SlideShare a Scribd company logo
Tracking and checking cargo containers
pilferage using electronic lock
Presented By-
Devanshu
Suman
Ashutosh
Kumar
Ashrafuddin
Ahmad
Kumari Prity
UNDER
THE GUIDANCE OF-
SREERANGAP
PA.M
ASST.
PROFESSOR
(DEPT OF E&C)
 Abstract
 Introduction
 Problem Statement
 Working
 Literature Survey
 Block Diagram
 System Implementation
 Advantages
 Applications
 Hardware and Software requirenents
 Limitations
 Conclusion
 References
Overview
 In the United States there is an emerging trend to ship goods by rail
directly from ports to inland intermodal traffic terminals. However,
for this trend to succeed shippers must have “visibility” into rail
shipments.
 The main object of this project is to provide visibility into shipments
through optimal placement of sensor and communication
technology.
 This model can be used to determine cost effectivenss.
Abstract
 Security of the system has traditionally focused on reducing shrinkage
the loss of cargo shipments through theft and misrouting and has
brought increased attention to the risks containerized shipping presents.
 Cargo monitoring system (CMS) is a set of hardware and software
that allows control/monitor containers from the point of departure to
final destination Goods safety.
 Illegal and smuggled goods control.
 Information about cargo traffic and standing.
 Real -time monitoring of hazardous and high value goods.
 Monitor cargo transit via GPS tracking system. To ensure proper and
timely response to the intrusive cargo openings, containers are
equipped with the mobile GPS device and GSM modem. Additionally
door opening sensor is mounted inside the container.
Continued….
Introduction
The ECTS is being implemented using Radio Frequency Identification
(RFID) and GPS/GPRS technology
All trucks/vehicles, tankers and containers carrying goods on transit,
exports & under control are fitted with a tracking device and electronic
seal which sends the seal status, truck location and any violation
information on real time basis
 In addition to ongoing monitoring of the locks and the vehicles,
supervisors will use handheld devices to receive/send all
information regarding the freights/containers on-line. The Cargo
Tracking & Protection System presents all freights, containers and
vehicle’s information on a Google Earth, using the GPS location of
each component via the GSM network.
 A present technology of locking and monitoring the Cargos does not
provide effective solutions for the situation these Cargos contains
material of high value and in high quantity , therefore these
containers are more prone to the pilferage and to protect the material
we need a sound technique which minimizes the loss due to
involvement of the corrupt employees.
Problem Statement
cargo container pilferege project
 This lock continuously monitors the global positioning coordinates
of the container and sends the data to the base station if requested
 During the course of the journey the electronic lock cannot be open
as it requires a series of security check before opening
 At the destination the driver has to press a button to acknowledge
the completion of journey. When the switch is pressed the lock
sends the current GPS coordinates to the base station. At the base
station the received coordinates are compared with the database to
confirm whether the container has reached the right destination or
not. If confirmed correctly it will send the password and ID number
of the driver to the lock and the password to the driver via GSM.
Continued…
Working
 Then the driver has to prove his identity to the lock by producing a
RFID card. After verifying the correct ID number the lock will ask for
password and after verifying the correct password it will open the
electromagnetic lock. Any activity of pilferage in between the journey
can be tracked by sending the GPS coordinates and activation of alarm
immediately.
Continued..
The whole routing of the journey of the container can be traced by viewing
GPS coordinates on the PC at base station using GOOGLE EARTH.
We can extend this project by installing RFID readers to the container which
will count and log the quantity of material coming inside or going inside of
the container at any particular time.
 Title of the Project report was “Tacking and checking cargo
containers pilferage using electronic lock”.
 It was a project done by Sandeep Singh R, Feroz Morab, Sadiya
Thazeen, Mohamed Najmus Saqhib, [M.Tech] SJCIT,
Chikkaballapur, Karnataka.
 They have proposed a sound mechanism to prevent pilferage in the
cargo containers by implying an electronic lock and having series of
basic security check like swapping the RFID card provided to the
customer, biometric sensor and by entering the password which is
sent at the time of delivery to the customer, thereby minimizing the
human interference with regard to the security of the cargo
containers .
 The SMS Based Vehicle Tracking System has been implemented
using GPS module and GSM / GPRS module SIM300.
Continued…
LITERATURE SURVEY
Once the vehicle reaches the destination, a message is sent to Monitoring
system. If the coordinates match then a password is sent to the person who
is collecting the consignment. Once the password is reached, LCD displays
“Swipe The RFID Card And Enter Password”. Upon the card swiping and
password entering, if these two parameters are accurate only then the door
opens, otherwise the monitoring system gets a Tampering message. The user
gets only 3 attempts to enter the correct password
The complete project was implemented using software KIEL UV4 for
Programming, debugging and compiling. Once this program is compiled
and target is generated, flash the program into the IC using software FLASH
MAGIC. KICAD is used for schematic and PCB designing of the complete
project and VB6.0 software is used for Front-end design for monitoring
system.
Hardware they used were basically GPS, RFID, Electromagnetic Lock,
Microcontroller 89S52.
Block Diagram
 LCD DISPLAY (16 X 2)-The 16 x 2 intelligent alphanumeric dot
matrix Display is capable of displaying 224 different characters and
symbols.
 GPS (Global Positioning System)-The Global Positioning
System (GPS) is a space-based satellite navigation system that
provides location and time information in all weather conditions,
anywhere on or near the Earth where there is an unobstructed line of
sight to four or more GPS satellites. The system provides critical
capabilities to military, civil and commercial users around the world.
 GSM (Global System for Mobile Communications) -
GSM (Global System for Mobile Communications) is a standard
developed to describe protocols for second generation (2G)
digital cellular networks used by mobile phones.
Continued…
DETAILS OF BLOCK DIAGRAM
The GSM standard was developed as a replacement for first generation (1G)
analog cellular networks, and originally described a digital, circuit-switched
network optimized for full duplex voice telephony. This also includes data
communications, first by circuit-switched transport, then packet data transport
via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates
for GSM Evolution or EGPRS). The 3G developed third generation (3G)
UMTS standards followed by fourth generation (4G) LTE advanced standards.
RFID( Radio-frequency identification Reader)-
Radio frequency identification (RFID) is the wireless use of electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking
tags attached to objects
Electromagnetic Locking Mechanism- An electromagnetic lock, magnetic
lock, or maglock is a locking device that consists of an electromagnet and an
armature plate. There are two main types of electric locking devices. Locking
devices can be either "fail safe" or "fail secure".
Continued…
Buzzer- A buzzer or beeper is an audio signalling device, which may be
mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and
beepers include alarm devices, timers and confirmation of user input such as a
mouse click or keystroke. A piezoelectric element may be driven by
an oscillating electronic circuit or other audio signal source, driven with
a piezoelectric audio amplifier. Sounds commonly used to indicate that a button
has been pressed are a click, a ring or a beep.
PIC 18 Microcontroller- The PIC18 microcontroller family provides
PICmicro devices in 18- to 80-pin packages. Most PIC18 devices will provide
FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from
256 to 4 Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz
Optimized for high-level languages like ANSI C, the PIC18 family offers a
highly flexible solution for complex embedded applications.
 Pic microcontroller :
o 18-80 pin
o FLASH program memory in sizes from 8 to 128 Kbytes and
data RAM from 256 to 4 Kbytes
o operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz
SystemImplementation
 LCD Display :
o 16 character × 2Line LCD module
o display contains two internal byte-wide registers
o It contains a user programmed Ram area
o displays can handle eight bit input directly
Relay:
o It is used to switch on or off electrical circuits operating at high
AC voltage using a low DC control voltage.
o Relay switch consists of five terminals.
o Relays are available in different operating voltages like 6V,
12V, 24V
GSM
 SIM900/SIM908 is powered on for first time, it will be in auto
baud mode. This feature makes the GSM module smarter by
which it can detect at which baud rate your
microcontroller/terminal is sending the data.
9/22/2016
GPS
 Global Positioning System.
 It depicts the use of GPS module/receiver to find
latitude and longitude of its location.
9/22/2016
Keypad
 The Mikroc Pro for PIC Microcontrollere
provides a library for working with 4*4, 4*3,
4*2 and 4*1 keypads.
9/22/2016
RFID Reader
 Radio-Frequency Identification (RFID) is the
wireless use of electromagnetic fields to transfer data,
for the purpose of automatically identifying and
tracking tags attached to the object.
9/22/2016
 Use of information to identify compliant stake holders
 Platform for exchange of information
 Serve as data sources and as a data exchange tool for Regional
cargo tracking.
 Serve as data sources and as a data exchange tool for Regional
cargo tracking.
 Improve voluntary levels of compliance.
 Low cost of compliance.
ADVANTAGES
 Direct Benefitsto Private Firms
 Efficiency and productivity, often thought of as cost reduction benefits.
 Improved reliability and service quality.
 Improved shipment and container integrity.

 Direct Public Sector Benefits
 More efficient and effective government operations.
 Increased Greater national security.
 Improved safety.
 Indirect Freight Network Benefits
 Exponential increase in total benefits.
 Economies of scale and decreasing unit cost of network expansion
APPLICATIONS
 Hardware Requirements:
o 89C51 Hardware Designing
o Interfacing GPS with microcontroller
o Interfacing GSM with PC.
o PCB designing and concepts
 Software Requirements:
o Coding in Embedded C
o Maintaining of database in Microsoft Access.
HARDWARE AND SOFTWARE REQUIREMENTS
 Resistance – embracing by users.
 System knowledge and commitment among the users.
 ICT challenges –integration.
 Vendors challenges.
LIMITATIONS:
 With a comprehensive solution for the monitoring of transit cargo,
its status, location and other pertinent information about it in real
time, hence securing the Supply chain.
CONCLUSION
Result
 Here we can see in our system that the base station
can see the exact location of the cargo and hence give
the authorization to the driver, using GPS and GSM.
9/22/2016
 http://en.wikipedia.org/wiki/GSM
 http://en.wikipedia.org/wiki/Global_
Positioning_System
REFERENCES
cargo container pilferege project
THANKS FORYOUR ATTENTION !

More Related Content

cargo container pilferege project

  • 1. Tracking and checking cargo containers pilferage using electronic lock Presented By- Devanshu Suman Ashutosh Kumar Ashrafuddin Ahmad Kumari Prity UNDER THE GUIDANCE OF- SREERANGAP PA.M ASST. PROFESSOR (DEPT OF E&C)
  • 2.  Abstract  Introduction  Problem Statement  Working  Literature Survey  Block Diagram  System Implementation  Advantages  Applications  Hardware and Software requirenents  Limitations  Conclusion  References Overview
  • 3.  In the United States there is an emerging trend to ship goods by rail directly from ports to inland intermodal traffic terminals. However, for this trend to succeed shippers must have “visibility” into rail shipments.  The main object of this project is to provide visibility into shipments through optimal placement of sensor and communication technology.  This model can be used to determine cost effectivenss. Abstract
  • 4.  Security of the system has traditionally focused on reducing shrinkage the loss of cargo shipments through theft and misrouting and has brought increased attention to the risks containerized shipping presents.  Cargo monitoring system (CMS) is a set of hardware and software that allows control/monitor containers from the point of departure to final destination Goods safety.  Illegal and smuggled goods control.  Information about cargo traffic and standing.  Real -time monitoring of hazardous and high value goods.  Monitor cargo transit via GPS tracking system. To ensure proper and timely response to the intrusive cargo openings, containers are equipped with the mobile GPS device and GSM modem. Additionally door opening sensor is mounted inside the container. Continued…. Introduction
  • 5. The ECTS is being implemented using Radio Frequency Identification (RFID) and GPS/GPRS technology All trucks/vehicles, tankers and containers carrying goods on transit, exports & under control are fitted with a tracking device and electronic seal which sends the seal status, truck location and any violation information on real time basis
  • 6.  In addition to ongoing monitoring of the locks and the vehicles, supervisors will use handheld devices to receive/send all information regarding the freights/containers on-line. The Cargo Tracking & Protection System presents all freights, containers and vehicle’s information on a Google Earth, using the GPS location of each component via the GSM network.  A present technology of locking and monitoring the Cargos does not provide effective solutions for the situation these Cargos contains material of high value and in high quantity , therefore these containers are more prone to the pilferage and to protect the material we need a sound technique which minimizes the loss due to involvement of the corrupt employees. Problem Statement
  • 8.  This lock continuously monitors the global positioning coordinates of the container and sends the data to the base station if requested  During the course of the journey the electronic lock cannot be open as it requires a series of security check before opening  At the destination the driver has to press a button to acknowledge the completion of journey. When the switch is pressed the lock sends the current GPS coordinates to the base station. At the base station the received coordinates are compared with the database to confirm whether the container has reached the right destination or not. If confirmed correctly it will send the password and ID number of the driver to the lock and the password to the driver via GSM. Continued… Working
  • 9.  Then the driver has to prove his identity to the lock by producing a RFID card. After verifying the correct ID number the lock will ask for password and after verifying the correct password it will open the electromagnetic lock. Any activity of pilferage in between the journey can be tracked by sending the GPS coordinates and activation of alarm immediately. Continued..
  • 10. The whole routing of the journey of the container can be traced by viewing GPS coordinates on the PC at base station using GOOGLE EARTH. We can extend this project by installing RFID readers to the container which will count and log the quantity of material coming inside or going inside of the container at any particular time.
  • 11.  Title of the Project report was “Tacking and checking cargo containers pilferage using electronic lock”.  It was a project done by Sandeep Singh R, Feroz Morab, Sadiya Thazeen, Mohamed Najmus Saqhib, [M.Tech] SJCIT, Chikkaballapur, Karnataka.  They have proposed a sound mechanism to prevent pilferage in the cargo containers by implying an electronic lock and having series of basic security check like swapping the RFID card provided to the customer, biometric sensor and by entering the password which is sent at the time of delivery to the customer, thereby minimizing the human interference with regard to the security of the cargo containers .  The SMS Based Vehicle Tracking System has been implemented using GPS module and GSM / GPRS module SIM300. Continued… LITERATURE SURVEY
  • 12. Once the vehicle reaches the destination, a message is sent to Monitoring system. If the coordinates match then a password is sent to the person who is collecting the consignment. Once the password is reached, LCD displays “Swipe The RFID Card And Enter Password”. Upon the card swiping and password entering, if these two parameters are accurate only then the door opens, otherwise the monitoring system gets a Tampering message. The user gets only 3 attempts to enter the correct password The complete project was implemented using software KIEL UV4 for Programming, debugging and compiling. Once this program is compiled and target is generated, flash the program into the IC using software FLASH MAGIC. KICAD is used for schematic and PCB designing of the complete project and VB6.0 software is used for Front-end design for monitoring system. Hardware they used were basically GPS, RFID, Electromagnetic Lock, Microcontroller 89S52.
  • 14.  LCD DISPLAY (16 X 2)-The 16 x 2 intelligent alphanumeric dot matrix Display is capable of displaying 224 different characters and symbols.  GPS (Global Positioning System)-The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. The system provides critical capabilities to military, civil and commercial users around the world.  GSM (Global System for Mobile Communications) - GSM (Global System for Mobile Communications) is a standard developed to describe protocols for second generation (2G) digital cellular networks used by mobile phones. Continued… DETAILS OF BLOCK DIAGRAM
  • 15. The GSM standard was developed as a replacement for first generation (1G) analog cellular networks, and originally described a digital, circuit-switched network optimized for full duplex voice telephony. This also includes data communications, first by circuit-switched transport, then packet data transport via GPRS (General Packet Radio Services) and EDGE (Enhanced Data rates for GSM Evolution or EGPRS). The 3G developed third generation (3G) UMTS standards followed by fourth generation (4G) LTE advanced standards. RFID( Radio-frequency identification Reader)- Radio frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects Electromagnetic Locking Mechanism- An electromagnetic lock, magnetic lock, or maglock is a locking device that consists of an electromagnet and an armature plate. There are two main types of electric locking devices. Locking devices can be either "fail safe" or "fail secure". Continued…
  • 16. Buzzer- A buzzer or beeper is an audio signalling device, which may be mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse click or keystroke. A piezoelectric element may be driven by an oscillating electronic circuit or other audio signal source, driven with a piezoelectric audio amplifier. Sounds commonly used to indicate that a button has been pressed are a click, a ring or a beep. PIC 18 Microcontroller- The PIC18 microcontroller family provides PICmicro devices in 18- to 80-pin packages. Most PIC18 devices will provide FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes; operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz Optimized for high-level languages like ANSI C, the PIC18 family offers a highly flexible solution for complex embedded applications.
  • 17.  Pic microcontroller : o 18-80 pin o FLASH program memory in sizes from 8 to 128 Kbytes and data RAM from 256 to 4 Kbytes o operating from 2.0 to 5.5volts, at speeds from DC to 40 MHz SystemImplementation
  • 18.  LCD Display : o 16 character × 2Line LCD module o display contains two internal byte-wide registers o It contains a user programmed Ram area o displays can handle eight bit input directly
  • 19. Relay: o It is used to switch on or off electrical circuits operating at high AC voltage using a low DC control voltage. o Relay switch consists of five terminals. o Relays are available in different operating voltages like 6V, 12V, 24V
  • 20. GSM  SIM900/SIM908 is powered on for first time, it will be in auto baud mode. This feature makes the GSM module smarter by which it can detect at which baud rate your microcontroller/terminal is sending the data. 9/22/2016
  • 21. GPS  Global Positioning System.  It depicts the use of GPS module/receiver to find latitude and longitude of its location. 9/22/2016
  • 22. Keypad  The Mikroc Pro for PIC Microcontrollere provides a library for working with 4*4, 4*3, 4*2 and 4*1 keypads. 9/22/2016
  • 23. RFID Reader  Radio-Frequency Identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purpose of automatically identifying and tracking tags attached to the object. 9/22/2016
  • 24.  Use of information to identify compliant stake holders  Platform for exchange of information  Serve as data sources and as a data exchange tool for Regional cargo tracking.  Serve as data sources and as a data exchange tool for Regional cargo tracking.  Improve voluntary levels of compliance.  Low cost of compliance. ADVANTAGES
  • 25.  Direct Benefitsto Private Firms  Efficiency and productivity, often thought of as cost reduction benefits.  Improved reliability and service quality.  Improved shipment and container integrity.   Direct Public Sector Benefits  More efficient and effective government operations.  Increased Greater national security.  Improved safety.  Indirect Freight Network Benefits  Exponential increase in total benefits.  Economies of scale and decreasing unit cost of network expansion APPLICATIONS
  • 26.  Hardware Requirements: o 89C51 Hardware Designing o Interfacing GPS with microcontroller o Interfacing GSM with PC. o PCB designing and concepts  Software Requirements: o Coding in Embedded C o Maintaining of database in Microsoft Access. HARDWARE AND SOFTWARE REQUIREMENTS
  • 27.  Resistance – embracing by users.  System knowledge and commitment among the users.  ICT challenges –integration.  Vendors challenges. LIMITATIONS:
  • 28.  With a comprehensive solution for the monitoring of transit cargo, its status, location and other pertinent information about it in real time, hence securing the Supply chain. CONCLUSION
  • 29. Result  Here we can see in our system that the base station can see the exact location of the cargo and hence give the authorization to the driver, using GPS and GSM. 9/22/2016