Documente Academic
Documente Profesional
Documente Cultură
RF (Radio Frequency):
Short for radio frequency, RF is any frequency within the electromagnetic
spectrum associated with radio wave propagation. When an RF current is
supplied to an antenna, an electromagnetic field is created that then is able
to propagate through space. Many wireless technologies are based on RF
field propagation.
These frequencies make up part of the electromagnetic radiation spectrum:
Block Diagram:
In this block diagram, both vehicles are equipped with RF receivers along
with microcontroller that senses the incoming data and controls the car(s)
driving parameters such as speed, horn, etc. as per the zones. The school
and hospital buildings have their own unique address that is radiated in the
air. Each RF transmitter has 100 meters coverage area that can be
extended to any amount such as thousands of meters to kilometers as per
the requirement. Each transmitter has an encoder section within for
address selection and each receiver has their decoder section or the same.
Circuit diagram:
Budget of project:
S.No.
Components
Cost
1.
RF Modules
850/-
2.
Microcntroller
250/-
3.
LCD LM016L
550/-
4.
Crystal oscillator
80/-
5.
35/-
6.
12V relays
30/-
7.
Toy car
500/-
8.
Sensors
85/-
9.
Misc.
2800/-
List of references:
1. Epcglobal inc., EPC radio-frequency identity protocols class-1
generation-2 UHF RFID protocol for communications at 860 MHz 960
MHz, version 1.0.9. Online, September 2005.
http://www.epcglobalinc.org/standards_technology/EPCglobal2UHFRFIDPr
otocolV109122005.pdf.
2. CCC-TV lightning talks day 1. Online, 2005. http://media.ccc.de/browse/
congress/2005/22C3-911-enlightning_talk_day_1.html.
3. J. H. Conway. On Numbers and Games. Academic Press, 1976.
4. Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the
Fiat-Shamir passport protocol. In CRYPTO, pages 2139, 1987.
5. B. Dolev. Laying the groundwork for electronic elections in Israel (in
Hebrew). Invited Talk, CPIIS IDC/TAU Workshop on Electronic Voting, May
2009. http://www.cs.tau.ac.il/voting/.
6. S. Drimer and S. J. Murdoch. Keep your enemies close: distance
bounding against smartcard relay attacks. In Proceedings of 16th USENIX
Security Symposium, pages 116, Boston,