ARM9 Based Embedded E-Documentation

ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1 ARM9 Based Embedded E-Documentatio...
Author: Susanna Holland
0 downloads 0 Views 409KB Size
ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1

ARM9 Based Embedded E-Documentation Sachin S. Taware, Sanjay G. Galande, Sachin D. Anap, Amruta M. Kulkarni, Mahesh D. Nirmal, T.A.More  Abstract— Among the huge population of India many people facing the headache of the government documents. Unwillingly they have to pay extra money and extra time for these documents though it is our basic right to get it free and urgent! This project is proposed to achieve the main goals of anti-corruption system for government documents needed for common people in day to day life. Our project basically includes four main parts, a fingerprint detector, ARM-9 control unit, PC with touch screen GUI and internet database station. The database (name, address, unique ID and Fingerprint etc.) and respective records (7-12 records, proof of residency etc.) of each citizen of country is recorded and stored in the database station. Using finger print identity, unique code and token amount (exceptional) user can easily get document either in visual or in printed format. Our Embedded E-documentation system is implementable for “Talhati office” at village/city level which is the ground hub of government work. By connecting all such systems over a country on a dedicated secure network with single Database station, we can easily achieve the remote access anywhere in Country. The fascinating features of this project such as quick and reliable operation, database handling and ATM like use will force this design to be spread over the country soon.

The breeze of this technology is flown in eastern countries late in 1990s. China, Japan and India consequently are the countries adapted fast for these technologies. [1] Now we can see the miracle of the same!

Index Terms—ARM9, ATM, E-Documentation, GUI, UID,

A. Theoretical Review of E-Documentation The frustration of bribe for government documents force to think us about some automated system. The idea of our project is output of all such frustrations and media awarance. Here we are going to implement a project in which the system is able to detect the unique finger print of a person who is in need of such documents and accordingly it will immediately provides the necessary documents in printed format without any payment to respective officer. This can be implemented in “Talhati office” from where we need to take many important documents like 7/12 details, agricultural area proof, proof of residence etc. These utilize fingerprint recognition technology to allow access only to those whose fingerprints are stored in database. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or key combinations to be copied or stolen, or locks that can be picked.

B. Recent trends & developments in E-documentation The US, UK, Russia and many others western countries are keeping the electronic record of citizens for their security and smooth central documentation. The United States with the help of such records implements various public development policies. Also the agriculture, government documentation, traffic control, tragedy control, security, domestic facility and population control etc. are traced by these records.[6] The main advantage of such documentation is taken by their citizens for smooth government related issues. Also their government reaches to public through the advertisements on various public machines like ATM, LED advertisement display at railway stations and airports, building based hoardings etc. [3] All these things are origin of our project idea. II. THEORETICAL DETAILS AND ANALYSIS

I. INTRODUCTION In the developing nation like India, the corruption is main economy problem. We can see the bribe taking corrupted officers and many government & private administrative peoples. The legal documents in day to day life are purposefully delayed by such people even though to get these documents on time is our basic right. Then our mind start to think somewhere that why should we pay for our right? What happen if all these system become an electronic & automated? A. Brief History The ATM machine is the most used equipment in public domain which is invented for easy money transaction and amount detailing at user side and banking section well. The Idea of very first electronics documentation for public domain is implemented in the decade 1970 in US for telephone and banking sectors. Further it is carried by most of the European countries for public domain.

158

ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1 In this project the fingerprint module will be used. It can store number of finger prints on its own memory at a time. It can be controlled through its serial port. The microcontroller ARM9 interacts with the module. You can add a fingerprint, Delete a fingerprint and identify the fingerprint. To add a fingerprint, just show the finger on the module and press the ADD key. Now the microcontroller will send the ADD command to the module and the module will add it into the memory. To delete the finger follow the same as above. To identify the finger, press the Identify button and if the finger matches then the Relay is complemented. Also the fingerprint ID is displayed over the LCD display.

C. Possibility of Implementation Our society is now well aware of ATM banking. The key features of project like smartcard and biometric person identification make this system possible to implement even at remote level. The similar procedure like ATM banking is included in the E-documentation system which will allow user to produce the confidential documents related to his/her record in hard or soft format. Also the highest security provided by biometric and unique ID will serve the purpose to avoid the misuse of such important documents. Block Diagram and Description D. Block diagram description The E-documentation system consist of four modules, each of these is function dependant and interconnected to each other to form a complete system. Each module has its own significance thus need to be work synchronously with another one. The system is divided into following parts. 1) User Identification module 2) ARM-9 Control module. 3) GUI and Printing module. 4) Networking module. Each of the above consists of one or more than one electronic subpart that will be discussed in detail later in this section. Before starting with detail description we should understand that E-documentation is public application of ATM subsystems and it is not an ATM machine. The far advance and smarter use of biometrics and UID concepts make it a fabulous user friendly system. The key advance feature of automated working increases its applicability and intensive use at user end. Let we discuss each module of E-documentation system in detail.

B. Analytical review of E-Documentation When the code assigned to particular matched fingerprint is given to the PC via serial communication; the PC software made in VB/oracle will automatically open the personal account of detected person. The low cost touch screen is available on monitor screen, by selecting the particular option related to whatever document we need it will display on the screen. If we want to print this document then print command will also be available for each account. In short our system is fully automated anticorruption embedded documentation system using finger print identification. Since media is the main weapon of public awarance, the helpful features of networking to display advertisements and schemes from government side definitely fascinate our social system to think of its implementation.

E. User Identification module The User Identification module (UIM) is the basic man machine interface which is used to trace the identity of the user and provides a secure access to important government documents. Since each person who needs documents should not conflict with identity of another person each of them needs unique identity. The identity of the person in our system is decided using two basic signatures, one is figure print and another is unique identification number provided to each person. F. Biometric Identification using Finger print module The figure print detection module is the basic important module for user identification which generates the binary data by scanning the finger print loops. Fingerprint of any two persons cannot be same at anytime, anywhere and anyhow! Thus the unique biometric identity of a person differentiates it from other humans. The biometric fingerprint system scans and stores large amount of fingerprints by assigning them a unique ID number. Also the data related to each finger can be serially accessed to processor for further operation.[5]

Fig.1: Block diagram of E-documentation system. 159

ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1 G. Unique Identification (UID) using smartcard The ARM9™ processor family enables single processor solutions for microcontroller, DSP and The UID is the number assigned to each of the user Java applications, offering savings in chip area and which is non-transferable and unique.[6] The 16-digit UID complexity, power consumption, and time-to-market. The consist of a smart chip. Multi-factor and proximity ARM9 DSP-enhanced processors are well suited for authentication can and has been embedded into smart cards applications requiring a mix of DSP and microcontroller to increase the security of all services on the card. For performance. example, a smart card can be programmed to only allow a contactless transaction if it is also within range of another H. GUI and Printing module device like a uniquely paired mobile phone. This can After confirmation of authentication of user the data significantly increase the security of the smart card. access simply by touch to the panel with glass window is Governments gain a significant enhancement to the provided in E-documentation system. The GUI is provision of publicly funded services through the increased displayed on the touch screen module which is connected security offered by smart cards. to PC. Touch panel provides the mouse click access to the These savings are passed onto society through a user without delay.[4] reduction in the necessary funding or enhanced public services. I. Networking module Individuals gain increased security and convenience The fingerprint and UID signature is compare online when using smart cards designed for interoperability with the server database and if match is found then the between services. For example, consumers only need to access bit becomes active. The option window will be pop replace one card if their wallet is lost or stolen. up which will show various options to the user as Additionally, the data storage available on a card could mentioned above. The documentation may either in soft contain medical information that is critical in an format or there will be certain option to get these into hard emergency should the card holder allow access to this. copy format. The scanned copies of all these documents Today’s smart card with ferroelectric memory and advance with necessary signature of authorized officer are recording technique can store data up to 256KB. In our previously uploaded onto the account of the respective system 16 digit data is stored. The distribution of all 16 user. Networking module consists of client PC connected digits will be as follows. with server at village level, Taluka level, district level, 1) 1-digit: security bit. state level and finally at country level by internet line for 2) 5-digit: User code. government purpose which is dedicated, high security 3) 2-digit: Village/city code. leased line passing through large number of encryption 4) 2-digit: Taluka code. standards. Such a high level networking is used for 5) 2-digit: District code. E-documentation system. Also an extra backup server is 6) 2-digit: State code. provided to back up all the data during failure of any of the 7) 2-digit: Country code. server. Our system works more likely an email account, i.e. Using this ID any user can be identified easily if this if authentication is found the user account gets open and 16-digit code is matched with fingerprint data-code. various options for which we already stored database and H. ARM-9 control module attachments pop ups. Using touch panel user can select necessary document, it first displayed into visual format In our system ARM control module plays a vital role and then print online option provided to that particular data since it is the heart of all data processing structure. Here, may use to get data into hard copy format for free. Also at we use ARM9 centrally to compare the fingerprint data and the corner or bottom or by using separate option, various code assigned to it with data code coming serially/parallel government policies can be shown to user as an from smart card sub-module. If the match is found, the user advertisement. This type of networking is possible using is authenticated and will be allowed for further access of simple HTML protocol. E-documentation system. ARM-9 is an ARM architecture 32-bit R III. SOFTWARE ARCHITECTURE AND ALGORITHMS ISC CPU family. With this design generation, ARM moved from a von Neumann architecture (Princeton A. Control Flow Diagram architecture) to a Harvard architecture with separate The large class of application having following instruction and data buses (and caches), significantly characteristics requires control flow modeling. The increasing its potential speed. Most silicon chips application those are driven by events rather than data. The integrating these cores will package them as modified application those produce control information rather than Harvard architecture chips, combining the two address reports or display. The application those processes buses on the other side of separated CPU caches and information in specific times. tightly coupled memories. 160

ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1 C. Working of System India is a developing nation, but the corruption is main problem in front of us. We can see the bribe taking corrupted officers and many government & private administrative peoples in day to day life. Even the legal documentation needed in day to day life is also purposefully delayed by such people even though to get these documents on time is our basic right. Then our mind tries to think that why should we pay for our right? If all these system become an electronic & automated then what happen? Here we are going to implement a project in which the system is able to detect the finger print and unique ID of a person and accordingly it will immediately provide the necessary documents in printed form without any payment to respective officer. This can be implemented in “Government office” from where we need to take many important documents like Cast Certificate, Nationality, Income Certificate, 7/12 details, Agricultural area proof, Proof of Residence etc. 1) We have to collect all information about each parson with its Fingerprints stored into a database then this system is to be displayed in the public where anyone can easily access the system. 2) When a user have desire to take his nationality certificate then he just had to touch his thumb on thumb Detector. If you are authorized then user enters in system and shows his Certificate titles. If user unauthorized then user not enter in database. 3) In this project the fingerprint module from Physical Biometrics is used. It can store up to 200 finger prints on its own memory. 4) You can Add fingerprint, Delete fingerprint and Search operation can performed on it. To add a fingerprint, just touch the finger on the module and press the ADD key. Now the microcontroller will send the ADD command know this finger add into Database. To delete the finger then go to Database and remove the fingerprint same as search. This authority provide by only Administrator not user. 1) These utilize fingerprint recognition technology to allow access to only those whose fingerprints you choose or only authorized user. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked. 2) The code assigned to particular matched fingerprint is given to the Database. the software made in java will automatically open the personal account of detected person. 3) The low cost touch screen is available on monitor screen, by selecting the particular option related to whatever document we need it will display on the screen. 4) This project will help for better communication between government schemes and people. 5) Show Government scheme’s available for that user. 6) If we want to print this document then print and cancel command will be available for each account.

Fig.2: Control Flow Diagram for SPI&TOPS system

B. Sequence of process flow Sequence charts for scenarios help to identify the different participants in the action & their interaction as well as show sequence of events. it shows the sequential representation of the system work. Sequence diagram emphasize visualizing the allocation of responsibility. It is easy to shift task sideways. It shows the Dynamic view of system.

Fig.3: Sequence diagram for overview of SPI&TOPS

161

ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1 D. Front end and Back end design

IV. ADVANTAGES AND FUTURE SCOPE

A. Front End

A. Advantages of the E-documentation System 1) All data records are keeping digitally and Provide certificate in Digital format. 2) This project will help for better communication between government schemes and people. 3) Somehow corruption will be controlled.

On the front end side Java software is used. It provides the tabular information. This helps in providing the Government office in a sophisticated fashion. The Java code are embedded in a single page. Before the actual coding, all the required name space and libraries required for the code are called in using an import statement.

4) Time will be saved for long Government procedures. 5) Nations safety will be increased due to unique ID. 6) Thumb impression will provide more safety to each account. 7) Documentation is easier than existing system. 8) Reduce Human resources and Save time. 9) Record keeping is much easier than existing system. 10) Data is easily accessible for the users. B. Challenges in front of E-documentation system 1) Collection of data and its storage across the country. 2) Database management and security. 3) High speed dedicated networking. 4) Awarance about E-documentation C. Future scope E-documentation system can be an advance system which may implemented for the detail documentation of the citizens like, birth certificate, online results, college/school registration, and university registration, medical database storage, criminal report storage, cast certificates etc. Also, agriculture related government schemes can be easily be reached to the farmers V. CONCLUSION

Fig.4: Sample option form format design

The government documents are most important and frequently used things in day to day life. Hence a large number of users needs authorized certificates so that they can access certificate digitally and can easily get hard copy of certificate. The existing electronics storage systems are complicated and not reliable to handle such huge amount of data. Managing all this stuff and saving all the data is very difficult task. So we are going to develop an e-documentation system for government documentation.[2]Which will provide the easy and fast access to government documents with higher security by biometric and UID authentication. This project will definitely help to reduce the corruption in government offices. Also, this will be the best interface between government policies and public.

B. Back End Microsoft Access is used as the back end where the tables are created on the database. There are two tables, one for registered user table and information table. The structure of the field and data type is provided in the table design. An authenticated access is provided to the database. All the information given when a new user signs up is captured in this database. Whenever the user logs in, the credentials are authenticated with the server and ensure further progress to the other pages. Users are managed using the enterprise manager in Microsoft Access.

162

ISSN 2249-6343 International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 1 E-documentation is easier than existing system and reduced human resources as well as time and money saving will make it most fascinating system soon. REFERENCES [1] “E-Governance Strategy in India” White Paper, by Sameer Sachdeva, Dec 2002, pages 1 to 35. “E-Governance and Best Practices”, Survey paper by government of India, Annex 6.3.1,year 2008 helps to understand the concept and regional limitations on E-governance in India. [2] “E-Governance in India: Dream or reality?” By Mrinalini Shah, International Journal of Education and Development using Information and Communication Technology (IJEDICT), 2007, Vol. 3, Issue 2, pp. 125-137. [3] “ATM terminal design is based on fingerprint recognition”, By Yun Yang & JiaMi, 2010 2nd International IEEE Conference on Computer Engineering and Technology, paper code 978-1-4244-6349-7. [4] Raza, V. Hugue, “Application of Touch Screen technology”, IEEE Trans. Technology, February 1999. [5] B. J. Shin et al., “Design of Thumb Detector, IDEC Conf. 2002. [6] “Promoting E-Governance”, Government Of India, Second Administrative Reforms Commission, Eleventh Report, December 2008.

Prof. Taware Sachin S. working as a lecturer in dept.of E&TC at Pravara Rural Engineering College, Loni does his PG in Embedded and VLSI and working on the research entitled Embedded E-documentation and Magnetic Resonance Cavity.

Prof. Galande Sanjay G. working as a Asst. Professor & PG coordinator in dept.of E&TC at Pravara Rural Engineering College, Loni does his PG in Power Electronics and working on the research entitled Embedded E-documentation. Prof. Anap Sachin D. . working as a lecturer in dept.of E&TC at Pravara Rural Engineering College, Loni does his PG in Embedded and VLSI and working on the research entitled Embedded E-documentation. Prof. Kulkarni Amruta M. working as a lecturer in dept.of E&TC at Sir Vishveswaraiya Institute of Technology, Chincholi (Nasik) doing his PG in Embedded and VLSI and working on the research entitled Embedded E-documentation. Prof. M. D. Nirmal, Department of Computer Engg. PREC Loni 6

Tukaram A. More working as a Snr. Lecturer in dept.of E&TC at Pravara Rural Engineering College, Loni does his PG in Digital Electronics.

163

Suggest Documents