Monday, February 6, 2023
HomeElectronicsSuperior Visitors Violation Management and Penalty System

Superior Visitors Violation Management and Penalty System

Remark errors or corrections discovered for this circuit, and get the possibility to win huge!

Utilizing radio frequency identification (RFID) expertise, this mission goals to create an clever site visitors system. It’s developed and operated in such a method that fines are tracked independently. RFID expertise, passive tags, a processing unit (pc), and a communication system had been all utilized with low-cost tools. The primary stage is represented by information assortment by way of RFID, which scans any identifiable tag related to automobiles. Following that, information is distributed to the server over the web community connection methodology.Fashionable expertise is all the time enhancing with a view to make folks’s every day duties simpler. One of many main points dealing with growing cities is site visitors administration, which is exacerbated by growing inhabitants density and automobile numbers with out increasing metropolis highways. This research demonstrates that growing a site visitors administration system utilizing the Web of Issues (IOT) is doable and cheap.


In India, the variety of autos has expanded dramatically, which has resulted in a rise in site visitors accidents. The federal government has taken quite a lot of makes an attempt to scale back these accidents, however these initiatives have repeatedly failed, and residents’ violations of site visitors legal guidelines have escalated.  One side of the cooperation is the imposition of penalties for people who break site visitors legal guidelines, significantly sign jumps. The idea supplied on this title will assist to scale back street accidents and avoidance.

Fig 1.1: Overview of embeddedsystem
Fig 1.1: Overview of embedded system

Implementation stream

Stage 1

Contemplating the issues of current strategies and giving answer to that downside by contemplating the essential necessities for our proposed system

Stage 2

Contemplating the {hardware} requirement for the proposed system
For this we have to choose the under elements:
1. Microcontroller
2. Inputs for the proposed system
3. Outputs

Stage 3

After contemplating {hardware} necessities, now we have to try the software program necessities. Based mostly on the microcontroller we choose there exists completely different software program for coding, compiling, debugging. We have to write supply code for that proposed system primarily based on our necessities and compile, debug the code in that software program.

After finishing all the necessities of software program and {hardware} we have to deliver each collectively to work our system. For this we have to burn our supply code into microcontroller, after burning our supply code to microcontroller then join all enter and output modules as per our requirement.

Imaginative and prescient-based real-time site visitors accident detection

The creator presents a vision-based actual time site visitors accident detection methodology. The creator intends to extract foreground and background from video photographs utilizing the Gaussian Combination Mannequin (GMM) to detect autos; afterwards, the detected autos are tracked primarily based on the imply shift algorithm. Then the three site visitors accident parameters together with the modifications of the autos place, acceleration, and the route of the shifting autos are gathered to make the ultimate accident choice.Visitors police contact the site visitors violator. [2].

Actual time site visitors accident detection system utilizing wi-fi sensor community

The target of this paper is to create a Actual Time Visitors Accident Detection System utilizing Wi-fi Sensor Community and RFID Applied sciences. Sensors put in in a automobile are used to detect the accident’s location, automobile’s pace and the variety of passengers within the automobile. Based mostly on the alert sign, the monitoring station tracks the situation the place the accident has occurred and directs alert to the authorities involved. This may be carried out through the use of embedded board, wi-fi module and RFID tags. Sensor is put in to detect the automobile particulars, if it failed there isn’t a to get the accident automobile particulars. [7] [4].

Proposed System

On this mission we current an clever site visitors violation detection and site visitors stream evaluation system to watch and measure pink mild leaping with RFID expertise.

4.1 Technique used

If any automotive passes the cease sign, the reader will learn the tag that violated the rule and can retrieve its data from the database. This mission is meant to ship an clever site visitors system utilizing radio frequency identification (RFID) expertise.

It’s designed and carried out in a method the place fines are autonomously registered. Low-cost tools has been used reminiscent of RFID expertise, passive tags, processing unit (private pc), and a connection system. First stage is represented by accumulating information utilizing the RFID, the place it reads any recognized tag that connected with autos. Subsequent, a sure information is transmitted to the server utilizing web community communication system[9].

4.2 Technique Overview

Fig 4.1: Block diagram of proposed system
Fig 4.1: Block diagram of proposed system


• Raspberry pi 3
• RC522 RFID Reader
• Webcam
• Raspberry pi OS(desktop), which is put in utilizing NOOBS.
• PHP Net Server scripting language that’s embedded in HTML.

{Hardware} Necessities

5.1 Raspberry Pi

The Raspberry Pi 3 Mannequin B is a single-board pc developed by the Raspberry Pi Basis. This board consists of a 1.2Ghz 64-bit quad-core ARM processor and an 802.11n Wi-fi LAN, Bluetooth 4.1, and Bluetooth Low Vitality

Fig5.1: Raspberry pi
Fig 5.1: Raspberry pi

Raspberry Pi-3 Pin Configuration

Broadcom BCM2837:

It’s a 1.2GHz 64bit ARM quad-core Cortex A53 processor, with 512 KiB shared L2 cache, dual-core VideoCore IV GPU @ 400 MHz supporting OpenGL ES 2.0, hardware-accelerated OpenVG, and 1080p30 H.264 decode.

GPIO (general-purpose enter/output) pins

Fig5.2: Raspberry pi Pinout
Fig5.2: Raspberry pi Pinout

RC522 RFID Module

The RC522 is a 13.56MHz RFID module that’s primarily based on the MFRC522 controller from NXP semiconductors.

Fig 5.3: RC522 Pin Configuration
Fig 5.3: RC522 Pin Configuration

The module can assist I2C, SPI and UART and usually is shipped with a RFID card and key fob. It’s generally utilized in attendance techniques and different particular person/object identification applicationsas proven within the fig:5.3& fig:5.4.

Desk 5.2: RC522 Pin description

5.2 LCD

It’s one form of digital show module utilized in an in depth vary of purposes like numerous circuits & gadgets like cellphones, computer systems, TV units, and many others. These shows are primarily most well-liked for multi-segment light-emitting diodes and 7 segments.

5.3 Gentle Emitting Diodes (LEDs)

The LED is a particular kind of diode they usually have related electrical traits of a PN junction diode. Therefore the LED permits the stream of present within the ahead route and blocks the present within the reverse route. The purposes of LEDs used to make numerous electrical and digital tasks.

5.4 Net Digital camera

A webcam is a video digital camera that feeds or streams a picture or video in actual time to or by means of a pc community, such because the Web. Webcams are usually small cameras that sit on a desk, connect to a person’s monitor, or are constructed into the {hardware}. Webcam software program allows customers to document a video or stream the video on the Web.

Fig 5.3: Web camera
Fig 5.3: Net digital camera

What’s RFID expertise and the way does it work?

RFID (radio-frequency identification) is a expertise that employs electromagnetic fields to determine and observe tags connected to objects. A radio reader, a radio receiver, and a tag make up an RFID system.

RFID Reader

It’s a expertise that makes use of digital identification to verify the id, standing, and authenticity of auto information. It makes use of radio waves to speak an object determine. Every object is recognized by a serial quantity that distinguishes it from the others.This RFID reader can be utilized to trace a number of objects at a time [1].

Fig 6.1: RFID Components
Fig 6.1: RFID Elements


A Radio Frequency Identification Tag (RFID Tag) is a sort of digital tag that communicates with an RFID reader utilizing radio frequency waves. This RFID reader is steady sending radio waves, when the RFID tag is within the vary of the RFID reader it transmits the suggestions sign to the reader [3].

Fig 6.2: RFID Technology sample
Fig 6.2: RFID Expertise pattern

Within the automobile the RFID tag is positioned. A selected quantity can be given to the RFID tag, and it’ll learn with assistance from utilizing the RFID reader and it’ll detect the automobile as proven within the fig:6.2.[5][8]. The reader will ship the data to the Raspberry Pi-3 with using python software program. Raspberry pi-3 will acquire the data from the RFID reader.

Software program Necessities

Raspberry Pi OS:

Fig 7.1 Raspberry pi OS
Fig 7.1 Raspberry pi OS

IP Scanner:

Superior IP Scanner is quick and free software program for community scanning. It would can help you rapidly detect all community computer systems and acquire entry to them.

Fig 7.2: Advanced IP scanner page
Fig 7.2: Superior IP scanner web page

Supply Code

import cv2
import RPi.GPIO as GPIO
import serial
import time
import liquid crystal display
import urllib
import urllib3
import smtplib
import cv2
camera_port = 0
ramp_frames = 30
from urllib.request import urlopen
urll = ‘’#
def get_image():

retval, im = digital camera.learn()
return im
def sendemail(ms):
from e mail.mime.multipart import MIMEMultipart
from e mail.mime.textual content import MIMEText
from e mail.mime.base import MIMEBase
from e mail import encoders
fromaddr = “[email protected]
toaddr = “[email protected]
msg = MIMEMultipart()
msg[‘From’] = fromaddr
msg[‘To’] = toaddr
msg[‘Subject’] = “Alert”#
#physique = ‘discover under intrader picture’
physique = ms

msg.connect(MIMEText(physique, ‘plain’))
filename = “test_image.png”
#attachment = open(“/house/pi/Desktop/webcam/test_image.png”, “rb”)
attachment = open(“/house/pi/test_image.png”, “rb”)
half = MIMEBase(‘utility’, ‘octet-stream’)
half.add_header(‘Content material-Disposition’, “attachment; filename= %s” % filename)
server = smtplib.SMTP(‘’, 587)
server.login(fromaddr, “Chinni98”)
textual content = msg.as_string()
print (‘Sending Mail’)
server.sendmail(fromaddr, toaddr, textual content)
print (‘Mail Despatched’)
http = urllib3.PoolManager()
resp = http.request(‘GET’, url)

GPIO.setup(r1, GPIO.OUT)
GPIO.setup(g1, GPIO.OUT)
GPIO.output(r1, False)
GPIO.output(g1, False)
liquid crystal display.lcd_init()
ser = serial.Serial(‘/dev/ttyAMA0’, 9600, timeout=1)
liquid crystal display.stringlcd(0x80,”welcome”)

liquid crystal display.stringlcd(0x80,”TRAFFIC VIOLATION”)
liquid crystal display.stringlcd(0xC0,”CONTROL SYS”)

i = 0
j = 1
whereas i < 10:
GPIO.output(g1, True)
GPIO.output(r1, False)


string3 = ser.learn(12)
#print (string3)
print (x)


whereas j<10:
GPIO.output(g1, False)
GPIO.output(r1, True)
string2 = ser.learn(12)
if len(s) >0:
print (s)
liquid crystal display.stringlcd(0x80,”sndng information”)
http = urllib3.PoolManager()
resp = http.request(‘GET’, url)
liquid crystal display.stringlcd(0x80,”despatched”)

digital camera = cv2.VideoCapture(camera_port)
temp = get_image()
print(“Taking picture…”)
camera_capture = get_image()
file =”/house/pi/test_image.png”
cv2.imwrite(file, camera_capture)
print(“seize accomplished…”)
liquid crystal display.stringlcd(0xC0,”seize complted “)
del(digital camera)
liquid crystal display.stringlcd(0xC0,”SENDING MAIL…”)
sendemail(‘Visitors Vilation’)
liquid crystal display.stringlcd(0xC0,”MAIL SENT..”)
liquid crystal display.stringlcd(0x80,”TRAFFIC VIOLATION”)
liquid crystal display.stringlcd(0xC0,”CONTROL SYS”)

Benefits & Purposes

8.1 Benefits

As a result of solely site visitors lights are at the moment automated primarily based on time, the mission “Superior site visitors violation management and penalty system” is critical. Fines are manually assessed and paid in money or electronically. As a result of most people are unaware of the payment for a selected offence. Within the present system, if you’re arrested, the cops might take a bribe for a decrease sum than the precise advantageous.

  • Automated Penalty Assortment for Visitors Sign Violation.
  • Much less site visitors congestion
  • Much less losing time and gasoline.
  • Doesn’t require to be in line of sight.

8.2 Purposes

Chances are you’ll want to trace the real-time place of belongings, employees, or customers in some purposes. RFID options allow visibility in any variety of areas, whether or not you’re assessing the effectivity of employee actions, the success of a retailer flooring structure, or monitoring the situation of key provides.

Testing Outcomes

Fig 9.1: Hardware Connection
Fig 9.1: {Hardware} Connection
Fig 9.2 RFID Tags
Fig 9.2 RFID Tags
  • The {hardware} board above is related to the ability provide
Fig 9.3: Power supply to the kit
Fig 9.3: Energy provide to the equipment
Fig 9.4 Running the code
Fig 9.4 Operating the code
  • After working the code, first the inexperienced LED will glow
  • Within the code, the inexperienced mild is meant to glow for 10s.
Fig 9.5: Green LED ON
Fig 9.5: Inexperienced LED ON
  • Now scan the RFID tags on the EM-18 Reader module
  • This scanning of the RFID tags with the RFID reader when the inexperienced LED is ON represents the automobile passing the inexperienced sign
Fig 9.6 Scanning the RFID tags
Fig 9.6 Scanning the RFID tags
  • Because the crossing the inexperienced mild just isn’t the rule violation there can be no motion for this motion
Fig 9.7: Loading for 10s to turn red
Fig 9.7: Loading for 10s to show pink
  • After 10s the Pink LED glows and the inexperienced LED turns OFF.
Fig 9.8: Red LED is ON
Fig 9.8: Pink LED is ON
  • On scanning the tags on the RFID Reader when the pink LED is ON, this results in the rule violation because the automobile breaks the pink sign
Fig 9.9: Scanning the tags
Fig 9.9: Scanning the tags
  • The violation data is notified within the server
  • The digital camera is activated and the picture is captured, which may be thought of because the proof of the rule violated.
Fig 9.10: Capturing the image
Fig 9.10: Capturing the picture
  • Now the mail is distributed to the rule violator with the data within the server
Fig 9.11: Mail has been sent
Fig 9.11: Mail has been despatched

To Conclude

In consequence, we now have developed a system that may mechanically impose penalties for violations of site visitors legal guidelines, leading to extra disciplined site visitors in our nation. We anticipate that these efforts will support within the discount of many traffic-related points that trigger disruption all through the system, in addition to the discount of the variety of accidents, site visitors jams that waste our time, and air pollution to some stage. Our expertise solely displays site visitors at sign poles, however it might even be used to watch no-entry zones, one-way routes, and different areas.

Future Work

RFID defence applied sciences and purposes and use of RFID to watch and observe objects safely and securing securely within the army provide chain. RFID retail applied sciences purposes which permit retailers to enhance on shelf availability improve gross sales minimize labour prices and enhance buyer care. In healthcare, logistics, manufacturing, Prescribed drugs and many others

Okay.Geethika, Okay.V.Sreekar , .Ravi Chandrika, Okay.Mukesh Reddy Dr. N. Ashok Kumar, B.Tech 5Associate Professor, Division of ECE Sree Vidyanikethan Engineering School,
Tirupati-517102, AndraPradesh



Please enter your comment!
Please enter your name here

Most Popular

Recent Comments