of information to identify compliant stakeholders in the industry.  Platform for exchange of information with other Government agencies.  Develop improved risk assessment systems.  Serve as data sources and as a data exchange tool for Regional cargo tracking.  Maximize revenue collection due to,  Anti-dumping/diversion of transit, export, excisable export goods;  Fast movement of goods along the Kenya supply chain;  Elimination of non-tariff barriers to trade and traffic;  Reduction of corruption cases and promotion of integrity  Increased the level of security of monitored goods.  Fast movement of goods and conveyances along the corridors. Improve voluntary levels of compliance low cost of compliance 7.2 LIMITATIONS The proposed system has following Limitations  System knowledge and commitment among the users. (Training)  Maintenance and capacity challenges  Hardware failures, Systems integration
  • 45. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 45 CHAPTER 8 APPLICATIONS DirectBenefits to Private Firms  Improved reliability and service quality, usually thought of as tools to retain good customers and grow market share and revenue.  Improved shipment and container integrity, built around a core of security issues. DirectPublic SectorBenefits  Increased Greater national security  Improved safety
  • 46. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 46 CHAPTER 9 CONCLUSION FUTURE ENHANCEMENT 9.1 Conclusion Logistic Companies will benefit greatly with the full Implementation of the Electronic Cargo Tracking System. With a comprehensive solution for the monitoring of transit cargo, its status, location and other pertinent information about it in real time, hence securing the Supply chain. 9.2 Future Enhancement  With the implementation of this project Logistic companies will benefit greatly.  Insurance companies will have to pay fewer claims to logistic companies as there will be decrease in number of loss of cargoes.  Will the further development in project it can help in preventing human trafficking through as well.
  • 47. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 47 REFERENCES Websites referred: http://www.raviyp.com/embedded/183-sim900-sim908-gsm-module-autobaud-solution Journals & Books Referred: [1] Fleischer P.B., Nelson A.Y.,Sowah R.A.,Bremang, A., “Designand development of GPS/GSM basedvehicle tracking andalertsystemforcommercialinter-city buses”,Adaptive Science&Technology (ICAST),2012IEEE 4thInternational Conference on:25-27Oct.2012Page(s):1– 6 [2] GaneshG.S.P,BalajiB,VaradhanT.A.S,“Anti-thefttracking systemforautomobiles(autogsm)Fulltextsign-Inor Purchase”, Anti- Counterfeiting,SecurityandIdentification(ASID),2011 IEEEInternationalConferenceon24-26June2011Page(s):17–19 [3] ZhigangLiu, AnqiZhang, ShaojunLi, “Vehicleanti-theft trackingsystembasedonInternetof things”,Vehicular Electronics and Safety (ICVES), 2013 IEEE InternationalConference on2013,Page(s): 48–52 [4] HuiSong,SencunZhu,GuohongCao,“SVATS:ASensor- Network- BasedVehicleAnti-theftsystem”,INFOCOM2008.The 27thConference onComputer Communications.IEEE [5] BaburaoKodavati,V.K.Raju, S.SrinivasaRao, A.V.Prabu, T.Appa Rao,Dr.Y.V.Narayana “GPSBasedAutomatic VehicleTrackingUsingRFID”,InternationalJournal of Engineering Research and Applications , Vol. 1, Issue 3, pp.616-62. [6] DevyaniBajaj,NeeleshGupt,“GSMandGPSbasedvehicle locationandtrackingsystem”,International Journal of Engineering and Innovative Technology (IJEIT) Volume 1,Issue 1,January2012 [7] Mrs.Ramyakulandaivel,P.Ponmalar,B.Geetha,G.Saranya, “GPS and GSM based vehicle information system”, International Journal of Communications and EngineeringVolume 01–No.1,Issue:01March 2012.
  • 48. Tracking and Checking Cargo Containers Pilferage Using Electronic Lock Dept of ECE, SSIT, Tumakuru 2014-15 48 [8] DeepakMishra,Apurv Vas,PuneetTandon,“A novelandcost effectiveapproachtopublic vehicletrackingsystem”, InternationalJournalofubicomp(IJU),Vol.3,No.1,January2012. [9] RuchikaGuptaandBVRReddy,“GPSandGPRSBasedCostEffective Human TrackingSystem UsingMobilePhones”,Volume 2January-June 2011. [10] MohammadA.Al-Khedher,“HybridGPS-GSMLocalization of AutomobileTracking System”,InternationalJournal of ComputerScience&InformationTechnology (IJCSIT)Vol3, No 6,Dec 2011. [11] FrancisEnejoIdachaba“DesignofaGPS/GSMbasedtrackerfor the location of stolen items and kidnapped or missing personsinNIGERIA”,ARPNJournal of Engineeringand Applied Sciences VOL.6,NO.10,OCTOBER 2011. [12] AdnanI.Yaqzan,IssamW.Damaj,andRachedN.Zantout“GPS-based VehicleTrackingSystem-on-Chip”,Proceedings of theWorldCongressonEngineering 2008VolI WCE2008, July2- 4,2008,London,U.K. [13] T.KrishnaKishore,T.SasiVardhan,N.LakshmiNarayana,“Vehicle Tracking Using a Reliable Embedded Data Acquisition SytemWithGPS andGSM”,IJCSNSInternational JournalofComputerScienceandNetworkSecurity,VOL.10No.2, February2010 [14] S.S Pethakar, N Srivastava and S.D Suryawanshi. Article: “GPSandGSMbased Vehicle Tracing andEmployeeSecurity System”, InternationalJournal ofComputerApplications62(6):37-42, January 2013.Published byFoundation ofComputer Science, New York, USA.