TITLE RFID FOR EDUCATIONAL INSTITUTIONS AND OFFICES.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Welcome to the Radionet Monitoring Secure-Com Presentation.
Wireless network Usually use Radio Frequency (RF) technology Adv :
People Identification Construction siteManufacturing Customer Identification for better QoS Integrated vehicle and driver identification People Tracking.
Your Fleet Management Solution OSHA Logbooks Your vehicle sends information automatically to your password protected Internet Site. From your computer,
RFID & III API MENA IUG 3rd Annual Meeting November 18 – 19, 2008 American University of Sharjah United Arab Emirates Huguette Yaghmour Director of Library.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID passports How does is work? Step by step By: Einav Mimram.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
1 INTRUSION ALARM TECHNOLOGY WIRELESS SYSTEMS. 2 INTRUSION ALARM TECHNOLOGY Wireless systems use radio frequencies (RF) to connect sensors to the control.
Computer Networks IGCSE ICT Section 4.
Chapter 8 COMMUNICATION AND COMPUTER NETWORK
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
WLAN. A wireless LAN, or WLANLAN WLAN, is a local area network that does not have wired Ethernet connections. A WLAN can be either an extension to a current.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Communications & Networks
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
CDMA WIRELESS DATA TRANSMITTER By Vijay kumar kintali B.tech 7 th semester Regd no:
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Data and information. Information and data By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Radio Frequency Identification
TIU Tracking System Introduction Intel's large and complex validation labs contain many Testing Interface Unit's(TIU) used in validating hardware. A TIU.
ICT in Education. Use of computers for school / college administration Schools and colleges employ staff, pay for goods and services, keep records of.
Describe direct data entry and associated devices, e. g
Database Use and Structure
AUTOMATED STUDENT ATTENDANCE SYSTEM
The Emergence Of XBee In Building Automation And Industrial Control
Radio Frequency Identification (RFID)
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Payroll Management System
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
TIU Tracking System Introduction Intel's large and complex validation labs contain many Testing Interface Unit's(TIU) used in validating hardware. A TIU.
Unit 1 Understanding computer systems: How to work with information and data to meet specific business needs OCR Cambridge Nationals in ICT Level 1/2 ©
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Group #15 Matt Frank Russell Geschrey.  This project was chosen because of an interest in wireless communication systems, namely BAN's (body area networks)
Ubiquitous means ‘everywhere’
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
Top Electronics Projects Ideas For Engineering Students.
ICT Unit 4: Network and the effects of using them
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Radio Frequency Identification composition - implementation – vision
By: Tarun Sharma Chinta Rahul SCSE VIT University
XBee Based Industrial And Home Security System
PARKING AUTOMATION SYSTEM
CMS:Children Monitoring System
Administrative Practices Outcome 1
AUTOMATED STUDENT ATTENDANCE SYSTEM
Radio Frequency Identification (RFID)
Rhetorical SITUATION We are at a convention for Canadian retailers, transportation brokers and yard management companies. I am a representative from.
RAILWAY TRACK SNAP NOTIFICATION
RADIO FREQUENCY IDENTIFICATION
OCR GCSE ICT Data capture methods.
Databases.
Sunnytek sensor networks
Progress leisure OCR GCSE ICT.
Introduction: The Electronic Toll Collection (ETC) is a technology that permits vehicles to pay highway tolls electronically. E-Z Pass is the nation’s.
RFID based attendance system using GSM BY MAMATA YADAV.
Presentation transcript:

TITLE RFID FOR EDUCATIONAL INSTITUTIONS AND OFFICES

STUDENTS INVOLVED  SANDEEP S  RAKSHITH N  VINAYAKA D J

CONTENTS  Foreword  Rfid readers and software  RFID FREQUNCIES  RFID tags  Concept and working  Granting of attendance  Id card  Sources  conclusion

FOREWORD RFID FOR EDUCATIONAL INSTITUTIONS AND OFFFICES The aim of the project is to develop an RF based ID system for use in schools and colleges. This system can also be used in companies. Here as it is used in college campus, there is no restriction of students, they can move around freely in the campus and any student wearing the tag must be tracked inside the campus. There will be multiple readers employed in every class and labs of the college so that whenever a student enters or leaves the room/lab, a note is made.

RFID READERS AND SOFTWARE RFID READER  RADIO FREQUENCY TRANSMITTER AND RECEIVER  CONTROLLED BY MICROPROCESSOR  CAPTURES DATA FROM RFID TAGS AND PASSES DATA TO COMPUTER THROUGH ANTENNASOFTWARE  SPECIAL SOFTWARE TO CONVERT RADIO WAVES INTO LOGICAL TERMS

RFID FREQUENCIES  TAGS AND READERS MUST BE TUNED INTO SAME FREQUENCY.  RFID SYSTEMS CAN USE VARIETY OF FREQUENCIES TO COMMUNICATE  HIGH FREQUENCY RFID SYSTEMS (850MHz-950MHz) AND (2.4GHz-2.5GHz) OFFER TRANSMISSION RANGES OF MORE THAN 90 FEET

RFID TAGS  PASSIVE RFID TAGS HAVE NO INTERNAL POWER SUPPLY.  ANTENNA IS DESIGNED TO COLLECT POWER FROM INCOMING SIGNAL AND ALSO TO TRANSMIT POWER  TAGS ARE SMALL  READ DISTANCES OF ABOUT 10cm-FEW METERS  TAGS MUST HAVE MORE THAN 10KB OF STORAGE The advantage of passive tag is that we don’t need a battery unlike the active tag.

CONCEPT  A represents the reader. C and D represent the sensors.vice versa is also possible  You can have more than one entrance in order to avoid the queue.  The sensors work as explained. They send signals of very high frequency from C to D.  When a person enters the classroom\entrance, the tag sends frequency to D. If the student belongs to the class (college), he/she will be granted attendance. Otherwise, an alarm will be sounded.  Only one person can enter the classroom\ENTRANCE at a time.The process is very fast.  It has to be noted that one security guard must be present at the college entrance ONLY.

Here are some of the possible scenarios. The following things takes place in the entrance of the college ( The rfid tag gets charged only with the help of the readers.Afterwards it sends the signals to the sensor and to the reader.) Case 1: With valid ID card: If the student enters with valid ID card, part D receives different signals and it allows the reader to communicate with the tag. This process will take place in a fraction of a second. Case 2: Without valid ID card: When a student enters without a valid ID card, the sensor D receives signals and checks it. Thus the alarm will be sounded. Case 3: Without any ID card: When the student enters without any card, the sensor D either receives feeble signals or no signal from C. Thus the alarm will be sounded. Case 4: With Two ID cards: The sensor D receives two signals and thus an alarm will be sounded

Case 5: Tampered ID card: In case the ID card is broken or not working, the student must inform the security at the entrance so that he will provide a temporary ID card. The person controlling the server must be informed so that the temporary card will be activated. Thus attendance will be provided for the student. For monitoring the position of the student, the register number of the student is entered in the software, the live information regarding the position of the student will be shown. There are three softwares registered in the machine:(or it can done in the server,computer ) To collect the data. To process the data(attendance) To monitor the student’s whereabouts. Note: The machines at the entrance of classrooms and campus will have readers and sensors. But in the remaining places of the campus, only readers will be installed. The servers store information like name, USN numbers, address, code of the tag, telephone number, photo, blood group, etc.

Implementation of Readers: Along the corridors, a reader will be installed for every 10m. It must cover the range of 5m. Care must be taken so that the readers do not interfere with each other. It is better to use Linux based system as it is inexpensive and we can change it according to our satisfaction and requirements. Rfid readers and sensors need 24 hrs power backup.If you are environment conscious you can use solar power or you can use normal power supply,ie 240v power supply.

WORKING Brief concept

GRANTING OF ATTENDANCE When a student enters the classroom, the sensors will detect and the reader will note the time and will grant attendance to the student. The reader will also not the time if the student walks out of the class. Attendance will only be granted if the student stays in the class for a minimum of thirty minutes. When the student enters the canteen, attendance will not be given but the reader will only gather the where about of the student for live monitoring. If a student or faculty or any other member of the college enters, the machine will not sound because the software is designed to suit it. At the college entrance, only monitoring is done, no attendance will be taken. Attendance will only be taken in the classroom and labs. Detailed design

The data collected regarding the attendance and the position of the Student is kept in the computer.It can be accessed via computer, Mobile phone.What must be done is that go to the site and just type The roll number of the student or the employee of a company. Instantly the position and attendance of the student or the employee is given in the case of a company. With our project the teachers need not take the attendance of the Students and is a paperless work.you save a lot on paper work. We need not take the attendance of the teachers,working staff manually, as they have their own Id cards. The process is efficient,streamlined and fast.It is very accurate and the scope for errors is very less.

RFID ID CARD A: Photo of the student. B: Hole to insert the plastic wire. C: Name of the student. D: Address with telephone number of the student. E: Blood group of the student. F: Details of the college Inside the card the tag Is present

SOURCES OF INFORMATION GOOGLE WEBSITE htm htm A BOOK CALLED ``PRINCIPLES OF RFID``

CONCLUSION  We have tried to install technology wherein a student cannot misuse the card. The developed technology should be able to eliminate malpractices such as giving proxy attendances. We are and will be committed to further work on the project to install better technologies in the future. We will try to install more features and develop new soft wares. We have made a conscious effort to reduce the cost of the project.