You are on page 1of 59

Identification of Train Collision Avoidance based on sensor

1. INTRODUCTION

1.1 OVERVIEW

The accidents between trains are increasing due to negligence of intelligent


techniques implemented in the trains and improper control signaling from the Train
Traffic Control Station (TTCS). The Train Tracking Chip (TTC) modules and Train
Identification Chip (TIC) modules are using to sense the presence of trains on the
same track. The signals from the moving train are transmitted through the GSM
network to the stationary trains on the same track and to the TTCS. By using this
method one can determine whether the trains were heading for Rear-end collision or
Head on collision. The TTCS transmits control signal to stop or move the trains.

1.2 OBJECTIVE OF THE PROJECT

The Railway network is the world's biggest transport system. The Indian
Railways is one of the largest railway networks in the world. There have been many
accidents occurs in the railway network system. Most of the accidents occurred due to
the collision between the trains and detrains. The proposed system is used to predict
that kind of collision between trains and prevents them from occurring. By preventing
these kinds of accidents more number of Ivies can be saved. Because of these cases in
the railways we considered collisions are the most dreaded accidents. It is very
difficult to stop such a collision, because of speed of the train, which need a lead
distance to stop.

1.3 INTRODUCTION TO EMBEDDED SYSTEMS

An Embedded System can be characterized as a processing gadget that makes


a particular centered showing with regards to. Apparatuses, for example, the
ventilation system, VCD player, DVD player, printer, fax machine, cell phone and so
on are cases of inserted sytems. Each of these machines will have a processor and
unique equipment to meet the particular prerequisite of the application alongside the
implanted programming that is executed by the processor for meeting that particular
necessity. The installed programming is likewise called "firm product". The
desktop/portable workstation phone a broadly useful PC. Embedded Systems do a
certain errand; they can't be modified to do diverse things. Amusements, word
handling, bookkeeping, programming advancement et cetera. In contains Embedded
systems have exceptionally restricted assets, especially You can utilize it for an

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

assortment of uses, for example, playing systems need to conflict with a few due
dates. A particular occupation must be finished inside a particular time. In some
implanted systems, called continuous systems, the due dates are stringent. Missing a
due date may bring about a fiasco death toll or harm to property. Inserted frameworks
are compelled for power. The same number of embedded systems work through a
battery, the power utilization must be exceptionally low. Some inserted frameworks
need to work in extraordinary ecological conditions, for example, high temperatures
and Humidity.

1.4 APPLICATION AREAS

About 99 for each penny of the processors made wind up in installed frameworks.
The installed framework market is one of the most astounding development zones as
these frameworks are utilized as a part of exceptionally market portion purchaser
hardware, office mechanization, modern computerization, biomedical building,
remote correspondence, information correspondence, media communications,
transportation, military et cetera.

Consumer appliances:

At home we utilize various implanted frameworks which incorporate computerized


camera, advanced journal, DVD player, electronic toys, microwave stove, remote
controls for TV and aeration and cooling system, VCO player, computer game
consoles, video recorders and so forth. Today's cutting edge auto has around 20
implanted frameworks for transmission control, motor start control, ventilating, route
and so on. Indeed, even wristwatches are presently getting to be distinctly installed
frameworks. The palmtops are capable implanted frameworks utilizing which we can
do many broadly useful undertakings, for example, playing amusements and word
preparing.

Office automation

The office automation products using em embedded systems are copying


machine, fax machine, key telephone, modem, printer, scanner etc.

Industrial automation:

Today a considerable measure of businesses utilizes installed frameworks for process


control. These incorporate pharmaceutical, bond, sugar, oil investigation, atomic

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

vitality, power era and transmission. The implanted frameworks for mechanical utilize
are intended to complete particular undertakings, for example, observing the
temperature, weight, moistness, voltage, current and so forth., and afterward make
proper move in view of the checked levels to control different gadgets or to send data
to an incorporated observing station. In unsafe modern environment, where human
nearness must be evaded, robots are utilized, which are customized to do particular
occupations. The robots are currently turning out to be effective and complete many
intriguing and confused assignments, for example, equipment get together.

Medical electronics

Practically every restorative gear in the doctor's facility is an inserted framework.


These supplies incorporate symptomatic guides, for example, ECG, EEG, circulatory
strain measuring gadgets, X-beam scanners; gear utilized as a part of blood
investigation, radiation, colonoscopy, and endoscopy and so on. Improvements in
medicinal gadgets have cleared path for more precise analysis of ailments

Computer networking

PC organizing items, for example, spans, switches, Integrated Services Digital


Networks (ISDN), Asynchronous Transfer Mode (ATM), X.25 and outline hand-off
switches are inserted frameworks which execute the essential information
correspondence conventions. For instance, a switch interconnects two systems. The
two systems might run diverse convention stacks. The switch's capacity is to get the
information parcels from approaching pores, examine the bundles and send them
towards the goal subsequent to doing fundamental convention change. Most systems
administration types of gear, other than the end frameworks (desktop PCs) we use to
get to the systems, are inserted frameworks.

Telecommunications

In the field of broadcast communications, the inserted frameworks can be arranged as


endorser terminals and system gear. The endorser terminals, for example, key phones,
ISDN telephones, terminal connectors, web cameras are inserted frameworks. The
system gear incorporates multiplexers, different get to frameworks, Packet
Assemblers Dissemblers (PADs), sate11ite modems and so on. IP telephone, IP door,
IP guard and so forth are the most recent installed frameworks that give minimal
effort voice correspondence over the Internet.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Wireless technologies

Propels in versatile correspondences are clearing route for m path for some
fascinating applications utilizing inserted frameworks. The cell phone is one of the
wonders of the most recent decade of the 20'h century. It is an effective installed
framework that gives voice correspondence while we are progressing. The Personal
Digital Assistants and the palmtops can now be utilized to get to sight and sound
administrations over the Internet. Portable correspondence framework, for example,
base station controllers, versatile exchanging focuses are additionally intense
Embedded Systems.

Security

Security of persons and information has always been a major issue. We need
to protect our homes and offices; and also the information we transmit and store.
Developing embedded systems for security applications is one of the most lucrative
businesses nowadays. Security devices at homes, offices, airports etc. for
authentication and verification are embedded systems. Encryption devices are nearly
99 per cent of the processors that are manufactured end up in embedded systems.
Embedded systems find applications in. every industrial segment consumer
electronics, transportation, avionics, biomedical engineering, manufacturing, process
control and industrial automation, data communication, telecommunication, defense,
security etc. Used to encrypt the data/voice being transmitted on communication links
such as telephone lines. Biometric systems using fingerprint and face recognition are
now being extensively used for user authentication in banking applications as well as
for access control in high security buildings.

Finance

Budgetary managing through money and checks are currently gradually


clearing route for exchanges utilizing brilliant cards and ATM (Automatic Teller
Machine, likewise extended as Any Time Money) machines. Shrewd card, of the
measure of a Visa, has a little smaller scale controller and memory; and it interfaces
with the savvy card peruser! ATM machine and goes about as an electronic wallet.
Shrewd card innovation has the capacity of introducing a cashless society. It is no
misrepresentation to state that eyes wherever you go, you can see, or if nothing else
feel, the work of an implanted System.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

1.5 OVERVIEW OF EMBEDDED SYSTEM ARCHITECTURE

Every embedded system consists of custom-built hardware built around a


Central Processing Unit (CPU). This hardware also contains memory chips onto
which the software is loaded. The software residing on the memory chip is also called
the firmware. The embedded system architecture can be represented as a layered
architecture as shown in Fig.

Figure 1.1 over view Diagram of embedded system

The working framework keeps running over the equipment, and the
application programming keeps running over the working framework. A similar
design is material to any PC including a desktop PC. Be that as it may, there are huge
contrasts. It is not necessary to have a working framework in each installed
framework. For little machines, for example, remote control units, aeration and
cooling systems, toys and so forth. There is no requirement for a working framework
and you can compose just the product particular to that application. For applications
including complex handling, it is fitting to have a working framework. In such a case,
you have to incorporate the application programming with the working System and
after that exchange the whole programming on to the memory chip.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

2. LITARATURE SURVEY

2.1 IMPLEMENTAION OF ZIGBEE BASED TRAIN ANTI- COLLISION


AND LEVEL CROSSING PROTECTION SYSTEM FOR INDIAN RAILWAYS
Usage of a productive ZIGBEE based Train Anti-Collision and Level Crossing
Protection System for Railways is being proposed in this paper. The framework has
four sub modules in particular, Train Module, Control Center Module, Signaling Post
Module and Level Crossing Gate Module. A sheltered separation of 1 Km has been
kept up between the trains subsequent to applying the crisis brake if there should arise
an occurrence of crash recognition. In light of the reviews, it is watched that
notwithstanding for two trains going at 140kmph, the protected separation after
programmed braking under ordinary conditions is around 920m. All sub modules have
been planned and recreated utilizing Proteus electronic reenactment bundle and the
model is actualized. It is normal that if this framework is actualized generally, prepare
crashes and mischances at the Manned/Unmanned level intersection entryway can
likewise be kept away from later on.
Railroad is an Eco-Friendly and Popular method of Transport in most real
urban communities of the World. Prepare mishaps happen regularly because of
wellbeing infringement coming about because of 'human mistakes or confinements'
and 'gear disappointments' loosing valuable lives. The Ministry of Railways (Railway
Board), Govt. of India has alluded Ten Train Collisions in the past for improvement of
an effective Train Anti-Collision framework and the requirement for research in this
field. Konkan railroads have proposed and actualized an Anti Collision System. The
framework did not take any dynamic contributions from existing Railway flagging
framework, furthermore needed two ways correspondence ability between the trains
and the control focuses or stations, thus was later decommissioned. The objective of
this work is to plan and execute a practical and savvy undeniable Train Anti Collision
System to keep the prepare crashes. It intends to effectively incorporate into the
current flagging framework and stay away from mishaps in kept an eye on and
additionally unmanned level rosses, without changing any of the current framework
actualized in Indian Railway. In the blink of an eye, mergency might be gone through
conventional media transmission frameworks like Walkie-Talkies or other specialized
gadgets, Collision shirking frameworks on same track utilizing IR modules and ACD

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

by Konkan Railway. In any case, each of these frameworks has its own particular
favorable circumstances and hindrances. In the customary specialized technique,
human blunder or remissness may prompt to serious fiascos as saw before. IR sensors
have restrictions because of the geographic way of the tracks. The ACD framework
likewise is observed to be inadequate as it is not considering any dynamic
contributions from existing Railway flagging framework, furthermore needs two ways
correspondence. Ability between the trains and the control focuses or stations,
consequently has been later decommissioned. Later geological sensors have
additionally been utilized which makes utilization of satellites for correspondence.
Yet, the framework is expensive and muddled to execute.
2.2 PREVENTION OF TRAIN ACCIDENTS USING WIRELESS SENSOR
NETWORKS
This technique is focused on anticipating the real reason for railroad mishaps
that is impact on a similar track. The essential objective of this hostile to crash
framework is to recognize impact indicates and report these mistake cases to principle
control room, close-by station and in addition lattice control stations. So that if any
impact prone to happens then this framework will dodge such conditions by giving an
alert to concern units. Execution of an effective ZIGBEE based Train Anti-Collision
for railroads is being proposed in this paper. A protected separation of 1 Km has been
kept up between two prepares in the wake of applying the crisis brake if there should
be an occurrence of impact location. In light of the reviews, it is watched that
notwithstanding for two trains going at 140kmph, the protected separation after
programmed braking under ordinary conditions is roughly 920m. All sub modules
have been composed and recreated utilizing Proteus electronic reproduction bundle
and the model is executed .It is normal that if this framework is actualized broadly,
prepare impacts and mischances can be kept away from. The up-degree is additionally
done by taking after checking fell association of the compartments in grouping way.
In nowadays prepare mischances are most regular and the harm because of
these mishaps are more serious and takes many existences of travelers thus to lessen
the mishap rate because of crash and breakage of rails can be diminished to greatest
by the method for planning a framework that makes utilization of system to a
constrained territory (utilizing a Zig-Bee module), microcontroller for checking the
Zig-Bee module, prepare engine, LCD show, sensors, and a some portion of interior

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

memory for dumping the required program (in Keil). The outline cost is low and the
utilization of the composed framework lessens impact between inverse prepares on a
similar prepare and notwithstanding when the prepare is exchanging between two
tracks. Every prepare contains a solitary framework or an extra one. The Zig-Bee
module is portrayed beneath.
ZIG-BEE It is a particular for a suite of abnormal state correspondence
conventions used to make individual region systems worked from little, low-control
advanced radios. Zig-Bee depends on an IEEE 802.15 standard. In spite of the fact
that low-fueled, Zig-Bee gadgets regularly transmit information over longer
separations by going information through halfway gadgets to achieve more far off
ones, making a work arrange; i.e., a system with no concentrated control or high-
control transmitter/recipient ready to achieve the greater part of the organized gadgets.
The decentralized way of such remote adhoc systems make them reasonable for
applications where a focal hub can't be depended upon.
ZIG-BEE is utilized as a part of uses that require a low information rate, long
battery life, and secure systems administration. Zig-Bee has a characterized rate of
250 kbit/s, most appropriate for occasional or discontinuous information or a solitary
flag transmission from a sensor or info gadget. Applications incorporate remote light
switches, electrical meters with in-home-shows, activity administration frameworks,
and other shopper and mechanical hardware that requires short-run remote exchange
of information at moderately low rates. The innovation characterized by the Zig-Bee
determination is planned to be more straightforward and less costly than different
WPANs, for example, Bluetooth or Wi-Fi.
2.3 TRAIN TRACKING AND THE SIGNALING SYSTEM USING
INFRARED AND RADIO FREQUENCY TECHNOLOGY
This paper considered the secured level intersection Signaling framework and Train
following framework. It is embraced a changing rationale procedure to meet the
difficulties of the following framework. This work likewise engaged to outline
prepare on the show screen. On the off chance that the prepare moving near the level
intersection framework the flagging framework causes to discharge the green flag that
causes to close the rail entryway to keep away from the unapproved passage on the
rail track. The open condition of the entryway is impacted by the flagging framework
by method for a 'Red'colour flag. The prepare is permitted to proceed onward the

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

track just by considering the green flag. The rail track is composed with four stop
positions. Stop 1, stop 2, stop 3 and stop 4. The areas of the prepare at different stop
positions are detected by utilizing IR sensors. The identified flag is transmitted to the
control room utilizing RF transmitter working at 433 MHZ. An Atmel miniaturized
scale controller is utilized to manage the whole procedure to meet the sought
condition of the work. This proposed system had been effectively executed on the 30
feet length of the scaled model of the rail track in the lab. The framework comes about
dynamic reaction while following the position of the prepare. The outcomes are
recorded and broke down. The proposed framework may keep caution the observing
instrument. Thus, the impact of the prepare and surprising human blunders can be
minimized.
Indian railroads day by day transporting 14 million travelers by 2 million
kilometer rail track for every day. Security is remarkable importance to Indian
railroads. Security and unwavering quality are firmly connected segments. Weakening
in the wellbeing system is gone before by expanding the quantity of disappointments.
A man machine interface framework innately may improve the unwavering quality of
the gear. This is the most huge consider the wellbeing of the rail transport framework.
Impact evasion component, Secured level intersection framework and flagging
framework having hugeness significance in railroad framework. Following the
position of the prepare utilizing Global position getting framework is proposed to be
executed in engine transport framework. Indian railroad framework is anticipating
receive the following philosophy to have earlier condition of the prepare before
touching base to the station. This part is having wide extent of research particularly
for Indian rail framework.
2.4 RAILWAY DISASTER PREVENTION SYSTEM USING GIS and GPS
The proposed framework contains two noteworthy segments of Geographic
Information framework. The static information contains nitty gritty mapping of the
rail net work as a spatial database in GIS stage. The Dynamic information with
respect to the development of rail movement gathered through the GPS gear
introduced in prepare, flagging lodge and station director's lodge. The GIS
empowered "Rail following framework" takes the info signals from the adjacent GPS
introduced in trains and persistently shows the places of the trains in the region of the
intrigued zone to empower the chiefs of motioning to see the practical circumstance.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

The constant information can be gotten by utilizing web benefits and brought together
through which all the station are connected.
This dynamic review of sensible position of the trains evades reliance of the
flagging group just on the oral correspondence. In this way the human mistake in
correspondence can be minimized. For further improvement of the framework the
flagging choices taken by the group can be crosschecked with the constant observing
of continuous information accessible inside the framework by any better earlier than
actualize the choice. This should be possible by digitizing the tracks which will help
us in finding the ongoing position of the prepare, utilizing Arc View Gis
programming.
Locating the site of mishap turns out to be exceptionally less complex as
contributing the rough Latitude and Longitude can do it, or the site can be
sought by the names of the areas adjacent. GIS Development Map World
Forum Hyderabad, India.
The openness can be broke down more practically with help of the street net
work maps in the region of site of mishap.
Finding out the required assets gets to be distinctly more straightforward,
quick and exact as the information base contains the data about every one of
the assets accessible like Police, Administration, income powers, restorative
offices with insights about the quantity of beds, specialization and so forth,
putting out fires offices with accessible foundation, and different assets like
intentional associations and uncommon police powers and so on.
Finding out ideal courses between various asset areas to mischance site.
The framework likewise accommodating in topographic and statistic
investigation to enhance the adequacy in the arranging and usage exercises.
The framework likewise gives cushion investigation to encourage successful
arranging and usage of the accessible assets in the required support zones of
the influenced ranges. The framework additionally gives simple intends to
include and upgrade the records of the database so that the consistent
overhauling can be more straightforward undertaking.

2.5 TRAIN COLLISION AVOIDANCE BY USING SENSORS

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Presently days, we saw number of mischances happened in railroads. The


mischances were happened because of track breaking and not recognized the inverse
prepares on a similar track at the perfect time. At the point when the prepare met with
a mischance most extreme individuals lose their lives. The vast majority of the
mishaps were happened with carelessness of people and without appropriate
correspondence from Train Traffic Control Station (TTCS).to keep this issue we
distinguished a sensors which will recognize the railroad track breaks and recognize
the inverse prepare in a similar track inside a brief span.
The reason for the venture is to create and plan an ease framework with high
respectability and unwavering quality for upgrading to keep the prepare's impact in
antagonistic climate circumstances, for example, a foggy or blustery and recognize
the track issues. In this we utilized UV sensors, IR sensors, LPC2148 processor to
counteract prepare impact and track splits. In this paper we caution the station ace,
driver to stay away from the prepare crashes with the assistance of GSM. In India
railroad arrange correspondence is the biggest transport organize. In 1853 railroads
are initially presented and it is nationalized in 1951.Most of the general population go
via prepare every day. Every year 11 million travelers go via prepare. Be that as it
may, the excursion is not protected, in light of the fact that parcel of the mishaps
happened in railroad arrange. There are 2 sorts of impacts.
1. Head - on crashes
2. Backside crashes
The two sorts of crashes happened as a result of human mistakes. A head-on crash
implies front end of two trains hit each other. Head-on crashes happen on a similar
track as it were. Backside crashes implies a prepare hits the prepare before it. On a
normal for consistently no less than one individual kicks the bucket in prepare crash.
Every year 3 million individuals were truly harmed by these prepare mischances. The
mishaps were happened because of human and gear disappointments, prompts to
security infringement.
The railroad leading body of India has alluded last prepare mischances to
actualize a proficient and practical against crash framework. Kankan railroads
executed a hostile to crash gadget. However, it bombs on taking dynamic information
sources and absence of correspondence. To give security to human lives and to lessen
the mishaps we built up another item. Utilizing this proposed framework we can

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

distinguish the both head on and backside crashes and can be controlled. In the
proposed framework we are utilizing sensor based recognizable proof framework to
keep these mischances. The proposed display contains Ultrasonic sensors (UV
sensors), Infrared sensors (IR sensors), microcontroller and GSM technology.GSM
innovation is utilized for correspondence reason. Utilizing this GSM we can give
remote correspondence.
UV sensors are utilized to recognize the nearness of items. IR sensors are
utilized to recognize the track splits. DC Motor goes about as a prepare. This model
likewise have one 16* 2 LCD (Liquid Crystal Display) show. It shows the data on the
screen. Every one of these segments are associate with the smaller scale controller.
This is the principle controller. It has a place with the ARM7 engineering. Here we are
utilizing serial correspondence. In serial correspondence we exchange one piece at
once. For more separations serial correspondence is better.
2.6 RAILWAY ANTI-COLLISION SYSTEM USING DSLR SENSOR
Railway impact is a noteworthy issue so this work is concentrated to maintain
a strategic distance from major and little reasons for prepare crash on same track.
Proteus programming courses mapping and heading for the railroad. The essential
objective of our hostile to crash framework is to distinguish such impact indicates and
report these mistake cases to primary control room and substation .utilizing this
electronic programming and ultrasonic/DSLR (Digital Single-Lens Leflex) sensor
safeguard a mist issue as a result of ultrasonic separation sensors go. To assemble this
framework, propelled detecting innovation, long separation correspondence
framework (RS 485protocol), microcontroller (AVR AT8Mega) and remote
Communication convention has been utilized.

3. PROBLEM OF STATEMENT

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Train accidents can be happening very often due to safety violations which
results from human errors or limitations of the existing system and also due to the
equipment failure in the system. Emergency alerts can be sent through traditional
telecommunication systems such as Walkie Talkies or other communication devices.
Railway sector is still facing some problems due to some considerations like cost
effectiveness, despite it is increasing the amount spent on implementation of the
devices.

Disadvantages of existing system

1. Track failure/damage occurred: If any changes occurred between the tracks by


heavy rains or floods.
2. Signal fault occurred: If any signal lights are damaged or fault display of lights the
collision of trains takes place.
3. Fire occurred: If any fire is occurred in the train due to the short circuit or any
other reasons. Engine over heating also indicated by the signals or alarm.
4. Bombs or any disposal materials present in the train. If anyone of the passenger
carrying bombs or any disposal materials into the train can be intimated by the
alarm.

The above limitations can be overcome by using advanced technology in the


proposed system like wife and effective sensors for the detection of problems in the
trains.

4. PROPOSED METHOD

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

In the proposed framework the Train Identification Chip (TIC) inbuilt with
GSM (Global System for Mobile Communication) module is utilized to impart
between the prepare and the Train Traffic Control Station. The TIC in the prepare and
TTC on track at specific separations can make the affirmation of prepare security at
every check point intersections. In the TTC [Train Tracking Chip] we have settled the
scratch cushion.
This scratch cushion is the sensor which will give vital signs to following of
the prepare. The scratch cushion is finished by characterizing 9 sticks, this pins are
spring sort will get to the moving train. The stick holds the information about the
checkpoint, prepare track number and course of the moving trains. The aggregate
TTC module is put in the railroad track. The TIC module is a module which is set in
the moving trains which comprises a scratch peruser.
This GSM has the connection between the prepare and the control station and
the other way around. This module in the prepare while moving, the scratch peruser
will scratch the scratch cushion in the track. This will holds at each checkpoints. In
every checkpoint the points of interest of the trains are conveyed to the control station
in this manner the crash between the trains can be averted. The informing between the
Train and TTCS is controlled by ARM.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 4.1Blog diagram of Train Module

Control station/other trains:

Android
Mobile

Figure 4.2 Block Diagram of Control Station

The scope of study which is needed for the completion of this project involves
the following criteria:

1. Architecture of LPC2148 knowledge

2. The study of modem functions which involves wifi commands.

3. The circuitry and devices that is needed to construct the devices and
establish the necessary communication between the devices.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

4. The study of wifi module along with its commands.


5. The communication between Wi-Fi modem, train module and the
microcontroller will be taken by the serial communication.
Power Supply
The contribution to the circuit is connected from the managed control supply. The a.c.
input i.e., 230V from the mains supply is venture around the transformer to 12V and
is encouraged to a rectifier. The yield acquired from the rectifier is a throbbing d.c
voltage. So with a specific end goal to get an unadulterated d.c voltage, the yield
voltage from the rectifier is encouraged to a channel to evacuate any a.c parts
introduce even after amendment. Presently, this voltage is given to a voltage
controller to get an unadulterated steady dc voltage.

4.1 MICROCONTROLLER ARM7-LPC2148


In the course of the most recent couple of years, the ARM design has
turned into the most unavoidable 32-bitarchitecture on the planet through extensive
variety of ICs accessible from different IC makers. The ARM processors are installed
in items running from cell/cell phones to car stopping mechanisms. Overall people
group of ARM accomplices and outsider merchants has created among semiconductor
and item configuration organizations including equipment engineers, programming
designers, and framework architects. RM7 is one of the generally utilized
miniaturized scale controller family as a part of implanted framework application.
This segment is modest exertion for clarifying fundamental components of ARM-7.
The ARM is a group of direction set structures for PC processors in light of a
decreased (RISC) design created by British organization ARM Holdings. A RISC-
based PC configuration approach implies ARM processors require altogether less
transistors than run of the mill processors in normal PCs.
Here this approach lessens costs, warmth and power utilize. These are
alluring attributes for versatile, light, battery-controlled gadgetsincluding brilliant
portable workstations, telephones, and tablet. A more straightforward outline
encourages more productive multi-center CPUs and higher center tallies at lower cost
giving higher preparing power and enhanced vitality effectiveness for servers and
supercomputers. It Provides 8kB of on-chip RAM open to USB by DMA. Maybe a
couple (LPC2141/2 versus LPC2144/6/8) 10-bit A/D converters give a sum of

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

6/14analog contributions with transformation times as low as 2.44 us for each


channel.

4.2 FEATURES

Single 10-bit D/A converter provide variable analog output.

Two 32-bit timers/external event counters PWM unit and watchdog.

Low power real-time clock with independent power and dedicated 32 kHz
clock input.

Multiple serial interfaces including two UARTs (16C550) two Fast I2C-bus,
SPI and SSP with buffering and variable data length capabilities.

Vectored interrupt controller with configurable priority es and vector


addresses.

45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64.

Nine edge or level sensitive external interrupt pins available.

On-chip integrated oscillator operates with an external crystal in range from 1


MHz to30 MHz and with an external oscillator up to 50 MHz.

4.3 DESCRIPTION

The LPC2148 microcontrollers depend on a 16-bit/32-bit ARM7TDMI-S CPU with


ongoing imitating and inserted follow bolster, that join microcontroller with installed
fast blaze memory extending from 32 kB to 512 kB. A 128-piece wide memory
interface and one of a kind quickening agent engineering empower 32-bit code
execution at the most extreme clock rate. For basic code measure applications, the
option 16-bit Thumb mode diminishes code by more than 30 % with insignificant
execution punishment. Because of their little size and low power utilization, LPC2148
are perfect for applications where scaling down is a key necessity, for example, get to
control and purpose of-offer. Serial correspondences interfaces running from a USB
2.0 Full-speed gadget, various UARTs, SPI, SSP to I2C-transport and on-chip SRAM
of 8 kB up to 40 kB, make these gadgets extremely appropriate for correspondence
doors and convention converters, delicate modems, voice acknowledgment and low
end imaging, giving both substantial cushion size and high handling power. Different

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

32-bit clocks, single or double 10-bit ADC(s), 10-bit DAC, PWM channels and 45
quick GPIO lines with up to nine edge or level touchy outside intrude on pins make
these microcontrollers reasonable for modern control and therapeutic frameworks.

4.3.1. Features

16-bit/32-bit ARM7TDMI-S microcontroller in a tiny LQFP64 package.

8 kB to 40 kB of on-chip static RAM and 32 kB to 512 kB of on-chip flash


memory. 128-bit wide interface/accelerator enables high-speed 60 MHz
operation.

In-System Programming/In-Application Programming (ISP/IAP) via on-chip


boot loader software. Single flash sector or full chip erase in 400 ms and
programming of 256 bytes in 1 ms.

Embedded ICE RT and Embedded Trace interfaces offer real-time debugging


with the on-chip Real Monitor software and high-speed tracing of instruction
execution.

USB 2.0 Full-speed compliant device controller with 2 kB of endpoint RAM.


In addition, the LPC2146/48 provides 8 kB of on-chip RAM accessible to
USB by DMA.

One or two (LPC2141/42 vs. LPC2148) 10-bit ADCs provide a total of 6/14
analog inputs, with conversion times as low as 2.44 s per channel.

Single 10-bit DAC provides variable analog output (LPC2148 only).

Two 32-bit timers/external event counters (with four capture and four compare
channels each), PWM unit (six outputs) and watchdog.

Low power Real-Time Clock (RTC) with independent power and 32 kHz
clock input.

Multiple serial interfaces including two UARTs (16C550), two Fast I2C-bus
(400k bit/s), SPI and SSP with buffering and variable data length capabilities.

Vectored Interrupt Controller (VIC) with configurable priorities and vector


addresses.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Up to 45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64


package.

Up to 21 external interrupt pins available.

60 MHz maximum CPU clock available from programmable on-chip PLL


with settling time of 100 s.

On-chip integrated oscillator operates with an external crystal from 1 MHz to


25 MHz.

Power saving modes include idle and Power-down.

Individual enable/disable of peripheral functions as well as peripheral clock


scaling for additional power optimization.

Processor wake-up from Power-down mode via external interrupt or BOD.

4.3.2 Block Diagram of LPC2148

The block diagram of LPC 2148 controller is shown in figure 4.4

Figure 4.3. Block Diagram of LPC2148

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

4.4. PIN DIAGRAM

The pin diagram of LPC 2148 controller is shown in figure 4.5

Figure 4.4. Pin Diagram of LPC2148

4.4.1 Pin Description

The pin description of ARM7 LPC2148 is shown in below table 4.1

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Symbo P T Description
l in ype
P0.0 to Identification
I of Port0
Train is
Collision
a 32 bitAvoidance based
i/o port with on sensor
individual
P0.31 /O direction Controls for each bit. Total of the 31
pins of the port 0 can be used as a general
purpose bidirectional digital I/Os while port0.31
is output only pin. The operation of port0 pins
depends upon the pin function selected via the
pin connected block.

Pin P0.24, P0.26, P0.27 are not available.


P0.0/TX 1 I P0.0-General purpose Digital I/O.
D0/PWM1 9 /O TXD0-Transmitter output for UART0.
O PWM1-Pulse Width Modulator output1.
O
P0.1/RX 2 I P0.1-General purpose I/O
D0/PWM3/EI 1 /O RXD0-Receiver output for UART0
NT0 I PWM3-pulse width modulator output3
O EINT0-Enable interrupts 0 inputs.
I
P0.2/SC 2 I P0.2-General purpose input/output digital
LO/CAP0.0 2 /O pin

I SCLO-I2c clock input/output.


/O CAP0.0-Capture input for timer0,
O channel0.
P0.3/SD 2 I P0.3-General purpose input/output digital
A0/MAT0.0/EI 6 /O pin.
NT1 I SDAO- I2c clock input/output.
/O MAT0.0-match output for timer0,
O channel0.

I EINT1-Enable interrupts 1 input.


P0.4/SC 2 I P0.4- General purpose input/output digital
K0/CAP0.1/A 7 /O pin.
D0.6 I SCK0-Serial clock for SPIO.
/O CAP0.1-Capture input for Timer0,
I channel0.
Department of ECE, Priyadarshini Institute of Technology, Tirupathi

I AD0.6-ADC0, input6.
P0.5/MI 2 I P0.5- General purpose input/output digital
Identification of Train Collision Avoidance based on sensor

Table 4.1: ARM 7 Pin Description

4.5. FUNCTIONAL DESCRIPTION

4.5.1. Architectural overview

The ARM7TDMI-S is a broadly useful 32-bit microchip, which offers superior and
low power utilization. The ARM engineering depends on Reduced Instruction Set
Computer (RISC) standards, and the direction set and related disentangle component
are much easier than those of smaller scale customized Complex Instruction Set
Computers (CISC). This straightforwardness brings about a high guideline throughput
and great continuous interfere with reaction from a little and financially savvy
processor center. Pipeline strategies are utilized so all parts of the preparing and
memory frameworks can work constantly. Commonly, while one direction is being
executed, its successor is being decoded, and a third guideline is being brought from
memory. The ARM7TDMI-S processor likewise utilizes a one of a kind
compositional system known as Thumb, which makes it in a perfect world suited to
high-volume applications with memory confinements, or applications where code
thickness is an issue. The key thought behind Thumb is that of a super-diminished
guideline set.

Basically, the ARM7TDMI-S processor has two direction sets:

The standard 32-bit ARM set.


A 16-bit Thumb set.
The Thumb set's 16-bit direction length permits it to approach double the
thickness of standard ARM code while holding the vast majority of the ARM's
execution leeway over a customary 16-bit processor utilizing 16-bit registers. This is
conceivable in light of the fact that Thumb code works on the same 32-bit enlist set as
ARM code.
Thumb code can give up to 65 % of the code size of ARM, and 160 % of
the execution of an identical ARM processor associated with a 16-bit memory
framework. The specific blaze usage in the LPC2148 takes into account full speed
execution additionally in ARM mode. It is prescribed to program execution basic and
short code areas, (for example, interfere with administration schedules and DSP
calculations) in ARM mode. The effect on the general code size will be insignificant
yet the speed can be expanded by 30% over Thumb mode.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

4.5.2. On-chip flash program memory

The LPC2148 consolidates a 32 kB, 64 kB, 128 kB, 256 kB and 512 kB streak
memory framework individually. This memory might be utilized for both code and
information stockpiling. Programming of the blaze memory might be expert in a few
ways. It might be modified In System by means of the serial port. The application
program may likewise eradicate as well as program the blaze while the application is
running, permitting an incredible level of adaptability for information stockpiling
field firmware updates, and so on. Because of the design arrangement decided for an
on-chip boot loader, streak memory accessible for client's code on LPC2148 is 32 kB,
64 kB, 128 kB, 256 kB and 500 kB individually. The LPC2148 streak memory gives
at least 100,000 delete/compose cycles and 20 years of information maintenance.

4.5.3 On-chip static RAM

On-chip static RAM might be utilized for code as well as information stockpiling. The
SRAM might be gotten to as 8-bit, 16-bit, and 32-bit. The LPC2141, LPC2142/44 and
LPC2146/48 give 8 kB, 16 kB and 32 kB of static RAM separately. If there should be
an occurrence of LPC2146/48 just, a 8 kB SRAM piece expected to be used for the
most part by the USB can likewise be utilized as a broadly useful RAM for
information stockpiling and code stockpiling and execution.

4.5.4 Interrupt controller

The Vectored Interrupt Controller (VIC) acknowledges the greater part of the intrude
on demand inputs and classifies them as Fast Interrupt Request (FIQ), vectored
Interrupt Request (IRQ), and non-vectored IRQ as characterized by programmable
settings. The programmable task plot implies that needs of hinders from the different
peripherals can be powerfully allocated and balanced. Quick interfere with demand
(FIQ) has the most astounding need. On the off chance that more than one demand is
relegated to FIQ, the VIC joins the solicitations to deliver the FIQ flag to the ARM
processor.
The speediest conceivable FIQ inactivity is accomplished when just a single
demand is delegated FIQ, on the grounds that then the FIQ benefit routine does not
have to branch into the intrude on administration routine however can keep running
from the interfere with vector area. In the event that more than one demand is
appointed to the FIQ class, the FIQ benefit routine will read a word from the VIC that

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

distinguishes which FIQ source(s) is (are) asking for an intrude. Vectored IRQs have
the center need. Sixteen of the interfere with solicitations can be doled out to this
classification.
Any of the intrude on solicitations can be allotted to any of the 16 vectored
IRQ spaces, among which opening 0 has the most noteworthy need and space 15 has
the least. Non-vectored IRQs have the least need. The VIC joins the solicitations from
all the vectored and non-vectored IRQs to create the IRQ flag to the ARM processor.
The IRQ benefit routine can begin by perusing an enroll from the VIC and hopping
there. In the event that any of the vectored IRQs are pending, the VIC gives the
address of the most elevated need asking for IRQs benefit normal; else it gives the
address of a default schedule that is shared by all the non-vectored IRQs. The default
routine can read another VIC enlists to see what IRQs are dynamic.
4.5.5 Pin connect block

The stick associate piece permits chose pins of the microcontroller to have more than
one capacity. Design registers control the multiplexers to permit association between
the stick and the on chip peripherals. Peripherals ought to be associated with the
suitable pins before being actuated, and preceding any related interrupt(s) being
empowered. Action of any empowered fringe work that is not mapped to a related
stick ought to be viewed as vague. The Pin Control Module with its stick select
registers characterizes the usefulness of the microcontroller in a given equipment
environment. After reset all pins of Port 0 and 1 are arranged as contribution with the
accompanying special cases: If troubleshoot is empowered, the JTAG pins will expect
their JTAG usefulness; if follow is empowered, the Trace pins will accept their follow
usefulness. The pins connected with the I2C0 and I2C1 interface are open deplete.

4.5.6 Fast general purpose parallel I/O (GPIO)

Gadget sticks that are not associated with a particular fringe capacity are controlled by
the GPIO registers. Pins might be powerfully arranged as data sources or yields.
Isolate registers permit setting or clearing any number of yields all the while. The
estimation of the yield enroll might be perused back, and also the present condition of
the port pins.

LPC214148 presents quickened GPIO works over earlier LPC2000 gadgets:

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

GPIO registers are moved to the ARM neighborhood transport for the
speediest conceivable I/O timing.
Mask registers permit regarding sets of port bits as a gathering, leaving
different bits unaltered.
All GPIO registers are byte addressable, Entire port esteem can be composed
in one direction.

Features

Bit-level set and clear registers permit a solitary direction set or clear of any
number of bits in one port.
Direction control of individual bits.
Separate control of yield set and clear.
All I/O default to contributions after reset.
4.5.7 10-bit ADC

The LPC2141/42 contains one and the LPC2144/46/48 contains two simple to
computerized converters. These converters are single 10-bit progressive estimate
simple to advanced converters. While ADC0 has six channels, ADC1 has eight
channels. In this manner, add up to number of accessible ADC contributions for
LPC2148 is 14.

Features

10 bit successive approximation analog to digital converter.

Measurement range of 0 V to VREF (2.0 V VREF VDDA).

Every analog input has a dedicated result register to reduce interrupt


overhead.

Burst conversion mode for single or multiple inputs.

Optional conversion on transition on input pin or timer match signal.

Global Start command for both converters (LPC2142/44/46/48 only).

4.5.8 UARTs

The LPC2148 each contains two UARTs. Notwithstanding standard transmit and get
information lines, the LPC2148 UART1 likewise give a full modem control
handshake interface. Contrasted with past LPC2000 microcontrollers, UARTs in

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

LPC2148 present a partial baud rate generator for both UARTs, empowering these
microcontrollers to accomplish standard baud rates, for example, 115200 with any
precious stone recurrence over 2 MHz what's more, auto-CTS/RTS stream control
capacities are completely executed in equipment (UART1 in LPC2148 as it were).

Features

16 byte Receive and Transmit FIFOs.

Register locations conform to 550 industry standard.

Receiver FIFO trigger points at 1, 4, 8, and 14 bytes Built-in


fractional baud rate generator covering wide range of baud rates
without a need for external crystals of particular values.

Transmission FIFO control enables implementation of software


(XON/XOFF) flow control on both UARTs.

LPC2148 UART1 equipped with standard modem interface signals.


This module also provides full support for hardware flow control
(auto-CTS/RTS).

4.5.9 Crystal oscillator

On-chip integrated oscillator operates with external crystal in range of 1 MHz


to 25 MHz. The oscillator output frequency is called fosc and the ARM processor
clock frequency is referred to as CCLK for purposes of rate equations, etc.

4.5.10 Reset and wake-up timer

Reset has two sources on the LPC2148: the RESET stick and guard dog reset. The
RESET stick is a Schmitt trigger information stick with an extra glitch channel.
Statement of chip reset by any source begins the Wake-up Timer (see Wake-up Timer
portrayal underneath), bringing on the inward chip reset to stay attested until the outer
reset is de-declared, the oscillator is running, a settled number of tickers have passed,
and the on-chip streak controller has finished its instatement. At the point when the
inside reset is evacuated, the processor starts executing at address 0, which is the reset
vector. By then, the majority of the processor and fringe registers have been instated
to foreordained qualities. The Wake-up Timer guarantees that the oscillator and other
simple capacities required for chip operation are completely utilitarian before the

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

processor is permitted to execute guidelines. This is imperative at power on, a wide


range of reset, and at whatever point any of the previously mentioned capacities are
killed for any reason. Since the oscillator and different capacities are killed amid
Power-down mode, any wake-up of the processor from Power-down mode makes
utilization of the Wake-up Timer.
The Wake-up Timer screens the precious stone oscillator as the method for
checking whether it is sheltered to start code execution. At the point when power is
connected to the chip, or some occasion brought on the chip to leave Power-down
mode, some time is required for the oscillator to create a flag of adequate
plentifulness to drive the clock rationale. The measure of time relies on upon many
elements, including the rate of VDD slope (on account of force on), the kind of
precious stone and its electrical attributes (if a quartz gem is utilized), and in addition
whatever other outside hardware (e.g. capacitors), and the qualities of the oscillator
itself under the current surrounding conditions.
4.5.11 LCD (Liquid Crystal Display)

LCD stands for Liquid Crystal Display. LCD is finding wide spread use
replacing LEDs (seven segment LEDs or other multi segment LEDs) because of the
following reasons:

1. The declining prices of LCDs.

2. The ability to display numbers, characters and graphics. This is in contrast to


LEDs, which are limited to numbers and a few characters.

3. Incorporation of a refreshing controller into the LCD, thereby relieving the


CPU of the task of refreshing the LCD. In contrast, the LED must be refreshed
by the CPU to keep displaying the data.

4. Ease of programming for characters and graphics.

These components are specialized for being used with the microcontrollers,
which means that they cannot be activated by standard IC circuits. They are used for
writing different messages on a miniature LCD.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure: 4.5 LCD display

A model portrayed here is at its ease and extraordinary potential outcomes most much
of the time utilized as a part of practice. It depends on the HD44780 microcontroller
(Hitachi) and can show messages in two lines with 16 characters each. It shows every
one of the letters in order, Greek letters, accentuation marks, scientific images and so
on. What's more, it is conceivable to show images that client makes up all alone.
Programmed moving message in plain view (move left and right), appearance of the
pointer, backdrop illumination and so on are considered as helpful attributes.

4.5.12 Pins Functions

pin Function Name


Numbe
r
1 Ground (0V) Ground
2 Supply Voltage, 5V(4.7 V-5.3V) Vcc
3 Contrast adjustment, through a variable resistor VEE
4 Selects command register when low, and the register Register
when high select
5 Low to write to the register, high to read from the Read /Write
register
6 Sends data to data pins when a high to low pulse is Enable
given
7 DB0
8 DB1
9 DB2
0/1 8- BIT DATA PS DB3
1/1 DB4
1/2 DB5
1/3 DB6
1/4 DB7
1/5 Backlight Vcc(5V) Led +
1/6 Backlight ground(0V) Led-

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Table 4.2: pin functions

There are pins along one side of the small printed board used for connection to
the microcontroller. There are total of 14 pins marked with numbers (16 in case the
background light is built in). Their function is described in the table below:
4.5.13 LCD screen

LCD screen comprises of two lines with 16 characters each. Every character
comprises of 5x7 dab lattice. Differentiate in plain view relies on upon the power
supply voltage and whether messages are shown in maybe a couple lines. Therefore,
factor voltage 0-Vdd is connected on stick set apart as Vee. Trimmer potentiometer is
normally utilized for that reason. A few adaptations of showcases have worked in
backdrop illumination (blue or green diodes). At the point when utilized amid
working, a resistor for current confinement ought to be utilized (like with any LE
diode).

Figure: 4.6 LCD screen with basic commands


4.5.14 LCD Basic Commands
All information exchanged to LCD through yields D0-D7 will be translated as
summons or as information, which relies on upon rationale state on stick RS:RS = 1 -
Bits D0 - D7 are locations of characters that ought to be shown. Worked in processor
addresses worked in "guide of characters" and shows relating images. Showing

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

position is dictated by DDRAM address. This address is either already characterized


or the address of beforehand exchanged character is naturally incremented.RS = 0 -
Bits D0 - D7 are summons which decide show mode. Rundown of summons which
LCD perceives are given in the table beneath:
Commands R R D D D D D D D D Executi
RS RW D7 D6 D5 D4 D3 D2 D1 D0 on Time

Clear 0 0 0 0 0 0 0 0 0 1 1.64Ms
display 0 0 0 0 0 0 0 0 0 1
Cursor home 0 0 0 0 0 0 0 0 1 X 1.64mS
0 0 0 0 0 0 0 0 1 x
Entry mode O 0 0 0 0 0 0 0 I S 40uS
set 0 0 0 0 0 0 0 1 1/D S
Display 0 0 0 0 0 0 9 D U B 40uS
on/off 0 0 0 0 0 0 1 D U B
control
Cursor/Displ 0 0 0 0 0 1 D R X X 40uS
ay Shift 0 0 0 0 0 1 D/C R/L x x
Function set 0 0 0 0 1 D N F X X 40uS
0 0 0 0 1 DL N F x x
Set 0 0 0 1 CGRAM address 40uS
0 0 0 1
CGRAM
address
Set 0 0 1 DDRAM address -
0 0 1
DDRAM
address
Read 0 1 B DDRAM address 40uS
BUSY 0 1 BF
flag (BF)
Write to 1 0 D D D D D D D D 40uS
CGRAM or 1 0 D7 D6 D5 D4 D3 D2 D1 D0
DDRAM
Read from 1 1 D D D D D D D D 40uS
CGRAM or 1 1 D7 D6 D5 D4 D3 D2 D1 D0
DDRAM

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Table: 4.3 Basic commands

I/D 1 = Increment (by 1) R/L 1 = Shift right

0 = Decrement (by 1) 0 = Shift left

S 1 = Display shift on DL 1 = 8-bit interface

0 = Display shift off 0 = 4-bit interface

D 1 = Display on N 1 = Display in two lines

0 = Display off 0 = Display in one line

U 1 = Cursor on F 1 = Character format 5x10 dots

0 = Cursor off 0 = Character format 5x7 dots

B 1 = Cursor blink on D/C 1 = Display shift

0= Cursor blink off 0 = Cursor shif

4.5.15 LCD Connection

Contingent upon what number of lines are utilized for association with the
microcontroller, there are 8-bit and 4-bit LCD modes. The proper mode is resolved
toward the start of the procedure in a stage called "instatement". In the main case, the
information are exchanged through yields D0-D7 as it has been as of now clarified. In
the event of 4-bit LED mode, for sparing significant I/O pins of the microcontroller,
there are just 4 higher bits (D4-D7) utilized for correspondence, while other might be
left detached. Thusly, every information is sent to LCD in two stages: four higher bits
are sent first (that regularly would be sent through lines D4-D7), four lower bits are
sent a while later. With the assistance of instatement, LCD will effectively interface
and decipher every information got. Plus, as to the way that information are once in a
while read from LCD (information chiefly are exchanged from microcontroller to
LCD) one more I/O stick might be spared by straightforward interfacing R/W stick to
the Ground. Such sparing has its cost. Despite the fact that message showing will be
ordinarily performed, it won't be conceivable to peruse from occupied banner since it
is unrealistic to peruse from show.
4.5.16 LCD Initialization

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Once the power supply is turned on, LCD is automatically cleared. This process lasts
for approximately 15mS. After that, display is ready to operate. The mode of
operating is set by default. This means that:
1. Display is cleared
2. Mode
DL = 1 Communication through 8-bit interface
N = 0 Messages are displayed in one line
F = 0 Character font 5 x 8 dots
3. Display/Cursor on/off
D = 0 Display off
U = 0 Cursor off
B = 0 Cursor blink off
4. Character entry
ID = 1 Addresses on display are automatically incremented by 1
S = 0 Display shift off
Automatic reset is mainly performed without any problems. If for any reason
power supply voltage does not reach full value in the course of 10mS, display will
start perform completely unpredictably?
If voltage supply unit cannot meet this condition or if it is needed to provide
completely safe operating, the process of initialization by which a new reset enabling
display to operate normally must be applied.
Algorithm according to the initialization is being performed depends on
whether connection to the microcontroller is through 4- or 8-bit interface. All left over
to be done after that is to give basic commands and of course- to display messages.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Fig 4.7 Procedure on 8 bit intialization

4.5.17 Contrast control


To have a clear view of the characters on the LCD, contrast should be
adjusted. To adjust the contrast, the voltage should be varied. For this, a preset is used
which can behave like a variable voltage device. As the voltage of this preset is
varied, the contrast of the LCD can be adjusted.

Figure 4.8 Variable Resistor

4.6 RFID TECHNOLOGY


A RFID framework comprises of a RFID peruser, RFID tag, and data
overseeing Host PC. The peruser contains a RF handset module (transmitter and
recipient), a flag processor and controller unit, a coupling component (reception
apparatus), and a serial information interface (RS232, RS485) to a host framework.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

The label goes about as a programmable information conveying gadget and comprises
of a coupling component (resounding tuned circuit) and a low-control CMOS IC. The
IC chip contains a simple RF interface, radio wire tuning capacitor, RF-to-dc rectifier
framework, computerized control and electrically erasable and programmable read-
just memory (EEPROM), and information tweak circuits. RFID includes contactless
perusing and composing of information into a RFID label's nonvolatile memory
through a RF flag. The peruser transmits a RF flag and information is traded when the
label comes in vicinity to the peruser flag.
Tags can be categorized as follows:
1. Dynamic label, which has a battery that provisions energy to all capacities;
2. Semi latent label, which has a battery utilized just to control the label IC,
Furthermore, not for correspondence;
3. Latent label, which has no battery on it.
The nonattendance of a power supply Makes inactive labels much less
expensive and more solid than dynamic tags.iven the expansion in RFID utilization,
numerous new difficulties confront configuration engineers. Right now, these
difficulties incorporate various label norms, 20% label disappointment rate,
establishment and situation issues, the requirement for practical administration and
support of perusers, the requirement for decreases in the peruser measure that permits
them to be imbedded into structures and handheld gadgets, and licensed innovation
assurance and secure get to control conventions. Various distinctive parameters will
impact the quality and dependability of the RFID framework: label measure,
peruser/essayist reception apparatus estimate, label introduction, tag working time,
label development speed, impact of metallic substances on working reach, numerous
tag working attributes, and the impact of the quantity of labels on working
achievement rate, label covering, et cetera.
Near- and Far-Field Propagation

RFID frameworks available today fall into two principle classes: close field
frameworks that utilize inductive (attractive) coupling of the transponder tag to the
receptive vitality circling around the peruser radio wire, and far-field frameworks that
couple to the genuine power contained in free space engendering electromagnetic
plane waves. Close field coupling procedures are for the most part connected to RFID
frameworks working in the LF and HF groups with moderately short perusing

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

separations, while far-field coupling is material to the possibly longer perusing scopes
of UHF and microwave RFID frameworks. Regardless of whether a tag is in the close
or far field relies on upon that it is so near the field creation framework and the
working recurrence or wavelength. There is a separation, ordinarily known as the
radian circle, inside which one is said to be in the close field and outside of which one
is said to be in the far field. Since changes in electromagnetic fields happen step by
step, the limit is not precisely characterized; the essential attractive field starts at the
radio wire and prompts electric field lines in space (the close field ). The zone where
the electromagnetic field isolates from the recieving wire and proliferates into free
space as a plane wave is known as the far field. In the far field, the proportion of
electric field E to attractive field H has the steady estimation of 120 or 377. The
inexact separation where this move zone happens is given as takes after:

r = 2 It is also important to notice that this expression is valid for small


antennas.

where D << . The reactive near-field region is a region where the E- and H-
fields are not orthogonal; anything within this region will couple with the antenna and
distort the pattern, so the antenna gain is not a meaningful parameter here. Using ,

at 13.56 MHz ( = 22m), this places the near-fieldfar-field boundary at about


3.5m (10 feet). RFID Design Principles It has been estimated that the far-field
distance for the case in which D > is given as follows:

r D = 22 Where D is the maximum dimension of the radiating structure and


r is the distance from the antenna. Note that this is only an estimate, and the transition

from near field to far field is not abrupt. Typically D for reader antennas is
0.3m

(1 foot.) The far-field distance in the UHF ISM band in the United States (915
MHz, = 0.33m) is estimated to be 0.56m. Generally speaking, the radiating near-
field or transition region is defined as a region between the reactive near field and a
far field. In this region, the antenna pattern is taking shape but is not fully formed, and
the antenna gain measurements will vary with distance: The solution of Maxwells

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

equations for the fields around an antenna consists of three different powers of the
range 1/r, 1/r2, and 1/r3. At very short ranges, the higher powers dominate the
solution, while the first power dominates at longer ranges. This can be interpreted as
the electromagnetic wave breaking free from the antenna. The near field may be
thought of as the transition point where the laws of optics must be replaced by
Maxwells equations of electromagnetism.

Far-Field Propagation and Backscatter Principle

RFID frameworks in view of UHF and higher frequencies use far-field


correspondence and the physical property of backscattering or "reflected" power. Far-
field correspondence depends on electric radio waves where the peruser sends a
persistent base flag recurrence that is reflected back by the label's reception apparatus.
Amid the procedure, the tag encodes the flag to be reflected with the data from the tag
(the ID) utilizing a method called regulation (i.e., moving the plentifulness or period
of the waves returned) [2]. The idea of the radian circle, which has an esteem for its
sweep of /2 helps in the perception of whether the label coupling is in the close or
far field. On the off chance that the tag is inside this circle, the responsive vitality
stockpiling fields (dipolar field terms) overwhelm and close field coupling volume
hypothesis is utilized.
On the off chance that the label falls outside the circle, then spreading plane
wave EM fields overwhelm and the well known recieving wire building ideas of
increase, compelling region or opening, and Components of the RFID System EIRP
are utilized. These frequently more well known EM ideas whereby genuine power is
emanated into free space are pertinent to the instances of UHF and microwave
labeling innovations. Most hypothetical examinations, in any event in the primary
estimation, accept the supposed free-space engendering. Free space basically implies
that there is no material or other physical marvel introduce aside from the wonder
under thought.
Free space is viewed as the gauge condition of the electromagnetic field.
Brilliant vitality spreads through free space as electromagnetic waves, for example,
radio waves and noticeable light (among other electromagnetic range frequencies).
Obviously, this model infrequently portrays the real engendering circumstance
precisely; wonders, for example, reflection, diffraction, and dispersing exist that

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

aggravate radio spread. In the remote business, most models and equations we utilize
today are semi observational, that, depends on the notable radio proliferation laws yet
changed with specific elements and coefficients got from field involvement. RFID is
unquestionably a territory where this practice is required; short separations jumbled
with various labels as well as different items are potential snags to radio engendering
and will bring about genuine deviations, unsurprising or not, from the hypothetical
figurings.
A backscatter tag works by regulating the hardware associated with the
reception apparatus keeping in mind the end goal to control the impression of
occurrence electromagnetic vitality. For fruitful perusing of a uninvolved label, two
physical necessities must be met: 1. Forward power exchange: Sufficient power must
be moved into the tag to empower the hardware inside. The power exchanged will be
corresponding to the second force of the separation. 2. The radar condition: The
peruser must have the capacity to distinguish and resolve the little division of vitality
came back to it. The power got will be lessened corresponding to the fourth force of
the separation.
Forward Power Transfer
A commonplace RFID label comprises of a recieving wire and an incorporated
circuit (chip), both with complex impedances. The chip gets control from the RF flag
transmitted by the base station, called the RFID peruser. The RFID label recieving
wire is stacked with the chip whose impedance switches between two impedance
states, normally high and low. At every impedance express, the RFID label introduces
a specific radar cross area (RCS).
The tag sends the data back by shifting its info impedance and in this way
adjusting the backscattered flag. In , ZA = Ra + jXa is the perplexing reception
apparatus impedance and ZC = Rc + jXc is the unpredictable chip (stack) impedance;
chip impedance may change with the recurrence and the information energy to the
chip. The power scattered over from the stacked radio wire can be isolated into two
sections. One section is known as the basic RFID Design Principles mode and is
because of streams initiated on the reception apparatus when it is ended with complex
conjugate impedance. The second part is known as the reception apparatus mode and
results from the befuddle between radio wire impedance and load impedance. The
detachment between the reception apparatuses is r, which is thought to be sufficiently

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

huge for the tag to be in the furthest field of the peruser. E is the electric field quality
of the peruser at the label area. The productivity of the coordinating system will be
taken as solidarity and overlooked (misfortunes in the system may likewise be
represented in the estimation of GT). Recieving wire picks up GR and GT are
communicated in respect to an isotropic radio wire.
From considerations of power flux density at the tag, with as the
wavelength, we get:

P (E )( )G V R Tag T tag c = 2120 24 =2 (5.4) and E PG r R R 2120= 42

After some manipulation of these equations, we obtain:

P (PG r)(G ) PGG ( )r Tag R R T R R T = 4 2 2 4= 2 4 2 2 (5.6)

Components of the RFID System

Reader

Distance

Reader

Antenna gain

GR

Tag

Antenna gain

GT

Transmitter power

PR

ZA

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

ZC

Matching

Network

Power flux density

PTag

CHIP

VTag

TAG

Field

Strength

Forward power transfer

The average most extreme peruser yield power is 500 mW, 2W (ERP, CEPT), and 4W
(EIRP, FCC). Changed over to dBm, the allowed most extreme cutoff points are
around 29 dBm (500 mW ERP, 825 mW EIRP), 35 dBm (2W ERP, 3.3W EIRP), and
36 dBm (4W EIRP). The pick up of the transmitter (peruser) recieving wire (run of
the mill esteem) is thought to be 6 dBi. Along these lines, the most extreme yield
control from the power speaker ought to be 23, 29, and 30 dBm, separately. The tag
accessible power versus separation can be found in Figure 5.2. From the mechanical
experience, the base RF input force of 10 W (20 dBm) to 50 W (13 dBm) is
required to control on the tag. The power got by the tag is then isolated in two
sections: the reflected power and the accessible power utilized by the chip.

LM35 (Temperature) Sensor

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

The LM35 sensor series are precision integrated-circuit temperature


sensors, whose output voltage is linearly proportional to the Celsius (Centigrade)
temperature.

Figure 4.9 Temperature sensor

LM35 Sensor Specification

The LM35 arrangement are accuracy incorporated circuit LM35 temperature sensors,
whose yield voltage is straightly relative to the Celsius (Centigrade) temperature. The
LM35 sensor hence has favorable position over direct temperature sensors adjusted in
Kelvin, as the client is not required to subtract an extensive steady voltage from its
yield to acquire helpful Centigrade scaling. The LM35 sensor does not require any
outer alignment or trimming to give ordinary correctnesses of C at room
temperature and C over a full - 55 to +150C temperature extend. Ease is
guaranteed by trimming and alignment at the wafer level. The LM35's low yield
impedance, straight yield, and exact innate alignment make interfacing to readout or
control hardware particularly simple. It can be utilized with single power supplies, or
with in addition to and short supplies. As it draws just 60 A from its supply, it has
low self-warming, under 0.1C in still air. The LM35 is appraised to work over a -
55 to +150C temperature run, while the LM35C sensor is evaluated for a - 40 to
+110C territory (- 10 with enhanced exactness). The LM35 arrangement is
accessible bundled in hermetic TO-46 transistor bundles, while the LM35C,
LM35CA, and LM35D are likewise accessible in the plastic TO-92 transistor bundle.

LM35 Sensor Circuit Schematic

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 4.10 Circuit Schematic of LM35 Sensor

Features

Calibrated directly in Celsius (Centigrade)


Linear + 10.0 mV/C scale factor
0.5C accuracy guarantee able (at +25C)
Rated for full 55 to +150C range
Suitable for remote applications
Low cost due to wafer-level trimming
Operates from 4 to 30 volts
Less than 60 A current drain
Low self-heating, 0.08C in still air
Nonlinearity only 14C typical
Low impedance output, 0.1 f or 1 mA load

Metal Detector
Electromagnetic Field Generation As the ebb and flow courses in the transmitter
reception apparatus, an undetectable electromagnetic field is created that streams out
into the air (or other encompassing medium, i.e.: air, wood, shake, earth materials,
water, and so on.) every which way. On the off chance that this electromagnetic field
were obvious, it would have all the earmarks of being in the state of an immense,
three dimensional donut, with the transmitter radio wire inserted in its inside.
Electromagnetic field hypothesis expresses that field lines can't cross each other.
Subsequently, they bunch together as they go through the roundabout recieving wire,

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

yet they are not swarmed all things considered. It is lucky this swarming happens, on
the grounds that the force (thickness) of the field lines is the very marvel that
empowers metal discovery in the territory adjoining the hunt loop to occur. In the
drawing at the base of the following page take note of the territory showed as the two
dimensional location designs. This is the site of greatest field swarming; it is here that
metal recognition happens as an aftereffect of two noteworthy marvels swirl current
era and electromagnetic field contortion. (Note theMirror-picture recognition design
over the searchcoil.)

Figure 4.11 Block diagram of Metal Detector

Eddy Currents

Secondary Electromagnetic Field Generation

At whatever point metal goes in close vicinity to the discovery design,


electromagnetic field lines enter the metal's surface. Little circling streams called
"whirlpool ebbs and flows" are brought about to stream on the metal surface
asillustrated in the figure on the confronting page. The power or inspiring power that
causes swirl streams toflow originates from the electromagnetic field itself. Coming
about power misfortune by this field (the influence spent ingenerating the vortex
streams) is detected by the identifier's circuits. Additionally, vortex streams produce
asecondary electromagnetic field that, sometimes, streams out into the encompassing
medium. The portionof the auxiliary field that meets the collector winding, causes an
identification flag to happen in that winding. In this manner, the locator alarms the
administrator that metal has been distinguished.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 4.12 As transmitter current from the antenna generates the electromagnetic field,
detection patter (dotted lines) is the area within which Metal detection occurs. Mirror-image
pattern atop coil is not used. Electromagnetic Field Distortion

The recognition of non-conductive iron (ferrous) minerals happens in an alternate


way. At the point when press mineral draws close and inside the discovery design, the
electromagnetic field lines are redistributed, as appeared in the figure on the
accompanying page. This redistribution annoys the "adjust" of the transmitter and
collector windings in the searchcoil, bringing about power being prompted into the
beneficiary winding. At the point when this actuated power is detected by the
identifier circuits, the indicator alarms its administrator to the nearness of the iron
mineral. Press mineral recognition is a noteworthy issue for both makers and clients
of metal identifiers. Obviously, the indicator of iron mineral is invited by a gold
seeker who is searching for dark attractive sand which can frequently flag the
nearness of placer metal. Then again, the fortune seeker, who is searching for coins,
adornments, relics, gold pieces, and so forth., as a rule discovers press mineral
discovery anuisance.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 4.13 When any metal comes within the detection pattern of a searchcoil, eddy currents
flow over its surface, resulting in a loss of power in the electromagnetic field, which the
detectors circuits can sense.

4.7. DC MOTOR AND DRIVER

4.7.1. DC Motors

Electric motors are used to efficiently convert electrical energy into


mechanical energy. Magnetism is the basis of their principles of operation. They use
permanent magnets, electromagnets, and exploit the magnetic properties of materials
in order to create these amazing machines. General diagram of DC motor is shown in
figure 4.18.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 4.14 DC motor Rotor

DC motors are fairly simple to understand. They are also simple to make and
only require a battery or dc supply to make them run.

A simple motor has six parts, as shown in the diagram below figure 4.19:

Armature or rotor

Commutator

Brushes

Axle

Field magnet

DC power supply

An electric engine is about magnets and attraction: An engine utilizes


magnets to make movement. In the event that you have ever played with magnets you
think about the basic law of all magnets: Opposites pull in and likes repulse. So in the
event that you have two bar magnets with their closures stamped "north" and "south,"
then the north end of one magnet will pull in the south end of the other. Then again,
the north end of one magnet will repulse the north end of the other (and
comparatively, south will repulse south). Inside an electric engine, these drawing in
and repulsing powers make rotational movement appeared in figure 4.19 and 4.20.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Com

B
A
rushes

Ar
T
o

Figure 4.15 Motion of magnets in normal position

T
o
Figure 4.16 Commutator action in winding left

The armature (or rotor) is an electromagnet, while the field magnet is a perpetual
magnet (the field magnet could be an electromagnet too, yet in most little engines it is
not to spare power). When you put these parts together, here is a total electric engine:
In the above figure, the armature winding has been forgotten with the goal that
it is less demanding to see the commutator in real life. The key thing to notice is that
as the armature goes through the level position, the posts of the electromagnet flip. In
light of the flip, the north post of the electromagnet is constantly over the hub so it can
repulse the field magnet's north shaft and draw in the field magnet's south shaft.
Indeed, even a little electric engine contains similar pieces depicted over: two
little perpetual magnets, a commutator, two brushes, and an electromagnet made by

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

twisting wire around a bit of metal. Quite often, in any case, the rotor will have three
shafts instead of the two posts as appeared in this article. There are two great
explanations behind an engine to have three posts:

It causes the engine to have better progression. In a two-post engine, if the


electromagnet is at the adjust point, superbly even between the two shafts of
the field magnet when the engine begins, one can envision the armature
getting "stuck" there. This never happens in a three-shaft engine.
Each time the analyst hits the point where it flips the field in a two-post
engine, the reporter shorts out the battery (specifically interfaces the positive
and negative terminals) for a minute. This shorting squanders vitality and
channels the battery unnecessarily. A three-post engine takes care of this issue
also. It is conceivable to have any number of posts, contingent upon the span
of the engine and the particular application it is being utilized as a part of.

4.7.2. Motor Driver - L293D

Pin diagram

L293D pin diagram is shown in below figure 4.21.

Figure 4.17 Pin diagram of motor driver

4.7.2.1. Description

The L293 and L293D are fourfold high-momentum half-H drivers. The L293 is
intended to give bidirectional drive streams of up to 1 An at voltages from 4.5 V to 36
V. The L293D is composed is appeared in figure 4.22 to give bidirectional drive

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

streams of up to 600-mA at voltages from 4.5 V to 36 V. Both gadgets are intended to


drive inductive loads, for example, transfers, solenoids, dc and bipolar venturing
engines, and in addition other high-present/high-voltage stacks in positive-supply
applications.

All sources of info are TTL good. Every yield is a total chain of command
drive circuit, with a Darlington transistor sink and a pseudo-Darlington source.
Drivers are empowered in sets, with drivers 1 and 2 empowered by 1,2EN and drivers
3 and 4 empowered by 3,4EN. At the point when an empower information is high, the
related drivers are empowered and their yields are dynamic and in stage with their
data sources. At the point when the empower info is low, those drivers are crippled
and their yields are off and in the high-impedance state. With the best possible
information inputs, every combine of drivers structures a full-H (or scaffold)
reversible drive reasonable for solenoid or engine applications. On the L293, outer
fast yield clasp diodes ought to be utilized for inductive transient concealment.

A VCC1 terminal, isolate from VCC2, is accommodated the rationale


contributions to minimize gadget control dispersal. The L293 and L293D are
described for operation from 0 to 70 degree Celsius.

Figure 4.18 Block diagram of motor connection

This chip contains 4 enable pins. Each enable pin corresponds to 2 inputs.
Based on theVinput values given, the device connected to this IC works accordingly.

4.7.2.2.
CC1 L293D Interfacing with LPC2148

The interfacing diagram of ARM 7 to the LCD is shown in figure 4.23.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure4.19 DC motor interfacing connection with ARM7

4.7.2.3. Features

Wide Supply-Voltage Range: 4.5 V to 36 V

Separate Input-Logic Supply

Internal ESD Protection

Thermal Shutdown

High-Noise-Immunity Inputs

Functionally Similar to SGS L293 and SGS L293D

Output Current 1 A Per Channel (600 mA for L293D)

Peak Output Current 2 A Per Channel (1.2 A for L293D)

Output Clamp Diodes for Inductive Transient Suppression (L293D)

ESP8266 WiFi Module

ESP8266 is an impressive, low cost Wi-Fi module suitable for adding Wi-Fi
functionality to an existing microcontroller project via a UART serial connection. The

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

module can even be reprogrammed to act as a standalone Wi-Fi connected devicejust


add power.

The feature list is impressive and includes:

802.11 b/g/n protocol Wi-Fi Direct (P2P),

Soft-AP Integrated TCP/IP protocol stack

This guide is designed to help you get started with your new Wi-Fi module so
lets start

The hardware connections required to connect to the ESP8266 module are


fairly straight-forward but there are a couple of important items to note related to
power.

The ESP8266 requires 3.3V powerdo not power it with 5 volts.

The ESP8266 needs to communicate via serial at 3.3V and does not have 5V tolerant
inputs, so you need level conversion to communicate with a 5V microcontroller like
most Arduinos use. However, if youre adventurous and have no fear you can possibly
get away with ignoring the second requirement. But nobody takes any responsibility
for what happens if you do. :) Here are the connections available on the ESP8266 Wi-
Fi module:

Figure 4.20 Wi-Fi Module

When power is applied to the module you should see the red power light turn
on and the blue serial indicator light flicker briefly

With FTDI 3.3V Board (Legit)

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

On the off chance that you have a 3.3V FTDI Serial to USB board you can
begin without dread of pulverizing your new ESP8266 Wi-Fi module. Do take note of
that numerous FTDI sheets have a weld jumper to change over from 3.3V to 5V
operation so guarantee it is set to empower 3.3V operation. Here are the associations
required to empower correspondence with the module over serial:
The reason for this autonomous venture was to investigate the capacities of the
new ESP8266 remote module. The ESP8266 is an ease remote module with an entire
AT charge library. This takes into account simple joining with a Wi-Fi organize
through serial correspondence. The ESP8266 was incorporated with an ARM732bit
microcontroller on a Micro stick II advancement board. Two methods of the ESP8266
were investigated: as a station and get to point. As a station, the framework interfaces
with a remote system and peruses climate information from the web. This information
is parsed and certain measures are shown on a LCD screen. As a get to point, the ESP
has a little html site while the ARM7 32bit peruses the temperature on request from a
temperature sensor. This mode exhibits the Wi-Fi chip's capacity to have and get
information all the while. In general, the ESP8266 SOC is a simple to utilize Wi-Fi
radio that can be effectively added to most microcontroller activities utilizing the
serial convention. Equipment Design-ESP8266 The focal segment of this venture is
an ESP8266 Wi-Fi Module. This radio on chip highlights a simple to use AT order set
through a serial convention. The chip itself likewise underpins SPI correspondence; in
any case, the most widely recognized form of the module (ESP-01) and firmware is
intended for serial correspondence (Fig. 1). The ESP8266 module is furnished with a
microcontroller which permits it to work without an outer microcontroller. The ESP-
01 rendition is furnished with two GPIO pins. Some different arrangements of the
board have a bigger number of GPIO sticks and would be favored if the locally
available microcontroller is used. Another thought while selecting an ESP module is
whether breadboard similarity is required. The ESP-01 variant is not intended for such
application.

5. SOFTWARE IMPLEMENTATION

5.1 SOFTWARE REQUIREMENTS

Embedded C

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

KIEL software

5.2 KIEL SOFTWARE

Kiel compiler is software used where the machine language code is written and
compiled. After compilation, the machine source code is converted into hex code
which is to be dumped into the microcontroller for further processing. Kiel compiler
also supports C language code.

5.3 STEPS TO WRITE AN ASSEMBLY LANGUAGE PROGRAM IN KEIL

1. 1. Introduce the Kiel Software in the PC in any of the drives.


2. After establishment, a symbol will be made with the name "Kiel
uVision4". Simply drag this symbol onto the desktop with the goal that it
turns out to be simple at whatever point you attempt to compose programs
in Kiel.
3. Double tap on this symbol to begin the Kiel compiler.
4. A page opens with various choices in it demonstrating the venture
workspace at the furthest left corner side, yield window in the base and a
cinder hued space for the program to be composed.
5. Now to begin utilizing the Kiel, tap on the choice "venture".
6. A little window opens demonstrating the choices like new venture, import
extend, open venture and so forth. Tap on "New venture".
7. A little window with the title bar "Make new venture" opens. The window
requests that the client give the venture name with which it ought to be
made and the goal area. The venture can be made in any of the drives
accessible. You can make another organizer and after that another
document or can make specifically another record.
8. After the record is spared in the given goal area, a window opens where a
rundown of merchants will be shown and you need to choose the gadget
for the objective you have made.

9. The most generally utilized merchant is ARM. So tap on Atmel and now
the group of microcontrollers fabricated by ARM opens. You can choose
any of the microcontrollers as per the prerequisite.
10. When you tap on any of the microcontrollers, the elements of that specific
microcontroller will be shown on the correct side of the page. The most
fitting microcontroller with which the vast majority of the ventures can be

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

executed is the LPC2148. Tap on this microcontroller and observe its


elements. Presently tap on "alright" to choose this microcontroller.
11. A little window opens requesting that whether duplicate the startup code
into the document you have made quite recently. Simply tap on "No" to
continue promote.
12. Now you can see the TARGET and SOURCE GROUP made in the
venture workspace.
13. Now tap on "Document" and in that "New". Another page opens and you
can begin composing program in it.
14. After the program is finished, spare it with any name yet with the .asm
augmentation. Spare the program in the record you have made before.
15. You can see that after you spare the program, the predefined catchphrases
will be highlighted in striking letters.
16. Now add this document to the objective by giving a correct tap on the
source gather. A rundown of alternatives open and in that select "Add
records to the source aggregate". Check for this document where you have
spared and include it.
17. Right tap on the objective and select the principal choice "Alternatives for
target". A window opens with various choices like gadget, target, yield
and so forth. To begin with tap on "target".
18. Since the set recurrence of the microcontroller is 11.0592 MHz to
interface with the PC, simply enter this recurrence esteem in the Xtal
(MHz) content region and put a tick on the Use on-chip ROM. This is on
account of the program what we compose here in the Kiel will later be
dumped into the microcontroller and will be put away in the inbuilt ROM
in the microcontroller.

19. Now tap the choice "Yield" and give any name to the hex record to be
made "For the sake of executable" content territory and put a tick to the
"Make HEX document" alternative present in a similar window. The hex
record can be made in any of the drives. You can change the envelope by
tapping on "Select organizer for Objects".
20. Now to check whether the program you have composed is errorless or not,
tap on the symbol precisely underneath the "Open record" symbol which
is only Build Target symbol. You can even utilize the alternate route key
F7 to aggregate the program composed.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

21. To check for the yield, there are a few windows like serial window,
memory window, extend window and so forth. Contingent upon the
program you have composed, select the fitting window to see the yield by
going into investigate mode.
22. The symbol with the letter "d" demonstrates the troubleshoot mode.
23. Tap on this symbol and now tap on the alternative "View" and select the
proper window to check for the yield.

6. RESULTS

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 6.1 Identification of train in track


The above figure depicts the identification of train on the track by using the RFID
reader and the status is displayed on LCD screen, at the same time status is sent to the
mobile by using the wifi technology.

Figure 6.2 Track cleared message displayed on LCD when train went out on Track

Whenever the train is went out from the track, the clearance message is sent to the mobile
by using the RFID reader. The clearance message is displayed on the LCD screen.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Figure 6.3 Identification of Metal object by using bomb sensor

Whenever the bomb or any disposal materials are identified by the bomb detector
sensor and immediately the status is sent to the control station and also displayed on the
LCD screen in the train.

Figure 6.4 Identification of Fire using fire sensors

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

Whenever the fire incident is happen in the train due to the short circuit or any other
sources, it is identified by the fire sensors in the train and the status is sent to the control
station and also displayed on the LCD screen in the train.

7.CONCLUSION
We have implemented a Train Collision Avoidance System Using Sensors and Wi-
Fi Technology and also Detected the Fire Accidents and Bomb Blasted using Fire
sensor and Bomb Detector Sensor. It is a low cost, low in power conception, compact
in size and standalone system. In this project, train collision avoidance system has
been designed, and tested. The communication between the microcontrollers ARM
7and Wi-Fi is tested. It has been estimated that if the system is implemented in the
railways networks, train accidents can be prevented. This collision between trains is
calculated and colliding trains were alerted. By this project train collision is stopped.
Many human lives and many properties can be saved if this system is implemented.
The scenario of accident in Trains due to collision will be controlled with the help of
this project.
Future Enhancement
To track or locate the exact location of the trains. If any person or any animals are
present in the train moving track, the train automatically stopped. When the train
reaches to the nearest railway crossings the gate automatically closed.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

REFERENCES

[1] Mary Lourde R and Dushyant Khosla, Fingerprint Identification in Biometric


Security Systems , International Journal of Computer and Electrical Engineering,
Vol. 2, No. 5, October, 2010.
[2] D. Vinod kumar, Prof.M R K Murthy, Fingerprint Based ATM Security by using
ARM7, IOSR Journal of Electronics and Communication
Engineering (IOSRJECE) ISSN : 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012).
[3] Hugh Wimberly, Lorie M. Liebrock, Using Fingerprint Authentication to Reduce
System Security: An Empirical Study, 2011 IEEE Symposium on Security and
Privacy.
[4] Kumar Chaturvedula, RFID Based Embedded System for Vehicle Tracking and
Prevention of Road Accidents, International Journal of Engineering Research &
Technology (IJERT), Vol. 1 Issue 6, August 2012.
[5] Gangi.Raghu Ram, N.Rajesh Babu, Tracking objects using RFID and Wireless
Sensor Networks ijesat] International Journal Of Engineering science & Advanced
technology Volume-2, Issue-3.
[6] Vishy Karri1, Daniel J.S. Lim2, Method and Device to Communicate via SMS
After a Security Intrusion, 1st International Conference on Sensing Technology
November 21-23, 2005 Palmerston North, New Zealand.
[7] Pramila D. Kamble, Dr.Bharti, W. Gawali, Fingerprint Verification of ATM
Security System by Using Biometric and Hybridization, International Journal of
Scientific and Research Publications, Volume 2, Issue 11, November 2012.
[8] Art Conklin1, Glenn Dietrich2, Diane Walz3,
Password-Based Authentication: A System Perspective, Proceedings of the 37th
Hawaii International Conference on System Sciences 2004.
[9] Zhang Jinhai, Liu Xinjian, Chen Bo, The design and implementation of ID
Authentication System Based on Fingerprint Identification, 2011 Fourth
International Conference on Intelligent Computation Technology and Automation.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi


Identification of Train Collision Avoidance based on sensor

[10] V.Ramya1, B. Palaniappan, V.Sumathi, Gsm Based Embedded System For


Remote Laboratory Safety Monitoring And Alerting, International Journal of
Distributed and Parallel Systems (IJDPS) Vol.3, No.6, November 2012.

Department of ECE, Priyadarshini Institute of Technology, Tirupathi

You might also like