103
RFID BASED DESIGN FOR VEHICLE LOCATION SYSTEM A Thesis Submitted to the College of Engineering of Al-Nahrain University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Engineering by HASSAN ABDULSALAM HAMID (B.Sc., 2006) Thoul Hijjah 1432 November 2011

RFID Based Design for Vehicle Location System

  • Upload
    usah84

  • View
    705

  • Download
    0

Embed Size (px)

DESCRIPTION

RFID based design for vehicle location system is MSc thesis in computer engineering. It by Hassan Abdulsalam HamidRFID, Vehicle, Traffic Congestion, ITS,

Citation preview

Page 1: RFID Based Design for Vehicle Location System

RFID BASED DESIGN FOR

VEHICLE LOCATION

SYSTEM

A Thesis

Submitted to the College of Engineering

of Al-Nahrain University in Partial Fulfillment

of the Requirements for the Degree of

Master of Science

in

Computer Engineering

by

HASSAN ABDULSALAM HAMID

(B.Sc., 2006)

Thoul Hijjah 1432

November 2011

Page 2: RFID Based Design for Vehicle Location System
Page 3: RFID Based Design for Vehicle Location System
Page 4: RFID Based Design for Vehicle Location System

I

Abstracts

Due to the rapid growth in the number of vehicles on the street, traffic

problems are bound to exist. Hence, implementation of Intelligent

Transportation Systems (ITS) to obtain traffic information from roads by

Automatic Vehicle Identification (AVI) is becoming an urgent necessity. The

Radio Frequency Identification (RFID) Technology can be used for AVI to

collect the traffic information in real-time from roads by getting the vehicles

ID from RFID readers.

This thesis tackles the problem of designing Vehicle Location System

(VLS), the proposed system consists of a passive RFID tags on vehicles,

RFID reader, reader's antenna, wireless communication with a Central

Computer System (CCS) and commanding software (RFID middleware and

database structure), also VLS applications, SMS server and website. The

designed system controls, manages and monitors the performance of RFID

readers. It also filters and stores the information in a suitable form to be easily

used in the application system and website. The system implemented by using

Rifidi Platform as simulator for RFID system and VLS is programmed by

Visual Basic 2010. The VLS is composed of installing of two RFID readers in

traffic intersections; each reader has four antennas, for monitoring all entries

and exits of the intersection.

The VLS used the gathered data from traffic intersections RFID readers

in many applications including the following: location of vehicles in

intersections at any time, path and orientation of vehicle in intersections,

numbers and vehicles ID passed in each intersection at any time, estimate the

traffic congestion situation in roads and intersections through SMS server and

websites, drawing path of vehicles within VLS region on map, monitoring

illegal and stolen vehicles real-time and tracking certain vehicle color.

Page 5: RFID Based Design for Vehicle Location System

II

List of Contents

Contents Page

Abstract I

List of Contents II

List of Abbreviations IV

List of Tables VI

List of Figures VII

Chapter One: Introduction

1.1 Overview 1

1.2 Literature Survey 2

1.3 Aim of the Work 6

1.4 Thesis Outline 7

Chapter Two: RFID Technology and Applications

2.1 Introduction 8

2.2 RFID System Components 8

2.3 RFID Tags 9

2.3.1 Tag Types 11

2.3.2 Tag operation 12

2.3.3 Electronic Product Code (EPC) Tag 12

2.3.4 Tag Memory 14

2.4 RFID Reader 15

2.4.1 Energize the Tag 17

2.4.2 Frequency ranges 18

2.4.3 Communicate with the Host Computer 19

2.5 RFID Antenna 19

2.6 RFID Middleware 22

2.7 Automatic Vehicles Identification (AVI) based on RFID 25

2.7.1 RFID Hardware’s Properties Requirements 25

2.7.2 Applications of System 26

Chapter Three: The Proposed Vehicle Location System

3.1 Introduction 29

3.2 System Architecture 29

3.3 System Structure 32

Page 6: RFID Based Design for Vehicle Location System

III

3.3.1 The VLS Middleware 33

3.3.2 Database 37

3.3.2.1 Traffic Intersections Table 37

3.3.2.2 Vehicles Table 38

3.3.2.3 Data Online Table 38

3.3.2.4 Vehicle Location Table 39

3.3.2.5 Black List Vehicles Table 39

3.3.2.6 Authorized Users Table 39

3.4 Rifidi Platform 39

3.5 Roads and Traffic Intersections Simulation (RTIS) 41

3.5.1. The RTIS Architecture 41

3.5.2. The RTIS Scenario 42

3.6 RFID Readers Connection Protocols 45

3.7 The Methods of VLS Applications 46

3.7.1 Tracking Method for Vehicle Movement 46

3.7.2 Estimation of Traffic Congestion 49

3.8 VLS Client Access 51

Chapter Four: Implementation of Vehicle Location System

4.1 Introduction 54

4.2 Vehicle Location System 54

4.3 The Main Program of VLS 56

4.3.1 The VLS Security 56

4.3.2 The VLS Tables 57

4.3.3 Setting Database and Authorization 63

4.3.4 The Connection with RFID Readers 66

4.3.5 The Traffic Congestion Appraisal 68

4.3.6 The Vehicles Locations Discovery 71

4.3.7 The Vehicle Path Map 71

4.3.8 The Intersection Monitoring and Tracking Vehicle

Color

72

4.4 Traffic Congestion Status Website in VLS 74

4.5 Street Traffic Congestion Appraisal / SMS Server 76

4.6 General Discussion 78

Chapter Five: Conclusions and Suggestions for Future Work

5.1 Conclusions 80

5.2 Suggestions for Future Work 81

References 83

Page 7: RFID Based Design for Vehicle Location System

IV

List of Abbreviations

AT Attention

AT commands Set of commands used to control the modem

AVI Automatic Vehicles Identification

AIDC Automatic Identification Data Collection

API Application Programming Interface

ASP.Net Active Server Pages.Net

CCS Center Computer System

DHCP Dynamic Host Configuration Protocol

DSRC Dedicated-Short Range Communications

EAS Electronic Article Surveillance

EIRP Effective Isotropic Radiated Power

EPC Electronic Product Code

ETC Electronic Toll Collection

GIS Geographic Information System

GPRS General Packet Radio Service

GPS Global Positioning System

GSM Global System for Mobile Communications

GUI Graphical User Interface

IFF Identity: Friend or Foe

IIS Internet Information Server

IOT Internet of Things

ISO International Standards Organization

ITMS Intelligent Traffic Management System

ITS Intelligent Transport System

PDU Protocol Description Unit

RFID Radio Frequency Identification

RO Read-Only

RTIS Roads and Traffic Intersections Simulation

RW Read-Write

SIM Subscriber Identity Module

SMS Short Message Service

Page 8: RFID Based Design for Vehicle Location System

V

SNMP Simple Network Management Protocol

SQL Structured Query Language

STCA Street Traffic Congestion Appraisal

TCP Transmission Control Protocol

TCP/IP Transmission Control Protocol/Internet Protocol

TICS Traffic Information Collection System

TMS Traffic Management System

UHF Ultra High Frequency

V2I Vehicle-to-Infrastructure

V2V Vehicle-to-Vehicle

VLS Vehicle Location System

VRT Virtual Route Tracking

Wi-Fi Wireless Fidelity

WORM Write Once-Read Many

Page 9: RFID Based Design for Vehicle Location System

VI

List of Tables

Table Title Page

2-1 EPC RFID classes 13

2-2 EPC RFID chip generations 14

2-3 RFID frequency bands 18

Page 10: RFID Based Design for Vehicle Location System

VII

List of Figures

Figure Title Page

(2-1) Components of an RFID system 9

(2-2) Typical design of passive tag 9

(2-3) Passive UHF RFID tag block diagram 10

(2-4) EPC tag content 14

(2-5) Typical electrical connections for RFID reader 16

(2-6) Typical passive RFID tags with different antennas 20

(2-7) Estimation of velocity 28

(3-1) Architecture of traffic intersection in VLS 30

(3-2) Simulation of traffic intersection 31

(3-3) The communication method for VLS system 32

(3-4) The flowchart of the middleware performance 36

(3-5) The vehicles and roads network in RTIS 43

(3-6) The gathered data 44

(3-7) The significance of the gathered data 44

(3-8) The connection between client and server on

specific port

45

(3-9) Principle of VRT algorithms 46

(3-10) The flowchart for drawing the VRT on the map 48

(3-11) The flowchart for traffic congestion estimation 51

(3-12) GSM modem communications 52

(4-1) The layout of the VLS environment 55

(4-2) The implemented VLS 55

(4-3) Main form of VLS 56

(4-4) The security form 56

(4-5) Traffic intersection table 57

(4-6) Vehicles table 58

(4-7) Data online table 59

(4-8) Vehicle location table 59

(4-9) Black list vehicles table 60

(4-10) The vehicle which in black list is detected 60

(4-11) Deleting vehicle ID from black list table 61

(4-12) Tables update form 61

(4-13) Update of traffic intersections table 62

(4-14) Update of vehicles table 63

Page 11: RFID Based Design for Vehicle Location System

VIII

(4-15) Setting database and authorization 63

(4-16) A message of cleaning tables successfully 64

(4-17) Restore database 65

(4-18) Password change form 65

(4-19) The connection form with RFID readers 66

(4-20) The connection shutdown irregularly 67

(4-21) RFID readers table 67

(4-22) The connection stream 68

(4-23) The traffic intersections congestion appraisal 69

(4-24) The street traffic congestion appraisal 70

(4-25) The vehicles locations discovery 71

(4-26) The vehicle path map 72

(4-27) The Intersection Monitoring 73

(4-28) Tracking vehicle color 73

(4-29) The website of intersection congestion estimation 75

(4-30) The website of street congestion estimation 75

(4-31) Street Traffic Congestion Appraisal / SMS Server 76

(4-32) Sony Ericsson GSM Modem Configurations 77

Page 12: RFID Based Design for Vehicle Location System

1

Chapter One

Introduction

1.1 Overview

The modernization of transport has become one of the essential signs

for the urban modernization level, the increase in the number of cars leads to

serious problems concerning transport system. With the development of the

technology of computer, communication, electron, information and

intelligence has become important factors in achieving convenient and

efficient transport system. According to these circumstances, the Intelligent

Transport System (ITS) came into existence [1]. Collection of transportation

information systems based on conventional detection techniques such as loop

detectors, video image processing, and Dedicated Short Range

Communication (DSRC) leads to high installation and maintenance costs, the

high costs prevented the proliferation of these detection techniques [2].

Radio Frequency Identification (RFID) technology is one of the most

rapidly growing segments of today's Automatic Identification Data Collection

(AIDC) industry [3]. Using "RFID tags" on objects or assets, and "RFID

readers" to gather the tag information, RFID represents an improvement over

bar codes in terms of non-optical proximity communication, information

density, and two-way communication ability. It can automatically identify

target and obtain relevant data without contacting with the target. It has many

advantages such as high precision, easy adapting ability and quickly operation

and so on. Moreover, it is able to work under harsh environment and reads

from long distance [4].

Page 13: RFID Based Design for Vehicle Location System

2

Automatic Vehicles Identification (AVI) system based on RFID is

design for all legally registered vehicles; these vehicles must hold RFID tags.

When these vehicles travel along a road or intersection which is installed AVI

system (RFID reader), the information of vehicle tag is read and sent

immediately to Center Computer System (CCS) for achieving the purpose of

real-time monitoring and management for vehicle movement conditions. The

CCS receives the information and position of the vehicle from traffic

intersection and then analyzes and filters to store it in database [5].

1.2 Literature Survey

In an endeavor to enhance efficiency and safety in transport systems,

research is being done in RFID applications in smart E-parking, toll

collection, virtual route tracking, digital traffic light control and with some

other RFID applications. Several designs of such systems are given in the

following literature:

S. Tenqchen et al. in 2006 [6] proposed a website to exhibit the traffic

information for every 5 minutes at certain places of street measured by

three RFID readers for 125 tags installed on two different urban-bus

companies and transmit that information via GPRS modem from testing

point to control center. Each data can be used to indicate the exact point

of traffic condition in a big city. Three different readers installed in

certain places; those readers are used to collect traffic information by

recording the tag’s information of incoming urban-buses. The result

shows that the application of RFID tag and reader is an alternative way

to extract the traffic information instead of traditional loop detector.

J. D. Tseng et al. in 2007 [7] proposed a vehicle management system

based on UHF band RFID technology. The system is applied for

Page 14: RFID Based Design for Vehicle Location System

3

vehicle entering/leaving at road gates. The system consists of tag-on-

car, reader antenna, reader controller, and the monitoring and

commanding software. The entering time, leaving time, and tag number

of each vehicle are all recorded and saved for further processing. The

experimental results demonstrated the proposed system is reliable on

this application. The system could not only reduce the cost of guard and

payload in the maximum by the decrement of manpower, but also

promote the security and efficiency of the parking lot.

M. Kim et al. in 2008 [8] developed an active RFID - based national

Traffic Information Collection System (TICS) in ubiquitous

environments. RFID readers have been installed at 130 spots and

operate as 65 pairs at road side to obtain speed and location of vehicles.

Active RFID tags are attached to 2,000 vehicles including normal cars,

taxies and buses. The tag information is sent to middleware in the

central center through the communication network, processed and

saved in database, and utilized by various traffic related applications.

Experiments were performed for four months. As time goes, the

number of recognized tag identifiers decreases quite fast due to battery

failures, detached tags, and other reasons.

K. A. S. Al-Khateeb et al. in 2008 [9] developed an intelligent RFID traffic

control, to solve the traffic congestion problem. RFID technology with

appropriate algorithm and data base were applied to provide an

efficient time management scheme. The simulation result has shown

that, the dynamic sequence algorithm has the ability to intelligently

adjust itself even with the presence of some extreme cases. The real

time operation of the system emulated the judgment of a traffic

policeman on duty, by considering the number of vehicles in each

column and the routing proprieties. The great challenge would be to

Page 15: RFID Based Design for Vehicle Location System

4

design a system that is capable of understanding and identifying traffic

movement for a whole city. Understanding the routine traffic pattern

can provide accurate information to the traffic planner or urban

designer to develop a traffic jam free city.

Y. Zhang in 2009 [10] proposed a framework in which moving vehicles

with attached passive RFID tags can be located with RFID readers

installed at the roadside near the road intersections thus to improve the

ITS traffic real-time road status. A challenging issue in his approach is

to avoid multiple RFID reader collision problems to ensure the integrity

of traffic sampling data. The location information of road intersection is

preloaded in RFID reader. By tracing individual vehicles’ information

the system can evaluate the road status throughout the city.

Implementations have been conducted to evaluate the feasibility of the

proposed framework.

H. He and Y. Zhang in 2009 [11] introduced a new method based on RFID

technology to get the vehicle running state parameters. Vehicle

traveling data recorder (which is also called automobile block box) can

accurately record the state parameters of the automotive traveling

process, which can offer a real, effective and scientific legal basis for

the analysis of traffic accidents. The system adds RFID module on the

base of the traditional vehicle traveling data recorder, which achieves

non-stopping to get the vehicle’s running parameters on some section

of highway. The tag module of this system adopts Mifare1 S50 card,

the reader module uses MCM200 produced by PHILIPS Company; and

the system takes Linux as the operating system. The results show that

the system has a small volume, complete function, high reliability and

high performance ratio.

Page 16: RFID Based Design for Vehicle Location System

5

H. Tao et al. in 2010 [12] proposed management system optimized design

to solve traffic intersection problems in the management of traditional

vehicles. The system includes the hardware architecture and system

software. At the four directions of the intersection (e.g. east, south,

west, north), in each direction to set two RFID readers, they can

simultaneously scan in the reverse direction from the two vehicles, and

can record relevant information for each vehicle, including the vehicle

electronic tag encoding and the driver electronic label encoding.

Z. Feng et al. in 2010 [13] designed the vehicle path recognition based on

RFID and an Electronic Toll Collection (ETC) system of expressway.

The ETC system will toll collection without parking, also census traffic

flow and audit road maintenance fees. It uses 920MHz passive RFID

tag as carrier to identify actual vehicle path. High-speed long-distance

UHF reader is installed in all sections of the monitoring points and

highway entrances and exits, so as to automatically read the electronic

tag information carried by the vehicles pass through the marking

station, so that the system can record the driving path.

Iswanjono et al. in 2011 [14] proposed an algorithm for predicting the

speed of traffic light violators. The traffic light system is equipped

RFID reader as the main tool for identifying the vehicle's RFID tags.

The simulation by Scilab simulator gives evidence of violation and

prediction of vehicle flow. The violation can detect if the vehicle's IDs

have moved from one RFID reader to the others. A randomization

generates vehicle IDs, vehicle numbers and vehicle branch destination

that can show the function of RFID reader to detect tags. From the

simulation conducted, the algorithm is able to predict the speed of

traffic light violators ranging from 5 km/h up to 80 km/h in real-time.

Page 17: RFID Based Design for Vehicle Location System

6

M. Yu et al. in 2011 [15] implemented active RFID tag based system for

automatically identifying running vehicles on roads and collecting their

data. The design principles and the architecture of the system includes

active electronic tags and reading equipment (readers and antennas),

the monitoring base station deployment, the two-layered network

construction, and the monitoring software. The system used electronic

tag and reading base station is based on SCM C8051F920; it is a low-

power high-speed general with a 24.5MHz oscillator, and a

programmable flash memory. The effectiveness and efficiency of the

system is analyzed. The system will have wide applications in traffic

IOT (Internet of Things) to support traffic monitoring, traffic flow

statistics, traffic scheduling, and special vehicle tracking.

1.3 Aim of the Work

The aim of this work is to show how technologies of identification by

RFID can be used to build VLS by collecting the traffic information in urban

cities. This work is designed to monitor the traffic intersections in real-time

via RFID system. This will be applied in all intersections for each vehicle.

This is achieved by installing RFID readers in the traffic intersections and

attaching RFID tags in vehicles. Then, the VLS will use the acquired

information in several applications of ITS as the following:

Discovery the vehicles locations.

Displaying the route of the vehicle on the city map.

Monitoring the intersections.

Tracking vehicles color.

Tracking the illegal and robbed vehicles in real-time.

Estimating the status of congestion in roads and traffic intersections.

Page 18: RFID Based Design for Vehicle Location System

7

1.4 Thesis Outline

This thesis is organized in five chapters. The contents of the following

chapters are briefly reviewed as follows:

Chapter Two: This chapter explains RIFD technology and RFID

system components like readers, tags and host system. Then specify the

discussion on using RFID technology in transport systems.

Chapter Three: This chapter discusses the proposed VLS, VLS

structure, the database of VLS, RFID simulation and the methods of

VLS applications.

Chapter Four: This chapter discusses the implementation of VLS,

SMS server and websites.

Chapter Five: This chapter includes conclusions and suggestions for

possible future work.

Page 19: RFID Based Design for Vehicle Location System

8

Chapter Two

RFID Technology and Applications

2.1 Introduction

RFID technology is currently being used in numerous applications

throughout the world [3]. RFID is not a new technology, for example, the

principles of RFID has been employed by the British in World War II to

identify their aircraft using the IFF system (Identity: Friend or Foe) [16], and

it is still being used today for the same purposes.

RFID uses tags to transmit data upon RFID reader queries. RFID tag

responds to a reader query with its fixed unique serial number (tag ID). This

fixed tag ID enables tracking of tags and the bearers. In addition to the unique

serial number, some tags carry information about the objects they are attached

to [17]. RFID is used for a wide variety of applications ranging from the

familiar building access control proximity cards to supply chain tracking, toll

collection, vehicle parking access control, retail stock management, tracking

library books, theft prevention, etc.

2.2 RFID System Components

RFID is a generic term for technologies that use radio waves to

automatically identify people or objects. There are several methods of

identification, the most common of which is to associate the RFID tag unique

identifier with an object or person. RFID system (as shown in Fig. 2-1) will

typically comprise the following [4]:

RFID tag.

Page 20: RFID Based Design for Vehicle Location System

9

RFID reader with an antenna and transceiver.

A host system or connection to an enterprise system.

Figure 2-1 Components of RFID system [18]

2.3 RFID Tags

The tag, also known as the transponder (derived from the terms

transmitter and responder), holds the data that is transmitted to the reader

when the tag is interrogated by the reader. The most common tags today

consist of an Integrated Circuit (IC) with memory, essentially a

microprocessor chip [19], see Fig. 2-2.

Figure 2-2 Typical design of passive tag [3]

Page 21: RFID Based Design for Vehicle Location System

10

The implementation of a passive UHF RFID tag is shown in Fig. 2-3, a

block diagram of RFID tag using backscatter modulation. The tag consists of

tag antenna and tag chip. The tag chip contains a RF-analog front end (voltage

rectifier, clock generator, modulator and demodulator), a digital control block,

and a non-volatile memory [17].

Figure 2-3 Passive UHF RFID tag block diagram [17]

Other tags are chipless and have no onboard IC. Chipless tags are most

effective in applications where simpler range of functions is required;

although they can help achieve more accuracy and better detection range, at

potentially lower cost than their IC-based counterparts [19].

When a tag is interrogated, the data from its memory is retrieved and

transmitted. A tag can perform basic tasks (read/write from/to memory) or

manipulate the data in its memory in other ways [19].

RFID tags can interfere with each other. When multiple tags are present

in a reader‟s field, the reader may be unable to decipher the signals from the

tags. For many applications, such as raising the gate in a parking lot, this is

not a problem. The systems are optimized so that only one tag is within range

at a time. However, for other applications, reading multiple tags at once is

essential, for these applications, the tags need to support an anti-collision

protocol to allow each tag reads without interference from the others [20]. An

effective anti-collision algorithm can reduce the operating time and increase

Page 22: RFID Based Design for Vehicle Location System

11

the read rate. Two algorithms, slotted ALOHA and binary search, are always

used in the RFID protocol. The slotted ALOHA algorithm needs a

synchronous signal and a longer time to process when more tags are in

collision. Also the discrimination ratio is not as high as that with the binary

search algorithm. However, the binary search algorithm has strict

requirements for its computing slot and bad security [21].

2.3.1 Tag Types

RFID tags fall into two broad categories: those with a power supply (a

battery) and those without. RFID tag that actively transmitted to a reader is

known as „„active tags‟‟. Unpowered passive tags are known as „„passive

tags‟‟. Active tags are typically also read/write tags while passive tags are

generally read only.

Active tags are larger and more expensive than passive tags. The use of

a battery places a limit on the life of the tag, although with current battery

technology this may be as much as 10 years [4].

Passive tags have an unlimited life, are lighter, smaller and cheaper.

The trade-off is limited data storage capability, a shorter read range and they

require a higher-power reader. Performance is reduced in electromagnetically

„„noisy‟‟ environments.

There are also semi-passive tags where the battery runs the chip‟s

circuitry but the tag communicates by drawing power from the reader.

Tags are available in a wide variety of shapes, sizes and protective

housings. The smallest tags commercially available measure 0.4 x 0.4 mm

and are thinner than a sheet of paper [4].

Page 23: RFID Based Design for Vehicle Location System

12

2.3.2 Tag operation

In LF or HF systems, tag-to-reader communication is achieved via inductive

coupling (load modulation). Load modulation is achieved by modulating the

impedance of the tag as seen by the reader. In UHF or above systems, tag-to-

reader communication is achieved via propagation coupling (backscatter).

Backscatter is achieved by modulating the radar cross section of the tag

antenna [3].

In load modulation process, when a tag is placed within the alternating

magnetic field created by the reader, it draws energy from the magnetic field.

This additional power consumption can be measured remotely as a voltage

perturbation at the internal impedance of the reader antenna. The periodic

switching on/off of a load resistance at the tag therefore affects voltage

changes at the reader‟s antenna and thus has the effect of an amplitude

modulation of the antenna voltage by the remote tag. If the switching on and

off of the load resistance is controlled by the tag‟s stored data stream, then

this data is transferred from the tag to the reader. In load modulation the

carrier signal is modulated by switching impedance from a matched condition

to an unmatched condition to alter the reflection coefficient [3].

In backscatter modulation process, a reader sends a signal (energy) to a

tag, and the tag responds by reflecting a part of this energy back to the reader.

A charge device such as a capacitor contained in the tag makes this reflection

possible. The capacitor gets charged as it stores the energy received from the

reader. As the tag responds back, it uses this energy to send the signal back to

the reader. The capacitor discharges in the process [19].

2.3.3 Electronic Product Code (EPC) Tag

The specifications for UHF passive tags and RFID readers developed first by

the Auto-ID Center and then by EPCglobal, a standards body that was formed

Page 24: RFID Based Design for Vehicle Location System

13

from the article-numbering barcode associations around the world, to promote

the use of RFID in commerce [21]. At the heart of the EPC suite of standards

is the EPCglobal EPC Gen2 protocol (as well as its counterpart ISO 18000-

6c) that specifies the air interface protocol for communication between

readers and tags [3]. The EPC Gen2 protocol is a very powerful one with a

number of features almost unimaginable in a lower-cost tag even a few years

ago [21]. EPCglobal has defined a series of RFID tag “classes” and

“generations” of RFID tags, see Tables 2-1 and 2-2.

Table 2-1 EPC RFID classes [20]

Page 25: RFID Based Design for Vehicle Location System

14

Table 2-2 EPC RFID chip generations [20]

The EPC tag data standard specifies the format for encoding and

reading data from 96-bit RFID tags, as shown in Fig. 2-4.

Figure 2-4 EPC tag content [4]

2.3.4 Tag Memory

A tag's memory attribute can be read-only (RO), write once-read many

(WORM), or read-write (RW), see Table 2-1. Memory write capability

Page 26: RFID Based Design for Vehicle Location System

15

generally increases the cost of a tag, along with its capability to perform

higher-level functions. At the same time, read-only tags eliminate the risk of

accidental or malicious over-writing of tag data [19].

Tag memory configurations can vary greatly based on cost and physical

requirements. In case of Electronic Article Surveillance (EAS), tags have

essentially 1 bit of memory and are relatively inexpensive when compared to

tags with more memory. These tags have no unique identifiers and are used

only to signal their presence when they are in the field of a reader. Beyond the

1-bit tags, typical memory footprints can range from 16 bits to several

hundred Kbits for certain active tags. The amount of memory present on a tag

is then defined by application requirements and/or any relevant standards or

regulations. For example, due to the expected global acceptance of the

EPCglobal standards, the memory size for the newer generation of passive

tags will be 2 Kbits or more [19].

2.4 RFID Reader

Reader, as a scanning device, detects the tags that attached to or

embedded in the selected items. It varies in size, weight and may be stationary

or mobile. Reader communicates with the tag through the reader antenna, as

shown in Fig. 2-5, which broadcasting radio waves and receiving the tags

response signals within its reading area. After the signals from tags are

detected, reader decodes them and passes the information to middleware [18].

The reader for a read/write tag is often called an interrogator. Unlike

the reader for a read-only tag, the interrogator uses command pulses to

communicate with a tag for reading and writing data [3].

Page 27: RFID Based Design for Vehicle Location System

16

Figure 2-5 Typical electrical connections for RFID reader

RFID reader sends a pulse of radio energy to the tag and listens for the

tag‟s response. The tag detects this energy and sends back a response that

contains the tag‟s serial number and possibly other information as well.

Historically, RFID readers were designed to read only a particular kind

of tag, but so-called multimode readers that can read many different kinds of

tags are becoming increasingly popular.

Like the tags themselves, RFID readers come in many sizes. The

largest readers might consist of a desktop personal computer with a special

card and multiple antennas connected to the card through shielded cable. Such

a reader would typically have a network connection as well so that it could

Page 28: RFID Based Design for Vehicle Location System

17

report tags that it reads to other computers. The smallest readers are the size

of a postage stamp and are designed to be embedded in mobile telephones

[20].

2.4.1 Energize the Tag

In the case of passive and semi-active tags, the reader provides the energy

required to activate or energize the tag in the reader's electromagnetic field.

The reach of this field is generally determined by the size of the antenna and

the power of the reader. The size of the antenna is generally defined by

application requirements. However, the power of the reader (through the

antenna), which defines the intensity and reach the electromagnetic field

produced, is generally limited by regulations. Each country has its own set of

standards and regulations relating to the amount of power generated at various

frequencies. For this reason, incompatibilities do exist between RFID systems

in various countries [19].

EPCglobal and ISO created standards to solve this problem. EPCglobal

initiated the creation of a standard to facilitate full-scale interoperability

between multivendor RFID systems and to propel RFID technology into a

broad array of markets. EPCglobal established and supports the EPC as the

worldwide standard for immediate, automatic, and accurate identification of

any item in the supply chain. EPCglobal is sponsored by many of the world's

leading corporations and it has published a set of RFID protocol standards

(see sec. 2.3.3).

Also, ISO is a network of the national standards institutes of 148 countries,

making it more global and governmental than EPCglobal. ISO bridges the

needs of the public and private sectors, focusing on creating standards and

building universal consensus for the acceptance of those standards [19].

Page 29: RFID Based Design for Vehicle Location System

18

2.4.2 Frequency Ranges

One of the more important aspects of a tag and reader connection (coupling)

is the frequency at which it operates. Frequency allocations are generally

managed through legislation and regulation by individual governments.

Internationally, there are differences in frequencies allocated for RFID

applications although standardization through ISO and similar organizations

is assisting in compatibility [4].

In general, the frequency defines the data transfer rate (speed) between

the tag and the reader. Lower frequency performs slower transfer rate.

However, speed is not the only consideration in designing RFID solution.

Environmental conditions can play a significant role in determining the

optimal operating frequency for a particular application.

Higher frequency usually means smaller antenna, smaller tag size, and

greater range and typically, more regulatory of use restrictions and often,

higher cost [19]. Table 2-3 summarizes the most popular frequency bands,

and characteristics.

Table 2-3 RFID frequency bands [16]

Page 30: RFID Based Design for Vehicle Location System

19

2.4.3 Communication with the Host Computer

The reader is also responsible for the flow of data between the tags and the

host computer. Typically the reader communicates with a host computer

through a Serial or Ethernet connection. A reader may also be equipped to

communicate with the host computer through a wireless connection,

particularly if the reader is a portable or handheld device [19].

2.5 RFID Antenna

The reader antenna establishes a connection between the reader

electronics and the electromagnetic wave in the space. In the HF range, the

reader antenna is a coil (like the tag antenna), designed to produce as strong a

coupling as possible with the tag antenna. In the UHF range, reader antennas

(like tag antennas) come in a variety of designs. Highly directional, high-gain

antennas are used for large read distances [3].

Antenna design and placement plays a significant factor in determining

the coverage zone, range and accuracy of communication [19]. Physical

interdependencies mean that the antenna gain is linked to the antenna size.

The higher the gain (or the smaller the solid angle into which the antenna

emits), the larger the mechanical design of the antenna will be. All other

things being equal, a high-gain antenna will transmit and receive weaker

signals farther than a low-gain antenna. Omnidirectional antennas, such as

dipole antennas, will have lower gain than directional antennas because they

distribute their power over a wider area. Parabolic antennas usually have the

highest gain of any type of antenna [3].

The tag antenna is usually mounted on the same surface as the IC and

packaged as a single unit. Fig. 2-6 shows several common passive tag and

antenna configurations. Although the tag IC can be tiny (the size of a grain of

Page 31: RFID Based Design for Vehicle Location System

20

rice or smaller), the size and shape of the antenna typically determines the

limits of the dimensions of the entire tag packaging [19].

Figure 2-6 Typical passive RFID tags with different antennas [19]

Let the power transmitted by the reader be and the gain of the

reader antenna be Greader. The power density at distance R where the tag is

placed can be expressed as

The power received by the tag is calculated by

Where

Then

Page 32: RFID Based Design for Vehicle Location System

21

The power density of the return wave from the tag at the position of the reader

is

Thus the power received by the reader is

That is

Where Greader stands for the gain of the reader antenna, Areader the equivalent

aperture of the reader antenna, Gtag the gain of the tag antenna, and Atag the

equivalent aperture of the tag antenna.

Where Effective Isotropic Radiated Power (EIRP) is the power transmitted by

the reader, the equivalent transmitted power as

Then

Denote by the threshold power of the sensitivity. Then the maximum

reading range is expressed as

Page 33: RFID Based Design for Vehicle Location System

22

Now we analyze the RFID system by using the radar principle. Suppose that

the backscattering section of the tag, including the antenna and the chip, is

σtag

, then the backscattering power of the tag is

The power density of the backscattering wave at the position of the reader is

So we have

By adjusting the tag chip impedance according to the stored data in tag, σtag

will be changed, and then the return wave coming from the tag and received

by the reader will be changed such that the amplitude modulation and

demodulation can be realized. In this manner, the tag information can be read,

and the object detected by the tag can be identified [22].

2.6 RFID Middleware

A middleware, as the name suggests, is a piece of software that lies

between a lower layer processing device or software and an upper layer server

or software, usually at the application level. Therefore, data from RFID

readers are sent to a middleware platform that acts as a bridge between RFID

readers and host application software [23] [24].

Typically, RFID middleware platform performs aggregation of data

across different readers, filtering of unwanted or noisy RFID data, forwarding

of relevant data to subscriber servers or application-level systems, and

persistent storage for context aware and other added value services. However,

Page 34: RFID Based Design for Vehicle Location System

23

RFID middleware is often given the task of managing, monitoring and

configuring the different readers and interrogators. The middleware performs

monitoring task on RFID readers to check operational status of the readers.

This is a very important function, especially when readers are located in

distributed manner, and manual monitoring is impractical [23] [24].

According to the main functionalities hosted by RFID middleware platform

can be classified as follows [23]:

1- Configuration Service Set

Network interface configuration. Discovers and sets reader

networking parameters and identity, e.g. the IP address.

Firmware management. Distribute and manage firmware version on

readers

Antenna, tag population and memory selection. Specify reader

antennas and tag population to be inventoried. In case of tag memory

access, specifies memory fields to be accessed.

Base service set scheduling. Sets how different services, such as tag

inventory, access, and deactivation, are triggered and stopped.

RF transmitter configuration. Sets transmit channel, hop sequence,

and transmit power for readers.

Air interface protocol configuration. Configures timing, coding and

modulation parameter of a specific air interface protocol on the readers.

2- Data Processing Service Set

Filtering. Removes unwanted tag identifiers from the set of tag

identifiers captured, e.g. based on the product type or manufacturer

encoded in the identifier.

Page 35: RFID Based Design for Vehicle Location System

24

Aggregation. Computes aggregates in the time domain (entry/exit

events) and the space domain (across reader antennas and readers) and

generates the corresponding “super” events.

Identifier translation. Translates between different representation of

the identifier, e.g. from raw tag object identifier in hexadecimal format

to EPC.

Persistent storage. Stores RFID data captured for future application

requests.

Reliable messaging. Allow RFID data to be delivered reliably in the

presence of software component, system and network failures.

Location/Movement estimation. Detects false positive reads of far-

away tags that are outside the “typical” read range and estimate the

direction of movement.

Application Logic execution. Interprets the RFID data captured in an

application context and generate the corresponding application events,

e.g. detect whether a shipment is complete.

3- Monitoring Service Set

Network connection monitoring. Check that the reader can

communicate captured RFID data over the network

RF environment monitoring. Check RF noise and interference levels

to safeguard reliable identification operation

Reader Monitoring. Check that the reader is up, running and

executing as configured for example via monitoring the number of

successful/failed read and write operations.

Now, not all these functionalities are mandatory to be hosted by the

middleware. This depends on the reader architecture employed. Two types of

architectures can be followed: one in which many of the above functionalities

Page 36: RFID Based Design for Vehicle Location System

25

are hosted by the reader itself, which will be called decentralized reader

architecture, and the one in which all the functionalities, except the basic ones

used in the reader, will be hosted by the middleware platform or a controller

appliance [23].

2.7 Automatic Vehicles Identification (AVI) based on RFID

AVI system based on RFID is a design that covers every vehicle legally

registered which carries RFID tag. When these vehicles travel along a road in

which AVI system is installed, all kinds of vehicles information of car tag is

read and transmitted in real-time to data processing controlling unit realizing

the purpose of real-time monitor and management for vehicle operating

conditions [5].

The main components of the AVI system based on RFID include: (i)

hardware, i.e. passive RFID tags and readers for generation of traffic

information; (ii) RFID middleware and database structure, and application

software consisting of real-time process; and (iii) network architecture to

deploy AVI system nationwide [8].

2.7.1 RFID Hardware’s Properties Requirements

Using RFID in AVI systems that requires specific properties for RFID

reader‟s devices to realizes the system requirements. The following

characteristics should be available in RFID reader for using it in AVI system:

1. Multi-tags recognition rate

2. High tag recognition speeds

3. Operating in UHF or higher frequency

4. Read only (not need writing in tags)

5. Large coverage distance, for 9 meters or higher

Page 37: RFID Based Design for Vehicle Location System

26

6. The antenna is separated from reader‟s device (not incorporated

with reader)

7. Support multi-static antenna system (transmit and receive)

8. Support for multiple antenna‟s ports, four or more

9. Support for Ethernet connection, TCP/IP

2.7.2 Applications of System

The ITS based on RFID technology is a comprehensive managing system,

which integrates information technology, communication technology,

automatic control technology and information processing technology,

combines traffic planning, traffic engineering and traffic management as a

whole to enhance traffic capability. The communication between road and

vehicles is one of the key technologies [1].

The application of RFID technology in ITS is widely utilized at the present

time and in the future. The following list of applications of AVI system based

on RFID:

1. Electronic Toll Collection (ETC) System

ETC system adopted in highways can solve many problems brought by

traditional way of charging, such as time-consuming and inconvenience

of supervision. The system can read the ID number from the vehicles

affixed with RFID tags, and transmits the information to the manage

center through network under the control of the RF controller, with the

exact passing time and the driveway number. The ETC system will

charge automatically according to the passing time and give green light

to the cars with the effective tags, and hold up the cars without card or

the null card [1] [25] [26].

Page 38: RFID Based Design for Vehicle Location System

27

2. Gate Automatic Identification System

RFID technology could also be utilized in some military places,

parking places, communities and confidential departments by adopting

GAI system. When the vehicles affixed with RFID tags approach the

driveway, the system can get the ID of RFID tags, and transmits the

vehicles‟ information to the manage center. Then, the manage center

decides whether or not give green light the vehicles, by means of

sending control order to the executive machine. Under the surveillance

of GAI system, it can identify all the passing cars and give green lights

to the cars which have been registered (affixed with effective RFID

tags), solving the problems often existed in the traditional way of

household guards, which often causes big loss, inconvenience, and

feelings of insecurity, etc. [1].

3. Automatic Equipment Identification System

AEI systems are mainly used in the identification of the containers,

such as application to the sea, road and rail containers transport or

logistics management with the advantages of both safety and

convenience. RFID tags would be affixed to these containers, with the

information of containers‟ number, quantity, and the shipping sites and

its destination. Once the containers are shipped to the port of

destination, AEI system would read the information via the automatic

identification, and then exchange information with these tags [1].

4. Vehicles Speed Estimation

The speed of vehicle is estimated to check if vehicle exceeded the

limited speed of street or not. The speed of vehicle is estimated based

on measured detection time difference and distance between two

readers. To estimate the velocity of the vehicle, two RFID readers must

be installed [24].

Page 39: RFID Based Design for Vehicle Location System

28

Figure 2-7 Estimation of velocity [24]

As shown in Fig. 2-7, (d1) is the distance between reader A and the

vehicle, (d2) is the distance between the readers and (d3) is the distance

between reader B and the vehicle. Then, the velocity of the vehicle

calculates as

Where t1 and t2 denote the communication moment between readers

and tags.

Other applications of AVI system fall in many fields [5,27-30] such as smart

E-parking, intelligent security management system, customs electronic license

plate AVI system, public transport e-ticketing, missing and stolen vehicle

tracking system, virtual route tracking, TICS, traffic violation monitoring,

variable speed limits, enhancement of driver‟s situation awareness, collision

avoidance systems, Intelligent Traffic Management System (ITMS), digital

traffic light control, the data dissemination between vehicle-to-infrastructure

(V2I) or vehicle-to-vehicle (V2V), etc.

Page 40: RFID Based Design for Vehicle Location System

29

Chapter Three

The Proposed Vehicle Location System

3.1 Introduction

This chapter discusses the design of VLS which consists of CCS, SMS

server and websites. The CCS contains the middleware, database management

and the system applications. The RFID readers of VLS are simulated to

evaluate the system works and test its ability to collect and manage the traffic

information from several RFID readers in real-time.

The middleware is programmed to connect the VLS with readers from

one side and with database on the other, and to arrange the information that is

received from readers in appropriate format to be used in the application

system and website. Wireless communication system is used to communicate

the CCS with readers.

3.2 System Architecture

The first step in the VLS is to attach RFID tag to all vehicles that can

be identified by RFID readers. It is suggested that the data is stored in tag

only be tag ID and without any other details of vehicle, so to keep the persons'

privacy of the vehicles’ owners. In this form no privacy’s information is

available, and if any snooper tries to install illegal reader to snoop, he cannot

enter to the private information of vehicle owner, he will save the normal

information like he records the information by sight to vehicle license plate.

The VLS is composed of installing of two RFID readers in each traffic

intersections, as shown in Fig. 3-1. The four branches of the traffic

Page 41: RFID Based Design for Vehicle Location System

30

intersection are North, East, South and West were represented as Road 1,

Road 2, Road 3 and Road 4 respectively. In each branch set two RFID

antennas, they can simultaneously scan in the opposite directions from the

two vehicles, and these antennas can record relevant information for each

vehicle.

Figure 3-1 Architecture of traffic intersection in VLS

In each branch, two antennas are installed in the mid island of the road

near the traffic intersection, and separated by a convenient distance. In this

architecture of arranging the direction of antennas, each antenna's RF

radiation areas do not overlap each other.

The RFID antennas are numbered as 0, 1, 2 and 3. The even antennas

are installed on the ways-in of intersections while the odd antennas are

installed on the ways-out of intersections. Hence, for reader 1 install antenna

(0) is on way-in of road 1, antenna (2) is on way-in of road 2, antenna (1) is

Page 42: RFID Based Design for Vehicle Location System

31

on way-out of road 1 and antenna (3) is on way-out of road 2, so for reader 2

in roads 3 and 4, see the simulation of traffic intersection in VLS in Fig. 3-2.

Figure 3-2 Simulation of traffic intersection

In CCS, according to the order of receiving the same tag ID from two

different antennas, the direction of vehicle movement will be known from its

entry and to its exit. In this architecture of the system, the VLS will monitor

the path direction for all vehicles in the traffic intersections in real-time.

In the proposed VLS, RFID readers communicate with CCS via

wireless network, RFID reader is connected with wireless station by STP

cable, while the wireless access point is connected with CCS directly by UTP

cable. The stations communicate with access point as shown in Fig. 3-3.

Page 43: RFID Based Design for Vehicle Location System

32

Figure 3-3 The communication method for VLS system

3.3 System Structure

The VLS components are divided into two parts: software and

hardware. The software part is implemented while the hardware part is

simulated. The software part is programmed by using (Microsoft Visual Basic

2010 program) that works in (Microsoft .NET Framework 4.0) environment

and the large database system is designed by (Microsoft SQL Server 2008 R2

Management Studio).

The hardware part of VLS consists of RFID readers and tags, wireless

network, CCS, GSM modem, database's storage memory and cables.

In VLS, the RFID readers are simulated by the use of Rifidi Platform

(see sec. 3.4) and Roads and Traffic Intersections Simulation (RTIS) (see sec.

3.5).

In brief, the following components are used for building VLS system:

Page 44: RFID Based Design for Vehicle Location System

33

Two computer devices (one as RFID reader(s) via Rifidi and/or

RTIS simulators and another for CCS)

Wi-Fi system

Microsoft Visual Basic 2010 with .NET Framework 4.0 and

Microsoft ASP .NET Web Site Designer.

Microsoft SQL Server 2008 R2 Management Studio

Sony Ericsson GSM Modem

3.3.1 The VLS Middleware

The middleware is the software program (see sec. 2.6) used to establish the

connections with several RFID readers synchronous and communicate with

them. On the other side, it connects with SQL Server Management Studio to

communicates with database.

To connect VLS to RFID reader the middleware must have the following:

1- Traffic Intersection ID

2- RFID reader IP and Port

3- RFID reader Username and Password

To get this information, the system should communicate with the database

and request this information from Traffic Intersections Table (see sec. 3.3.2).

After getting the traffic intersection ID, IP, Port, Username and Password, the

system will achieve connection with that reader. After the connection is

accomplished, the system sends (Get TagList) request. The reader will reply

by the list of tags that is gathered from antennas. Each tag's information is

sent as a form of one packet, see a flowchart in Fig. 3-4.

The packet information is filtered as tag ID, antenna number, date and

time. This information will be stored in Data Online Table.

Then check antenna number whether even or odd (see sec. 3.2). If the

antenna number is even, the packet data are stored in temporary table, and if

Page 45: RFID Based Design for Vehicle Location System

34

the antenna number is odd, the system requests to search in temporary table

on that tag ID. When fetch the even packet with odd packet, the system infer

the vehicle ID from tag ID that is passed through, traffic intersection ID,

from-road, to-road, date, in-time and out-time. The inferred information will

be stored in the Vehicle Location Table.

The next step is to check whether this vehicle ID is in Black List Table

or not. If this is detected, the system displays warning message that the

vehicle passed through the traffic intersection ID, from-road, to-road, date,

and time.

Then, the following step checks the connection with that reader if still

connected or not. If not, the system will display (The reader -ID- is

disconnected or turn off) message.

Page 46: RFID Based Design for Vehicle Location System

35

Start

Connecting with

reader via socket

Connection

established?

Display:

Login Successfully

Send: Get TagList

Receive: Tag List

No tags?

Analyzing data into:Vehicle IDs,

Date, Time and Antenna No.

Display: Can’t

connect to reader

32

Yes

No

Yes

No

1

Storing data in

data online table

Load from database: Reader’s IP,

Port, Username and Password

Page 47: RFID Based Design for Vehicle Location System

36

Is antenna

no. even?

Storing in

temporary table

Looking for vehicle ID in

temporary table

ID found?

Store in vehicle location table: Vehicle

ID, Intersection ID, from-road, to-road,

date and time (in-out)

Looking for vehicle ID in

black list table

Yes

2

No

Yes

Yes

No

ID found?

No

Yes

Connection

Status: OK?

Display: Reader is

disconnected or turned off

End

3

1Yes

Display: Warning

Display: Miss Data

No

Figure 3-4 The flowchart of the middleware performance

Page 48: RFID Based Design for Vehicle Location System

37

3.3.2 Database

All RFID systems require smart database for storing all data received from

readers in real-time. Microsoft SQL Server 2008 R2 Management Studio was

selected to build the VLS's database, as it is robust compatible with Microsoft

Visual Basic 2010 and Visual Basic support special Application Programming

Interface (API) command to communicate with it. Also SQL has fast response

and effective with robust request such as in one instruction that can query

many tables. Besides, SQL Server can have enough large database size for

VLS. It supports databases’ size over a terabyte [31].

SQL Server is necessary to build several tables for VLS system, each

one for specific purpose. These tables are: traffic intersections table, vehicles

table, data online table, vehicle location table, black list table and authorized

users table.

3.3.2.1 Traffic Intersections Table

This table is constructed to define each intersection by a unique ID and each

intersection must have eight records (if the intersection has four roads) to

define all ways and antennas’ number that are installed in them.

The traffic intersections table has all the information about

intersections. It has the intersection ID, intersection number (from 0 to 7 if the

intersection has four roads), the region of the traffic intersection within the

city as (Baghdad/Al-Mansur), the IPs and Ports of the readers that are

installed in that intersection, the number of antenna on the road, the road is

going to any intersection ID (if possible) and the distance between them, and

the Username and Password of readers.

Besides, through the traffic intersections table, the system can define

the number of roads meeting in intersection, whether the intersection has

three, four, five or more roads. Also, if the road is one or two ways, that

Page 49: RFID Based Design for Vehicle Location System

38

depends on the number of records and the distribution of antennas in ways.

For example, five roads meeting in the intersection, VLS must have three

RFID readers and ten antennas, one of these readers have two antennas only

and they are numerated (from 0 to 9).

3.3.2.2 Vehicles Table

This table is used to register all vehicles’ information and properties. The

vehicles table contains the vehicle ID, the vehicle's owner, vehicle's type,

vehicle's description, vehicle's color, vehicle's model, the engine number of

vehicle and the tag ID that is attached in the vehicle.

The vehicle ID is a unique ID for each vehicle and consists of the city

that this vehicle is registered in, the number of this vehicle and the type of

number. The number type is P as Private (the plate’s color is white), L as

Load (the plate’s color is yellow), T as Taxi (the plate’s color is red) or Gov

as Government (the plate’s color is blue) and it takes the first character from

the name of any ministry.

The vehicle ID form is (city/number/type), for example:

(Baghdad/1234/P) the city is Baghdad, the number of the vehicle is 1234 and

the number type is Private that has white color. Other example:

(Gov/4321/H), H as Ministry of Higher Education and Scientific Research.

3.3.2.3 Data Online Table

This table is constructed to keep all the useful data received from readers. It

keeps all the information of tag recognition arrived online to CCS as tag ID,

the reader IP and Port that sent this tag, antenna number, the date and time of

detection.

Page 50: RFID Based Design for Vehicle Location System

39

3.3.2.4 Vehicle Location Table

A vehicle location table is an important table because it keeps all the inferred

information by middleware. It keeps information of vehicle path in all

intersections for each vehicle.

The vehicle location table records the vehicle ID that passed through

specific intersection ID, from-road number, to-road number, the date and the

entry time and the exit time from intersection.

3.3.2.5 Black List Vehicles Table

The black list table is used to enable the administrator to monitor set of

vehicles ID. Also, it will enable the administrator to add and delete vehicle’s

ID. The black list table has set of vehicles ID with their tags ID and the date

of the addition these vehicles in black list table.

3.3.2.6 Authorized Users Table

This table is constructed to secure and protect the information of VLS from

anyone unlicensed that may be penetrating VLS system and destroying a

system and database. The authorized users table consists of set of pairs as

administrators name and passwords.

3.4 Rifidi Platform

Rifidi is the premier open source simulator for RFID. It enables to

develop RFID system entirely with software components and remove the

dependency on hardware and infrastructure that RFID typically demands.

Furthermore, Rifidi is implemented in Java and it is possible to download the

source code and modify it.

Page 51: RFID Based Design for Vehicle Location System

40

Rifidi makes it possible to 'Virtualize' the RFID infrastructure with

software that defines RFID Readers, RFID Tags, and RFID Events that

behave like their real-life counterparts [32].

This Rifidi development project was born when a team of industrial

engineers tried to implement a client for 10’s a readers and they were stuck by

the complexity of this task. After discussing with many software development

companies and RFID experts they realized that RFID simulation tool would

be appreciable for testing applications. Since that, in March 2006, this team of

developers and RFID consultants started to work on this RFID simulation

project [32].

Rifidi is a complete RFID application platform; it allows the virtual

creation of RFID-based scenario while being sure that the software created for

this purpose will run as it is also in the real world. Indeed, Rifidi is a program

that simulates the reader/client interface of RFID reader. This means that a

client communicates with the Rifidi reader in the same way that it would

communicate with a real reader. For example, with the Alien reader, a client

would send messages to retrieve tag reads. The virtual Alien reader in Rifidi

Emulator responds to messages in the same way a real Alien reader does [33].

Rifidi team provided several software programs; each one has its

properties and design for specific case. The programs are Rifidi Edge server

and client, Rifidi Designer, Prototyper, Rifidi Emulator and Rifidi Tag

Streamer.

In VLS tests, two Alien ALR-9800 readers are considered that have

four antennas, as intersection readers and also several RFID tags are created.

The RFID tags are represented as vehicles.

The operations with Rifidi can be divided into two parts: connection

and send/receive data. In the first part, the connection is started between the

middleware and virtual readers. In fact, CCS will manage these readers and

Page 52: RFID Based Design for Vehicle Location System

41

will set the connections. In the second part, the virtual readers reply (Get

TagList) request by sending the tags list to CCS at each second.

In VLS, the both Rifidi Emulator and Rifidi Tag Streamer are used for

testing the system. Rifidi Emulator is used to test the middleware connection

protocols in communication performance with Alien ALR-9800 Reader and

to test sending the request (Get TagList) at each second and receive the reply

(the tags) from the reader.

Also, Rifidi Tag Streamer is used to test the robust of VLS middleware

in filtering the data that are received from readers at real-time and stored it in

data online table.

3.5 Roads and Traffic Intersections Simulation (RTIS)

Before introducing VLS in a real-life, the ability, functionality,

efficiency, and further effects have to be tested carefully. To evaluate the

improvements that can be achieved, the simulations have to be done.

3.5.1 The RTIS Architecture

A realistic simulation of roads and traffic intersections scenarios is needed.

Various parameters are needed to simulate the traffic, the application, and the

environment.

Traffic includes the physical movements of vehicles on an arbitrary

road network. Application simulation means the simulation of applications

that are to be integrated in real world vehicles. For this purpose, inner vehicle

interfaces have to be emulated to allow the application to interact with RFID

readers, as attached RFID tag on vehicles. The last part is the environment

simulation which includes the roads network with traffic intersections.

Also, TCP/IP server is built to simulate connection method in RTIS as

Page 53: RFID Based Design for Vehicle Location System

42

Alien ALR-9800 Enterprise RFID reader. The VLS connection with RTIS is

like the connection with real Alien readers.

3.5.2 The RTIS Scenario

To evaluate the effectiveness of the VLS and to identify potential problems, a

simulation scenario is selected as uncomplex as possible. For this reason, a

special region is assumed. This region has nine in-out ways and five traffic

intersections. One intersection is composed of three roads intersected and the

others are composed of four roads intersected. This region is chosen because

it provides a good road structure for VLS tests. The assumed region is called

Al-Mansur in VLS simulation.

The intersection ID is given to each intersection as sequence 146, 147,

…,150. Ten RFID readers are simulated, two readers to each intersection.

Each reader has IP and Port as sequence 10.20.30.22:20000,

10.20.30.23:20000,...., 10.20.30.31:20000, as shown in Fig. 3-5.

Seven vehicles are simulated and each vehicle is given specific vehicle

ID, tag ID and color. These vehicles move on the road network in random

path. Several routes are designed for each vehicle on road network. The

vehicle selects specific route which will pass through it by using random

function (that is supported in Visual Basic program). The random function

gives a random value, by depending on this value RTIS will decide the route

that the vehicle will pass.

Page 54: RFID Based Design for Vehicle Location System

43

Figure 3-5 The vehicles and roads network in RTIS

Specific car can be activated in the test to simplify tracking its

information in VLS by selecting the car check box, or activate all cars to test

the ability of VLS system. Also the speed of vehicles moving can be

controlled in RTIS.

The RTIS simulates RFID reader scanning and receiving tag ID from

vehicles. The virtual reader accumulates these data until it receives (Get

TagList) instruction from VLS. Then, it will send the gathered data to VLS in

CCS by TCP/IP server.

To illuminate the data sent to VLS, RTIS displays all data that are

gathered in the readers and will send them online to VLS in table. This table

displays the vehicle's tag ID that is captured by a reader, reader's IP and Port,

the number of antenna, the date, and the time of capturing tag ID, as shown in

Fig. 3-6.

Page 55: RFID Based Design for Vehicle Location System

44

Figure 3-6 The gathered data

Also, RTIS displays the meaning of these data that will be concluded in

the middleware of VLS as vehicle ID, intersection ID, from-road and to-road

in another table, as shown in Fig. 3-7.

Figure 3-7 The significance of the gathered data

The RTIS is designed for creating a scenario that is as real as possible.

All the unnecessary or unpredictable factors that can influence the results

such as side roads traffic or complex traffic light systems are avoided in order

to provide significant results.

Page 56: RFID Based Design for Vehicle Location System

45

3.6 RFID Readers Connection Protocols

Alien ALR-9800 Enterprise RFID Reader supports Serial port (RS-232,

DB-9 F) and TCP (LAN, RJ-45) connections. Serial connection is not useful

in VLS because the readers are distributed on large area. A TCP connection

provides DHCP, TCP/IP and SNMP network protocols.

When a CCS needs to connect to RFID reader in wide area network

such as the Internet, it uses a software component called a socket. The socket

opens the network connection for the middleware, allowing data to be sent

and read over the network. It is important to note that these sockets are

software, not hardware.

The socket interface is originally developed in UNIX to provide an

interface to the TCP/IP protocol suite. Internet socket, network socket or

socket is used for inter-process communication. A socket is one end of a two-

way communication link between two programs running on the network. A

socket address is the combination of an IP address and a port number [34].

Sockets are used to represent the connectivity between client and server. Fig.

3-8 shows the connection between client and server on specific port.

Figure 3-8 The connection between client and server on specific port [35]

Normally, a server runs on a specific host (RFID reader in VLS) and

has socket which is bound to a specific port number. The server waits from

Page 57: RFID Based Design for Vehicle Location System

46

client side for listening to the socket and makes a connection request. On the

client end (the middleware in VLS) the client knows the IP address of the

server and the port number of the server listening. Making a connection

request the client program tries to negotiate with the server program on the IP

address and port number. When connection is established between server and

client, client used that socket to communicate with server (read/write) [35].

3.7 The Methods of VLS Applications

VLS has several applications; these applications infer the useful

information from VLS data in database. The VLS applications display the

results in tables, figures or as reports. The following, the methods those used

in VLS applications.

3.7.1 Tracking Method for Vehicle Movement

The theoretical basis of virtual route tracking (VRT) algorithm is that the

interrogation range of RFID system is very short as compared to the distance

between readers. So, the position of the corresponding reader is used to stand

for the current position of tag (vehicle).

Figure 3-9 Principle of VRT algorithms [36]

In Fig. 3-9, the black points stand for RFID readers and the matrix is

RFID reader network (assume each reader or point represent one traffic

Page 58: RFID Based Design for Vehicle Location System

47

intersection). As the figure depicts, when a tag moves from reader (1, 1) to

reader (2, 2), the straight line between them is regarded as the track of the tag

by us. The virtual line (VRT) in figure is defined as the track of the tag. So,

the track in the figure is:

Track = Virtual Route: (1,1)→(2,2) → (2,3) → (1,4) → (2,5) → (3,5) → (4,4)

→ (4,3) → (3,2) → (4,1)

It is noted that, when a reader interrogates one tag, the next reader

interrogating it along the track must be adjacent to the previous reader. It is

obvious in Fig. 3-10 that the tag at (2, 3) cannot jump to (2, 5) directly

without activating reader (1, 4), (2, 4) or (3, 4). Therefore, VRT algorithm

must choose adjacent readers along the track [36].

The hierarchical structure of vehicle location over RFID reader network

is constructed and dynamically maintained while the vehicle is moving along.

Exploiting the inherent spatiotemporal locality of vehicle movements, this

hierarchy enables the system to conservatively update the vehicle location

information of moving vehicle only in adjacent traffic intersections [37].

Of course, real-world RFID reader network is impossible to place

readers so regular (exactly like a matrix) and previous figure here only depicts

fundamental of this algorithm theoretically.

In VLS, the VRT is used and the route is displayed in table or drawing

the path on region map. The vehicle path map application will be explained;

the system calls the vehicle ID, region of search, date and period of time from

GUI. The system will be connected with database for request that vehicle

passed through any traffic intersections IDs and also from where it is coming

and to where it is going. Then, the intersections ID organized as First,

Second…. etc. depending on sequence of time appeared in database. After the

system got all the information about that vehicle at that period of time, the

system would call graphics functions to draw the VRT of a vehicle on a map

Page 59: RFID Based Design for Vehicle Location System

48

of this region. First draw from-road then draw to-road in each intersection, see

Fig 3-10. To recognize the direction of VRT, i.e. the beginning and the ending

of path, the system will draw the last intersection with blue color.

Figure 3-10 The flowchart for drawing the VRT on the map

Page 60: RFID Based Design for Vehicle Location System

49

3.7.2 Estimation of Traffic Congestion

Reporting road traffic congestion can be a confusion task since there are

different algorithms measuring congestion. Typical users need a conciseness

and easiness to understand traffic report.

The normal traffic situation can be roughly categorized into two states,

open and congestion [38]. But it is observed that such a classification is not

enough to describe the traffic situation. Thus, in VLS three traffic patterns are

used to facilitate quickness and easiness to understand report [39]. Namely

Red (Traffic Jam), Yellow (Slow Moving), and Green (Free Flow) are defined

as the following:

1. Traffic Jam: there are large numbers of vehicles and almost all of the

vehicles run very slowly and it will be represented as red color.

2. Slow Moving: there are many vehicles and most of the vehicles run at

half speed and it will be represented as yellow color.

3. Free Flow: there are few vehicles and the vehicles run at normal speed

in the region of interest and it will be represented as green color.

To determine a congestion level, three steps are applied to estimate the

congestion status: 1) Compute the average time spent, 2) Compute the

average speed of vehicles and 3) Determining the final congestion level that is

compatible to the current system and ready to be reported to the public.

Next, each procedure will be explained in detail.

1. Compute the Average Time Spent

To compute the average time that is required to pass the road, the first

step the system gets the time from GUI. Then, the system goes back

five minutes past. Therewith it requests vehicles’ IDs that went out

from road within these five minutes. The next step, the system calls the

entry time to road for those vehicles. Then, it subtracts the exit time

Page 61: RFID Based Design for Vehicle Location System

50

from entry time for each vehicle, see Fig. 3-11. The last step is

computing the time average via sum the spent time of all the vehicles

and divides it on the number of vehicles.

2. Compute the Average Speed of Vehicles

The system will compute the average speed of vehicles after it gets the

distance of the road from traffic intersections table [24]. The system

computes the average speed of vehicles via dividing the distance on

average time spent.

3. Determining the Congestion Level

After the system obtained the average speed of vehicles in road, the

next step, congestion levels are classified using speed into three levels:

red, yellow and green.

The VLS uses two classifications thresholds, γ and δ for adjusting

parameters of the algorithm, as follows [39]:

Green level, if average speed is larger than or equal γ.

Yellow level, if average speed is less than γ and larger than δ.

Red level, if average speed is less than δ.

At the end, the user obtains from the system the average required time to pass

the road and the average speed of vehicles in the last five minutes as well as

estimating the traffic congestion level.

Page 62: RFID Based Design for Vehicle Location System

51

Figure 3-11 The flowchart for traffic congestion estimation

3.8 VLS Client Access

The VLS collects and stores the data in a database; these are private

data and can only be entered by an administrator. But some information in

VLS applications the user can access them by internet or cellular

telecommunications (GSM Mobile). The internet pages can be uploaded by

web servers such as Apache server, IIS server (Internet Information Server) or

any other web server.

Page 63: RFID Based Design for Vehicle Location System

52

Cellular telecommunications through GSM network must be supported

by modem device. Wireless modems are the modem devices that generate,

transmit or decode data from a cellular network for establishing

communication between the cellular network and the computer. Wireless

modems like other modem devices use serial communication to interface with

the computer (any microprocessor or microcontroller system) [40].

A GSM modem is a wireless modem that connects a computer to a

GSM network. Like a GSM mobile phone, a GSM modem requires a SIM

card in order to operate. Fig. 3-12 shows the established communication

between the cellular network and the computer via GSM modem.

Figure 3-12 GSM modem communications [40]

An external GSM modem is connected to a computer by a serial cable.

It is possible to make and receive phone calls and send text messages SMS

(Short Message Service).

AT commands must be used for establishing communication between

the GSM modem and the computer [40]. AT is the abbreviation for Attention,

AT commands are the set of commands that are specified for controlling a

GSM phone or modem and managing the SMS feature of GSM. The AT

commands are sent by the computer to the modem. The modem sends back an

Information Response, which is followed by a Result Code. The result code

tells about the successful execution of that command. If an error occurs in the

Page 64: RFID Based Design for Vehicle Location System

53

execution of a command, an error result code is returned by the modem and

the execution of the command line is terminated [41].

The mode of modem can be either text mode (available on some

modems) or Protocol Description Unit (PDU) mode. In text mode, headers

and body of the messages are given as separate parameters. PDU mode is

execution command sends message from a terminal equipment to the

network. The PDU shall be hexadecimal format and given in one line; phone

converts this coding into the actual octets of PDU [41].

In VLS, the Sony Ericsson Mobile Phone Modem AAD-3880020-BV

is used, that has the Sony Ericsson built-in modem software. The VLS modem

is programmed by AT commands with PDU format mode. It is used to

send/receive SMS message with the user (the driver).

Page 65: RFID Based Design for Vehicle Location System

54

Chapter Four

Implementation of Vehicle Location System

4.1 Introduction

The VLS programs are implemented by applying the proposed methods

and algorithms that were explained in the previous chapter. These are

achieved using Visual Basic, ASP.Net Web Site and SQL Server

Management Studio. This chapter will discuss all parts of these programs and

how they can be used, as well as the chapter will discuss system applications,

SMS server and websites.

4.2 Vehicle Location System

VLS is composed of three parts which are main program, SMS server

and websites. The main program comprises the middleware, database

management and applications. The middleware controls the connection and

communication all RFID readers and database with CCS, as shown in Fig. 4-

1. The database management organizes the data and allows user to add,

update and modify records in tables. All VLS applications depend on the data

received from RFID readers.

Page 66: RFID Based Design for Vehicle Location System

55

Figure 4-1 The layout of the VLS environment

The implemented VLS, which includes main program of VLS, RTIS

and Wi-Fi system, as shown in Fig. 4-2.

Figure 4-2 The implemented VLS

Page 67: RFID Based Design for Vehicle Location System

56

4.3 The Main Program of VLS

The main program is the CCS program; it is used to control RFID

readers, and manage the database and VLS applications. Fig. 4-3 shows the

main form of the VLS which has buttons to link all parts of the system. Each

button will be explained in the following subsections.

Figure 4-3 Main form of VLS

4.3.1 The VLS Security

After running the VLS program, the user name and password form appears as

shown in Fig. 4-4. This form is necessary to avoid accessing the VLS by an

unauthorized person. The administrator must know the user name and the

password. The default for both user name and password of VLS is (admin). If

anyone tries to use invalid user name and password, an error message will

appear. To let this program to be more flexible and more secure, the VLS has

the ability to change the password (see sec. 4.3.3).

Figure 4-4 The security form

Page 68: RFID Based Design for Vehicle Location System

57

4.3.2 The VLS Tables

VLS system contains six tables in database (see sec. 4.4.2). Specific GUI

forms are designed to display the content of VLS tables.

The first table is the traffic intersections table, which defines all the

intersections and RFID readers which are installed in these intersections, as

shown in Fig. 4-5. The columns of usernames and passwords of RFID readers

are not displayed in this form because they will be displayed in RFID readers

table (see sec. 4.3.4). To enter the traffic intersections table form

Intersections button in main form of VLS must be pressed on. Also, to return

back the Back button should be pressed on.

Figure 4-5 Traffic intersections table

The vehicles table is an important table in the system because VLS

depends on it to recognize whether the received tag ID from reader belongs to

a vehicle or other object. This table contains all the information of vehicle and

its owner, as well as the ID of tag that is attached in vehicle. This table must

contain the information about all the vehicles in different cities. GUI of

Page 69: RFID Based Design for Vehicle Location System

58

vehicles table as shown in Fig. 4-6 . To open this form, Vehicles button in the

main form of VLS should be pressed.

Figure 4-6 Vehicles table

The data online table keeps all tags IDs received from readers. This

table is used when there is loss in some information or tag ID is not detected,

e.g. if the vehicle is detected on entering the intersection and VLS could not

detect it on leaving the intersection for unknown reason. This vehicle ID is

not saved in the vehicle location table (see sec. 4.4.1), data online table will

be used to prove a vehicle passed through that intersection at that date and

time. Via clicking on Data Online button in the VLS form, the GUI of data

online table will show, as shown in Fig. 4-7.

Page 70: RFID Based Design for Vehicle Location System

59

Figure 4-7 Data online table

In VLS project, all the gathered data must be analyzed and filtered. At

the end all concluded information will be saved in vehicle location table. All

the paths of vehicles are stored in this table and the date and time of in and

out. To access the GUI of the vehicle location table, Vehicle Location button

should be clicked on, as shown in Fig. 4-8.

Figure 4-8 Vehicle location table

Page 71: RFID Based Design for Vehicle Location System

60

The form in Fig. 4-9 shows the black list vehicles table and two buttons

for adding and deleting vehicle ID.

Figure 4-9 Black list vehicles table

The black list vehicles table is used to monitor in real time the illegal

and the stolen vehicles by adding vehicle ID to the table. Fig. 4-10 shows the

vehicle that is detected in real time.

Figure 4-10 The vehicle which in black list is detected

Page 72: RFID Based Design for Vehicle Location System

61

To delete any vehicle ID from black list table, Delete Vehicle button

must be clicked on. Then, text box will appear to write the ID of vehicle that

needs elimination from black list, as shown in Fig. 4-11.

Figure 4-11 Deleting vehicle ID from black list table

By clicking on Tables Update button in the main VLS form, the form

in Fig. 4-12 will appear. This form gives the ability to the user to add, update

and modify traffic intersections and vehicles tables.

Figure 4-12 Tables update form

Page 73: RFID Based Design for Vehicle Location System

62

To update traffic intersections table, Intersections button should be

selected. Through this form the user can add, delete and modify records of

intersections table via using Navigator Tool, as shown in Fig. 4-13. Return

button is used to return to tables update form.

Figure 4-13 Update of traffic intersections table

By selecting Vehicles button, the update form of vehicles table will be

opened, as shown in Fig. 4-14.

Add New Records Delete Record Save All Updates

Page 74: RFID Based Design for Vehicle Location System

63

Figure 4-14 Update of vehicles table

4.3.3 Setting Database and Authorization

Via clicking on Setting button in the main form of VLS, the form in Fig. 4-15

will appear. This is an important form because it can store the database as

archive and clean the tables that are automatically and continuously update

(i.e. Data Online and Vehicle Location Tables).

Figure 4-15 Setting database and authorization

Page 75: RFID Based Design for Vehicle Location System

64

By clicking on Backup Database button, the "Save File" dialog box

will appear to specify the place to store backup database file. After backup

database file is stored, a message (Backup database is created successfully)

will be displayed.

By clicking on Backup and Cleaning button, the VLS will create

backup database and clean data online and vehicle location tables. After

completing the backup and cleaning tables, the message in Fig. 4-16 will be

shown.

Figure 4-16 A message of cleaning tables successfully

By clicking Restore Database button, the monition message (The

restoring operation will delete the current data in database) will be shown, as

shown in Fig. 4-17. Then, by clicking on yes button, the "Open File" dialog

box will be appeared to specify place of backup file of database. The

restoration operation may need few minutes to be completed.

Page 76: RFID Based Design for Vehicle Location System

65

Figure 4-17 Restore database

To allow the program to be more flexible and more secure, VLS gives

the ability for the administrator to change the password by clicking on

Change Password button, then Fig. 4-18 will be shown. The old and new

password must be entered in the form. After pressing the Save Change

button, a message (Changing Password Successfully) will appear.

Figure 4-18 Password change form

Page 77: RFID Based Design for Vehicle Location System

66

4.3.4 The Connection with RFID Readers

This is a presentation form of the middleware. By this form RFID readers can

be connected or disconnected. Also, the performance of readers can be

managed and monitored in real-time. As well as monitoring the numbers of

tags that are received and compared with the number of the tags that are

filtered and stored in data online table. To enter this form, Connect To

Readers button in main form of VLS should be clicked on, as shown in Fig.

4-19.

Figure 4-19 The connection form with RFID readers

To connect with reader, the administrator must enter IP, Port, User

Name and Password of reader and select its check box (as shown in Fig. 4-

19). Then, by clicking on Connect button, the system will initialize the

connection and display if the connection is successful or failed. The

disconnection of any reader is achieved by selecting its check box and click

on Disconnect button. If this reader is already disconnected a monition

message will be displayed.

Page 78: RFID Based Design for Vehicle Location System

67

When VLS project is running, if any reader's connection is shut

irregularly, the VLS will display a warning message as shown in Fig. 4-20.

Figure 4-20 The connection shutdown irregularly

The RFID Readers button will open a new form to display the

information of traffic intersections' readers. These are subset of information

that is stored in traffic intersections table, as shown in Fig. 4-21.

Figure 4-21 RFID readers table

Page 79: RFID Based Design for Vehicle Location System

68

The Conn. Show button in Fig. 4-20 will display a new form to show

the connection stream, as shown in Fig. 4-22

Figure 4-22 The connection stream

Also, the Display button will show statistics for the numbers of tags

that are received and the numbers of the tags that are filtered and stored in

data online table.

4.3.5 The Traffic Congestion Appraisal

The VLS system supports some applications for the data that are gathered and

analyzed. Most of these applications depend on vehicle location table. The

traffic congestion appraisal is one of them. This application can estimate the

congestion in two conditions: along the street or within the intersection.

Via click on Intersection Status button in the main form of VLS, the

GUI of intersection congestion appraisal will be shown, as shown in Fig. 4-

Page 80: RFID Based Design for Vehicle Location System

69

23. Appraisal of traffic intersections congestion is used to estimate the

required time to cross the intersection. It calculates the average of the required

time to cross the distance between the antenna of entry and the antenna of

exit. This application uses only the first step of Estimation of Traffic

Congestion method (see sec. 4.8.2).

The traffic intersection ID should be entered in its specific field. The

congestion can be appraised for the time being (default) or at previous date

and time by selecting its button then specifying the date and time.

The suggested system uses α and β criteria to estimate the status of

congestion in intersection. The system enables α and β to be changed by the

user, via click on Setting button that activate its texts boxes. α and β are the

time range that are required (in seconds) to cross the intersection. By clicking

on Congestion Status button, the system will compute and display results as

the number of vehicles passed through the intersection in the last five

minutes, average of the required time to pass this intersection (in seconds) and

the intersection congestion status as Free Flow, Slow Moving or Traffic Jam.

Figure 4-23 The traffic intersections congestion appraisal

Page 81: RFID Based Design for Vehicle Location System

70

Via click on Street Status button in main form of VLS, the form in Fig.

4-24 will be appeared. The street congestion appraisal is very important

application of VLS. By this application the street congestion status can be

estimated in real-time.

The user must specify the street and the direction of traffic. This is

done by giving the ID of the intersections i.e. from-intersection to-

intersection. The time must be specified at the present time (default) or on the

previous date and time by selecting its button then specifying the date and

time. In this application, the system uses γ and δ criteria to decide status of

traffic congestion in street, γ and δ are the range of vehicles’ speed criteria (in

km/Hr) that pass through street. VLS system enables the user to change γ and

δ, via click on Setting button that activate its texts boxes.

Figure 4-24 The street traffic congestion appraisal

This application uses all steps in the method of Estimation of Traffic

Congestion. By clicking on Congestion Status button, the system will display

the required time average to pass that street, the speed average of vehicles that

passed through the street and the street traffic congestion status.

Page 82: RFID Based Design for Vehicle Location System

71

4.3.6 The Vehicles Locations Discovery

VLS system provides vehicles locations discovery application. This

application is used to detect the intersections where the vehicle passes through

them, also the time and the position of entry and exit within intersections.

The user ought to enter vehicle ID and specify the date and the period

of time. Then by clicking on Locating Vehicle button, the VLS will search for

that ID in this period and display the result in table, as shown in Fig. 4-25.

Figure 4-25 The vehicles locations discovery

4.3.7 The Vehicle Path Map

Vehicle path map is an application provided by VLS, it is used to draw the

route of vehicles on map of the region. This service uses The Tracking

Method for Vehicle Movement (see sec. 4.8.1).

First, the user selects the region of his search. VLS will immediately

load the map of this region. Second, the user enters vehicle ID and specifies

the date and the period of time for tracking. By clicking on Path button, the

system will draw the route of vehicle on map in red color, and the last

Page 83: RFID Based Design for Vehicle Location System

72

intersection the vehicle passed in will be drawn in blue color. This is done for

recognizing the beginning and the ending of the route, as shown in Fig. 4-26.

The thin violet rectangular is drawn to identify the search region on map.

Clean button must be clicked to draw route for another vehicle.

Figure 4-26 The vehicle path map

4.3.8 The Intersection Monitoring and Tracking Vehicle Color

Through intersection monitoring application certain intersection can be

monitored in terms of the number of vehicles that are passed, their IDs and

where they have come from, where to go, the time of entry and exit from the

intersection.

The user enters the ID of the intersection, limits the time and date.

Then, by pressing the Monitoring Intersection button, the system will then

show the number of vehicles that have passed during that time period, as well

as the ID of vehicles, where they have come from and where to go and the

time of entry and exit, as shown in Fig. 4-27.

Page 84: RFID Based Design for Vehicle Location System

73

Figure 4-27 The Intersection Monitoring

Tracking certain vehicle color is another service that is provided by the

VLS. It enables the user to track certain color of vehicle, VLS will search all

vehicles that are passed through the intersection during that time period.

Then, VLS will filter them for that color and display the result in table, as

shown in Fig. 4-28.

Figure 4-28 Tracking vehicle color

Page 85: RFID Based Design for Vehicle Location System

74

4.4 Traffic Congestion Status Website in VLS

The VLS system collects useful data from intersections about vehicles

movement. This data are only allowed for administrator use.

Two websites are designed to allow any user to benefit from traffic

congestion estimation applications, as shown in Fig. 4-1. Via these websites,

the user can avoid entering in traffic congestion through checking congestion

status in intersection or street.

Intersection congestion status estimation website estimates the

requirement time to cross the intersection. This website uses only the first step

of Estimation of Traffic Congestion method. The client (user) should enter the

traffic intersection ID. The website loads the present date and time, also α and

β criteria automatically. The website enables the user to change α and β

criteria and specify previous date and time. By pressing on Intersection

Congestion Status button the website computes and displays the results

online.

The street congestion status website is designed for any user (driver) to

check the congestion status of street before going into it. The user ought to

define the street by from-intersection ID to-intersection ID. The website loads

the present date and time, also γ and δ criteria automatically or can be defined

manually. This website uses all steps in the method of Estimation of Traffic

Congestion. By clicking on Street Congestion Status button, the system will

display the average of the required time to pass that street, the speed average

of vehicles that passed through the street and the street traffic congestion

status. Fig. 4-29 and Fig. 4-30 show both internet pages.

Page 86: RFID Based Design for Vehicle Location System

75

Figure 4-29 The website of intersection congestion estimation

Figure 4-30 The website of street congestion estimation

Page 87: RFID Based Design for Vehicle Location System

76

4.5 Street Traffic Congestion Appraisal / SMS Server

In the VLS project, Street Traffic Congestion Appraisal / SMS Server

(STCA/SMS) is designed for the user to facilitate knowledge of the

congestion of street without access to internet. This is done by sending SMS

message to STCA/SMS server. The STCA/SMS server is composed of two

parts: STCA and GSM modem (as shown in Fig. 4-1). STCA receives the

request from GSM modem and calculates the congestion status at the present

time by the use of Estimation of Traffic Congestion method, as shown in Fig.

4-31. Then, it sends the reply to GSM modem.

Figure 4-31 Street Traffic Congestion Appraisal / SMS Server

The GSM modem receives SMS message from GSM network and

sends it to STCA and vice versa, as shown in Fig. 4-32.

Page 88: RFID Based Design for Vehicle Location System

77

Figure 4-32 Sony Ericsson GSM Modem Configurations

To configure the VLS modem, the administrator must select the serial

port and specify its baud rate. Then, he clicks on Connect button. The modem

must be set, by clicking on Configuration button, which is configuring the

modem automatically. Then, by clicking on Start button the system will listen

to see if a new message arrived. Now the modem can receive and send SMS

messages. The STCA/SMS button is used to go to STCA/SMS server form.

The user (driver) must send message in a specific form to use this

service. The message ought to start by (STCA) symbol capital or small, that

are followed by a space, then the user must specify the street by entering the

ID of intersection followed by a space and the ID of the opposite intersection.

For example, the text of message is (STCA 150 149). The message is sent to

Page 89: RFID Based Design for Vehicle Location System

78

the service number; the modem receives a message and sends it to

STCA/SMS server. The server will send the reply to the modem to send it to

the user.

4.6 General Discussion

The performance of VLS is tested by Rifidi Platform and RTIS. Rifidi

Emulator simulated two Alien RFID readers and four antennas to each reader

and more than 100 tags; these are representing as one traffic intersection.

The VLS connected and negotiated with readers by sent the Username

and Password to each reader. Then, it sent the request and received the list of

tags, the system filtered and analyzed these data and stored them as expected

with excellence performance.

Also, Rifidi Tag Streamer simulated two RFID readers but have

unlimited number of tags. To test the ability and the efficiency of system, the

readers are regulated to detect 8 tags at each second. After VLS connected

with readers, it sent first request (Get TagList), the response of readers is a

huge numbers of tags (more than 400) those are gathered in readers through

previous time.

The VLS cannot receive all those packets, it received only last 93

packets, and ignored the other. Then, VLS filtered and analyzed these 93 tags

and stored them. The second, third… etc. requests are processed as expected

with excellence performance.

To handle this fault, the size of buffer in TCP client is increased up to

51200 Bytes. Thereon, the VLS can receive and analyze 518 tags

successfully.

Also, VLS used RTIS to test the performance of its applications. The

speed of vehicle in RTIS is controlled by timer interval of system, through

Page 90: RFID Based Design for Vehicle Location System

79

testing multi points and records the speed of vehicles, mathematical equation

was derived by using (Curve Fitting) method for determining the speed of

vehicles. Where S= speed, T= timer interval, the equation is S=200-0.88T.

The vehicles locations discovery, the intersection monitoring, the

tracking vehicle color, and tracking stolen and illegal vehicle applications are

checked, the results were as expected with very good performance. The

vehicle path map application is tested and the result is disarranged some

times, displaying multi path for same vehicle on map, to solve this

disarranging must decrease the time period of search to limit the time of each

path. The traffic intersections congestion appraisal and the streets traffic

congestion appraisal applications are tested, the results have some errors. The

sources of these errors in the project can be summarized as follows:

1. The distance approximation, through approximating the distance

between the intersections.

2. The scaling errors, through scaling the distance and the speed on the

RTIS as real-life, by each centimeter equivalent to 100 meters.

3. The mathematics operations, through subtracting the entering time from

leaving time.

Page 91: RFID Based Design for Vehicle Location System

80

Chapter Five

Conclusions and Suggestions for Future Work

5.1 Conclusions

The rapid spreading of ITS enables the researchers to find new methods or

algorithms to use RFID technology in transport systems. The structure of the

VLS based on RFID is designed depending upon that every vehicle is

attached with RFID tags. When these vehicles travel along a road, all

information of vehicle's tag is read and transmitted real-time to CCS unit, to

realize the purpose of real-time monitor of vehicles movement. Therefore,

after finishing the project the following conclusions can be noted:

During the design of the VLS, Rifidi Platform is used to simulate the

connection RFID reader with the system and to testing the receiving,

analysis and storage the data. The ability, functionality, efficiency, and

further effects were tested by RTIS carefully, before introducing the

system in a real-life. By the use RTIS, the system successfully

synchronously connected with ten RFID readers, those readers are

distributed on five intersections.

VLS analyzed the received data from the distributed RFID readers in

traffic intersections. Then, VLS concluded the vehicles locations and

stored it in table. Vehicles locations table contained all the useful

information about travels of the vehicles in road network.

The location information of road intersection is preloaded by RFID

readers. By tracing individual vehicles' information, VLS evaluated the

road status throughout the city. VLS appraised the streets and traffic

Page 92: RFID Based Design for Vehicle Location System

81

intersections congestion by depending on the average speed of vehicles

in that location.

The information of vehicle location table is used to estimate the routes

of vehicles via use VRT algorithms. The estimated route was displayed

by VLS in a table as traffic intersections respectively or drawn the

route on road network map of the city.

The VLS monitored the intersections if a stolen or an illegal vehicle

passed through them via checking blacklist in real-time. Also, it tracked

vehicles that have a specific color in a traffic intersection during a

certain period of time.

5.2 Suggestions for Future Work

The ITS is predicted to be one of the major growth areas for RFID. These

are some suggestion for future work:

Implementation of the VLS in real-life, Alien ALR 9800 RFID readers

must be installed in all the traffic intersection of the city and the RFID

antennas must be installed at the ingress and egress points of

intersections. As well as RFID tag must be attached in all vehicles.

The VLS system can be enhanced by developing new middleware that

control the system. The new middleware must have faster analysis and

filter the data with less error than the current middleware. Also, VLS

can be programmed to connect with unlimited numbers of RFID

readers, rather than limited numbers.

The VLS provide very important information about traffic in roads

network of city. The developer can use this information in developing

of ITS applications, such as dynamic traffic light control, traffic

Page 93: RFID Based Design for Vehicle Location System

82

violation monitoring, variable speed limits, trip planning with optimal

route selection, etc.

The developer can use GIS system rather than the vehicle path map

application to draw the VRT of vehicle on road network map of the

city.

Traffic congestion status estimation can be improved using other

methods with more accuracy in estimation of the traffic congestion.

Fixed WiMAX technique can be used for traffic information collection

system which is based on RFID rather than Wi-Fi technique.

Page 94: RFID Based Design for Vehicle Location System

83

References

[1] Y. Guohao, T. Jun and C. Guochong, “RF Controller Development

and Its Application in Intelligent Transport System”, Proc. of the

IEEE International Workshop on Anti-counterfeiting, Security,

Identification, ISBN: 1-4244-1035-5, pp. 113-116, Xiamen, Fujian,

China, 2007.

[2] M. Kim, J. Park, J. Oh, H. Chong and Y. Kim, “Implementation of

National Traffic Information Collection Systems in Ubiquitous

Environments", Proc. of the IEEE GLOBECOM, Global

Telecommunications Conference, ISBN: 978-1-4244-2324-8, pp. 1-3,

New Orleans, Louisiana, USA, 2008.

[3] H. Lehpamer, ”RFID Design Principles”, Artech House Microwave

Library, INC., ISBN 13: 978-1-59693-194-7, USA, 2008.

[4] C. M. Roberts, "Radio Frequency Identification (RFID)", Computers

& Security, Vol. 25, Issue 1, Feb. 2006. Elsevier Ltd.,

DOI:10.1016/j.cose.2005.12.003, 2006.

[5] C. H. Li, "Automatic Vehicle Identification AVI System Based on

RFID", Proc. of the IEEE International Conference on Anti-

Counterfeiting Security and Identification in Communication (ASID),

ISBN: 978-1-4244-6731-0, pp. 281-284, Chengdu, China, 2010.

[6] S. Tenqchen, F. S. Chang, L. Y. Chun, C. H. Wang, C. H. Lee and

S. L. Tung, “Helping to Collect Traffic Information Using RFID

Tag Implemented on Urban-Bus for Traffic Information”, Proc. of

the IEEE Microwave Conference, APMC'06, Asia-Pacific, ISBN: 978-

4-902339-08-6, pp. 1497-1500, Yokohama, Japan, 2006.

[7] J. D. Tseng, W. D. Wang and R. J. Ko, "An UHF Band RFID Vehicle

Management System", Proc. of the IEEE International Workshop on

Page 95: RFID Based Design for Vehicle Location System

84

Anti-counterfeiting, Security, Identification, ISBN: 1-4244-1035-5, pp.

390-393, Xiamen, Fujian, China, 2007.

[8] M. Kim, J. Park, J. Oh, H. Chong and Y. Kim, "Study on Network

Architecture for Traffic Information Collection Systems based on

RFID Technology", Proc. of the IEEE Asia-Pacific Services

Computing Conference, APSCC '08, ISBN: 978-0-7695-3473-2, pp.

63-68, Yilan, Taiwan, 2008.

[9] K. A. S. Al-Khateeb, J. A. Y. Johari and W. F. Al-Khateeb, “Dynamic

Traffic Light Sequence Algorithm Using RFID”, Journal of

Computer Science, DOI: 10.3844/jcssp.2008.517.524, Volume 4, Issue

7, pp. 517-524, 2008.

[10] Y. Zhang, "RFID-Based Tracking in Supporting Real-Time Urban

Traffic Information", Proc. of the IEEE Fifth International Joint

Conference on INC, IMS and IDC, NCM '09, ISBN: 978-1-4244-5209-

5, pp. 657-659, Seoul, Korea, 2009.

[11] H. He and Y. Zhang, “Research on Vehicle Travelling Data

Recorder Based on Radio Frequency Identification (RFID)”, Proc.

of the IEEE International Conference on Industrial Mechatronics and

Automation ICIMA, ISBN: 978-1-4244-3817-4, pp. 232-235, Chengdu,

China, 2009.

[12] H. Tao, M. Zou and W. Liu, “Optimization Management System for

Level Crossing Traffic Based on RFID”, Proc. of the IEEE Asia-

Pacific Conference on Wearable Computing Systems (APWCS),

ISBN: 978-1-4244-6467-8, pp. 352-354, Shenzhen, China, 2010.

[13] Z. Feng, Y. Zhu, P. Xue and M. Li, “Design and Realization of

Expressway Vehicle Path Recognition and ETC System Based on

RFID”, Proc. of the IEEE 3rd International Conference on Computer

Page 96: RFID Based Design for Vehicle Location System

85

Science and Information Technology (ICCSIT), ISBN: 978-1-4244-

5537-9, pp. 86-90, Chengdu, China, 2010.

[14] Iswanjono, B. Budiardjo, K. Ramli, "An Algorithm for Predicting the

Speed of Traffic Light Violators", TELKOMNIKA Journal:

Indonesian Journal of Electrical Engineering, Vol.9 No.1, pp. 55-64, e-

ISSN: 2087-278X, 2011.

[15] M. Yu, D. Zhang, Y. Cheng and M. Wang, "An RFID Electronic Tag

based Automatic Vehicle Identification System for Traffic IOT

Applications", Proc. of the IEEE Chinese Control and Decision

Conference (CCDC), ISBN: 978-1-4244-8737-0, pp. 4192-4197,

Mianyang, China 2011.

[16] R. Want, “RFID Explained A Primer on Radio Frequency

Identification Technologies”, Morgan & Claypool Publishers, DOI

10.2200/S00040ED1V01200607MPC001, Vol. 1, No. 1, USA, 2006.

[17] H. Li, “Development and Implementation of RFID Technology”,

Chapter in the book titled “Development and Implementation of RFID

Technology”, Edited by C. Turcu, I-Tech Education and Publishing

KG, Vienna, Austria, 2009.

[18] D. Ouyang, “Identification of Car Passengers with RFID for

Automatic Crash Notification”, M.Sc Thesis, School of Engineering,

Blekinge Institute of Technology, Sweden, 2008.

[19] B. Manish and M. Shahram, " RFID Field Guide: Deploying Radio

Frequency Identification Systems”, Prentice Hall PTR, ISBN: 0-13-

185355-4, Pearson Education, USA, 2005.

[20] S. Garfinkel and H. Holtzman, "Understanding RFID Technology",

Chapter two in the book titled "RFID: Applications, Security, and

Privacy", Edited by S. Garfinkel, and B. Rosenburg, Addison-Wesley

Professional, ISBN: 0-321-29096-8, 2005.

Page 97: RFID Based Design for Vehicle Location System

86

[21] S. Sarma, "RFID Technology and Its Applications", Chapter in the

book titled “RFID Technology and Applications”, Edited by S. B.

Miles, S. E. Sarma, and J. R. Williams, Cambridge University Press,

New York, USA, 2008.

[22] M. T. Zhang, Y. C. Jiao, F. S. Zhang and W. T. Wang, "Design of

Antennas for RFID Application", Chapter in the book titled

“Development and Implementation of RFID Technology”, Edited by C.

Turcu, I-Tech Education and Publishing KG, pp. 13-48, Vienna,

Austria, 2009.

[23] INRIA, “Review of State-of-the-art Middleware, Tools and

Techniques”, ASPIRE-Advanced Sensors and lightweight

Programmable middleware for Innovative Rfid Enterprise applications,

FP7 Contract: ICT-215417-CP, ID: WP2/D2.1, 2010.

[24] J. Park, “Real-Time Traffic Data Collection in Ubiquitous

Environment Based on RFID Systems”, Private Communication,

2011.

[25] F. Qiao, L. Yu, R. Zhang, Z. Chen and R. Fatholahzadeh, “RFID

Applications in Transportation Operation and Intelligent

Transportation Systems (ITS)”, Research Report, Center for

Transportation Training and Research, Texas Southern University,

Houston, Texas, USA, 2009.

[26] L. Antao, L. Yushan, S. Yufang, C. Chongzhen, G. Kuigang and X.

Jing, " Research on the Integrated Management of Highway Based

on Radio Frequency Identification Technology", Proc. of the IEEE

Third International Conference on Measuring Technology and

Mechatronics Automation (ICMTMA), IEEE Computer Society, ISBN:

978-1-4244-9010-3, pp. 116-119, Zhangjiajie, Hunan, China, 2011.

Page 98: RFID Based Design for Vehicle Location System

87

[27] Z. Liu, W. Shi, S. Xu and J. Wu, “The Modeling and Algorithm of

Dynamic Traffic Information Collecting System Based on RFID”,

Proc. of the IEEE Intelligent Vehicles Symposium, ISBN: 978-1-4244-

3503-6, pp. 736-740, Xi'an, China, 2009.

[28] K. Ali and H. Hassanein, “Using Passive RFID Tags for Vehicle-

Assisted Data Dissemination in Intelligent Transportation

Systems”, Proc. of the IEEE 34th Conference on Local Computer

Networks LCN, ISBN: 978-1-4244-4488-5, pp.688-694, Zurich,

Switzerland, 2009.

[29] A. A. Pandit, J. Talreja and A. K. Mundra, "RFID Tracking System

for Vehicles RTSV", Proc. of the IEEE First International Conference

on Computational Intelligence, Communication Systems and Networks,

CICSYN '09, ISBN: 978-0-7695-3743-6, pp. 160-165, Indore, India,

2009.

[30] J. W. Wedel, B. Schunemann and I. Radusch, “V2X-Based Traffic

Congestion Recognition and Avoidance”, Proc. of the IEEE 10th

International Symposium on Pervasive Systems, Algorithms, and

Networks, ISBN: 978-1-4244-5403-7, pp.637-641, Kaohsiung, Taiwan,

2009.

[31] M. M. Alwan, “RFID - Based SQL Server for Library Systems”,

M.Sc Thesis, Computer Engineering Department, Nahrain University,

Iraq, 2007.

[32] J. David, “Design of a RFID Reader Controller”, Final Report,

School of Information Technology & Engineering (SITE), University

of Ottawa, Canada, 2008.

[33] C. E. Palazzi, A. Ceriali and M. Dal Monte, “RFID Emulation in

Rifidi Environment”, in Proc. of the International Symposium on

Ubiquitous Computing (UCS'09), Beijing, China, 2009.

Page 99: RFID Based Design for Vehicle Location System

88

[34] M. Gulati, “Reducing the Inter-Process Communication Time on

Local Host by Implementing Seamless Socket Like, “Low Latency”

Interface over Shared Memory”, M.Sc Thesis, Computer Science and

Engineering Department, Thapar University, Patiala, Punjab, India,

2009.

[35] Z. Aamir, “Developing a Communication Link between Agents and

Cross Platform IDE”, M.Sc Thesis, Computer Science Engineering,

Högskolan Dalarna University, Borlänge, Sweden, 2010.

[36] Iswanjono, B. Budiardho and K. Ramli,"Simulation for RFID-Based

Red Light Violation Detection: Violation Detection and Flow

Prediction", Proc. of the IEEE Second International Conference on

Computer Research and Development, ISBN: 978-0-7695-4043-6, pp.

742-746, Kuala Lumpur, Malaysia, 2010.

[37] H Zhu, M Li, Y Zhu, L. M. Ni, "HERO: Online Real-Time Vehicle

Tracking", Proc. of the IEEE Transactions on Parallel and Distributed

Systems, IEEE Computer Society, ISSN: 1045-9219, pp. 740-752,

2009.

[38] F. Porikli and X. Li, “Traffic Congestion Estimation Using HMM

Models without Vehicle Tracking”, Proc. of the IEEE Intelligent

Vehicles Symposium, ISBN: 0-7803-8310-9, pp. 188-193, Parma, Italy,

2004.

[39] W. Pattara-atikom, P. Pongpaibool, and S. Thajchayapong,

“Estimating Road Traffic Congestion Using Vehicle Velocity”, Proc.

of the IEEE in 6th International Conference on ITS

Telecommunications Proceedings, ISBN: 0-7803-9587-5, pp.1001-

1004, Chengdu, China, 2006.

Page 100: RFID Based Design for Vehicle Location System

89

[40] L. Ma, "Shock Sensor Detection and Transmission of a Forklift",

Final Year Project, Information Technology, Telecommunication

Engineering, Savonia University of Applied Sciences, Finland, 2011.

[41] "Developers guidelines | AT commands for Sony Ericsson phones",

Sony Ericsson Mobile Communications AB, 17th edition, Publication

Number:1206-6103.17, Lund, Sweden, 2010.

Page 101: RFID Based Design for Vehicle Location System

الخالصة

( يك ا حسخخذو في حؼزيفRFIDا حقيت انخؼزيف باسطت انخبث انزادييت )

( ندغ يؼهيبث انزر بصرة فريت ي انطزق باسطت انسصل ػهى AVIاآلني ) انؼزبت

( انخي حؼخبز ازذ حطبيقبث اظت انقم انذكيت RFID Readerارقبو انزكببث ي انقبرئ )

(ITS .) انشيبدة انسزيؼت في اػذاد انزكببث في انطزق انخي ادث انى ظر يشبكم في بسبب

AVIنهسصل ػهى يؼهيبث يزريت ػ انطزق باسطت ITS نذنك بذأ اسخخذاو ،انزر ززكت

ػهى طبق اسغ في انؼبنى.

يخك ،(VLSحخبل ذ االطززت يسأنت حصيى ظبو انخؼزف ػهى ياقغ انزكببث )

( يثبخت في انزكببث اخشة Passive RFID tagsبو انقخزذ ي بطبقبث بيببث غيز فؼبنت )انظ

انقبرئ ائيبث زبسبت يزكشيت بزايح يشزفت )انسيط قاػذ انبيببث( ظبو احصبل

يقغ SMSالسهكي. ببإلضبفت انى حطبيقبث ظبو انخؼزف ػهى ياقغ انزكببث خذيت انزسبئم

كب يزشر يخش RFID. ا انظبو انصى يسيطز يذيز يزاقب اداء قبرئ انـ االخزيج

ببسخؼبلحى انؼم انؼهيبث في يئت يالئت نكي حسخخذو في حطبيقبث انظبو يقغ االخزيج.

بيسيك فيدالببسخخذاو بزبيح VLS بزيدت ظبو RFIDسبكي نظبو كRifidi يصت

أربؼت قبرئ ن في انخقبطؼبث انزريت، كم RFIDي حزكيب قبرئي يخك انظبو .0202

.انخقبطغ يخبرج يذاخم كم نزاقبت ائيبث،

في انؼذيذ ي قزاء انخقبطؼبث انزريت انؼهيبث انكخسبت ي VLS ظبو اسخخذو

، حسذيذ ض فخزاث سييتانخطبيقبث بب فيب حسذيذ ياقغ انزكببث في انخقبطؼبث انزريت

يسبر احدب انزكببث في انخقبطؼبث، ازصبء اػذاد ارقبو انزكببث انخي يزث في انخقبطؼبث،

SMSحخي زبنت االسدزبو في انشارع انخقبطؼبث ي خالل اسخخذاو خذيت انزسبئم انقصيزة

ببث ا يقغ االخزيج، رسى يسبر انزكببث ػهى انخزيطت، يزاقبت انفريت ػهى انزك

.انالزقت قبيب ا انسزقت

Page 102: RFID Based Design for Vehicle Location System

تقدير و شكر

ألظتاذي اهتا شكسي خالص عي أعبس أى أد

العوت هس هحود فشي الدكتز االظتاذ الجلل

ر لإلتوام صح تجاث هي ل قده لوا

.االطسحت

الدظت كلت لعود تقدسي بشكسي أتقدم كوا

القعن اعضاء جوع الحاظب دظت قعن زئط

.وتاصلال لدعون

دهالدكتز هي كل الى تقدسي شكسي اقدم

العثاي داد عوازالدكتز الاله كاظن

الودزض ظلواى جابس أويالودزض الوعاعد

تجاث هي قده لوا زدف ظعدي حدزالوعاعد

.ظددة

دسيتق احتساه خالص هع اهتا شكسي اقدم

افساد لجوع شجت العصصي الالدي الى

كافت على دعن تشجع هي قده لوا عائلت

.البحث الدزاظت فتسة طلت االصعدة

Page 103: RFID Based Design for Vehicle Location System

هواقع على التعرف نظام تصوين

التعرف تقنية باستخذام الوركبات

RFID بالووجات الراديوية

رسالة

النهرين جامعة في الهندسة يةلك الى مقدمة

علوم ماجستير درجة نيل متطلبات من جزء وهي

الحاسوب هندسة في

من قبل

حسن عبدالسالم حامد

)م 6002والبرمجيات الحاسبات هندسة في علوم بكالوريوس(

هـ3412 الحجة رو

م 2133 الثاني تشرين