Download presentation
Presentation is loading. Please wait.
Published byHugh Barnett Modified over 7 years ago
1
Development of Automatic Attendances System Using RFID Technology
By Albert Sagala*, Titus Nainggolan Tobby Sembiring, Daniel Sembiring *correspondence: International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
2
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Overview Abstract Introduction Background Research Research Question RFID Technology Design and Analysis Experimental Result Conclusion and Discussion Reference International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
3
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Abstract Currently there are many colleges that use the attendance system manually. Lecturers will spread sheet list present at the lecture. Students must affix signatures on the attendance sheet. Academic Administration will conduct a recapitulation, henceforth be given to lecturers. Some professors use the percentage of attendance as a component of the final assessment. This routine is not very effective, requires a very long time to calculate the percentage of attendance. In this study, successfully created student presence detection applications with RFID technology. Research has been successfully tested on a pilot scale project. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
4
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
RFID Technology Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFID tags are used in many industries, for example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line RFID tags are used in many industries, for example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in livestock and pets allows positive identification of animals. Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns.[2] These concerns resulted in standard specifications development addressing privacy and security issues. ISO/IEC and ISO/IEC use on-chip cryptography methods for untraceability, tag and reader authentication, and over-the-air privacy. ISO/IEC specifies a digital signature data structure for RFID and barcodes providing data, source and read method authenticity. This work is done within ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques. In 2014, the world RFID market is worth US$8.89 billion, up from US$7.77 billion in 2013 and US$6.96 billion in This includes tags, readers, and software/services for RFID cards, labels, fobs, and all other form factors. The market value is expected to rise to US$18.68 billion by 2026 International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
5
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
RFID frequency bands Signaling between the reader and the tag is done in several different incompatible ways, depending on the frequency band used by the tag. Tags operating on LF and HF bands are, in terms of radio wavelength, very close to the reader antenna because they are only a small percentage of a wavelength away. In this near field region, the tag is closely coupled electrically with the transmitter in the reader. The tag can modulate the field produced by the reader by changing the electrical loading the tag represents. By switching between lower and higher relative loads, the tag produces a change that the reader can detect. At UHF and higher frequencies, the tag is more than one radio wavelength away from the reader, requiring a different approach. The tag can backscatter a signal. Active tags may contain functionally separated transmitters and receivers, and the tag need not respond on a frequency related to the reader's interrogation signal International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
6
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
How RFID Work International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
7
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Uses The RFID tag can be affixed to an object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. RFID can be used in a variety of applications Access management Tracking of goods Tracking of persons and animals Toll collection and contactless payment Machine readable travel documents Tracking sports memorabilia to verify authenticity Airport baggage tracking logistics Timing sporting events RFID offers advantages over manual systems or use of bar codes. The tag can be read if passed near a reader, even if it is covered by the object or not visible. The tag can be read inside a case, carton, box or other container, and unlike barcodes, RFID tags can be read hundreds at a time. Bar codes can only be read one at a time using current devices. In 2011, the cost of passive tags started at US$0.09 each; special tags, meant to be mounted on metal or withstand gamma sterilization, can go up to US$5. Active tags for tracking containers, medical assets, or monitoring environmental conditions in data centers start at US$50 and can go up over US$100 each. Battery-Assisted Passive (BAP) tags are in the US$3–10 range and also have sensor capability like temperature and humidity International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
8
https://en.wikipedia.org/wiki/MIFARE
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
9
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Background Research Need for real-time monitoring of students activity Student attendance at lectures was very important session to be recorded Manually Recording was takes time Green Energy- Minimize of paper used International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
10
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Goal To generate a prototype that can use RFID technology to take the student attendance systematically based on concept wave radio. Develop a prototype of Automatic attendance system using RFID technology ID Students Will be Recorded real-time Information Send to Server Comparing eligible students to attend the class/room. A design approach to implement RFID on campus International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
11
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Design and Analysis Detect the presence of students in a classroom at a certain time, so that this information can be used as information on class attendance. The detection results are sent to the server to see whether the student's presence in the room information was correct / incorrect. Information on the student’s presence of a certain class will be verified. Automated attendance system will be designed to be able to perform the following functions: Detect the presence of students in a classroom at a certain time, so that this information can be used as information on class attendance. The detection results are sent to the server to see whether the student's presence in the room information was correct / incorrect. Information on the student’s presence of a certain class will be verified. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
12
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Design and Analysis (2) Based on Fig.2, the business process of automatic attendance should have functionalities: RFID reader was put in the corner of the room. It will work continuously to detect all student cards (tags) which pass through the RFID reader. For the device that we use, reader only detect in 10 cm. Reader will detect the RFID tag and sent the information to the server. Data received from the RFID reader will be comparing to the database schedule in the server. So, only authenticated user is available in the room. If the card detected in a room according to scheduling data, the card is considered valid, the user of the card will be detected as a course participants. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
13
Architectural design prototype of automated attendance system
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
14
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Database Design One Database with 16 Tables International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
15
TESTING ENVIRONMENT AND DEVELOPMENT
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
16
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Result International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
17
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Discussion Range Distance for RFID Reader Developing Large Scale Application Using RFID RFID Reader must support IP Connection. For easy installation of RFID, PoE should be a good option to choose. Middleware application If no ethernet, then we need driver converter, from USB Serial to Ethernet. Reader connected to Server Application via socket. Useful for multiple Reader. The reader should also be equipped with a reader application which can easily to configure the IP target server. (e.d DVR, from coaxial to ethernet) International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
18
Multi-thread Architecture
To detect all readers connected to the application, the necessary function will displays a list of all the readers on the application. After the devices name registered, middleware will form a thread based on the number of registered readers. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
19
Multi-thread Architecture (2)
Using the List Reader function to display all the readers that can be detected by the application. Using Establish Context function with looping to connect all devices to the reader application. To handle and process a lot of reader devices, needed a thread for each device. The thread that will perform the following functions: waiting for the card status (Get Status Change), connecting with the card is detected (Connect), storing data that has been detected (Save Data) and disconnects with card (Disconnect). International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
20
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Conclussion In this research, we develop a prototype of automatic attendance system using RFID Technology. Middleware application must be developed to interpret the data read by RFID reader, send it to the application developed. Application will compare the data received to decide whether the data is valid or not. In the application developed, card reader is connected to the application server via serial connection, which make difficult to implement in a large scale application. In discussion section, was elaborated the steps to be follow for implementing automatic attendance system in large application. We also found that the business process for student’s attendance system was very different with employee attendance. As employee only needs to register on entrance and exit time, contrast different with students who follow some courses session each day. The traffic will so huge, need to be filtered; only data preferred is recorded. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
21
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
REFERENCES Augusta SophyBuelet, Automatic Attendance Marking and Parent Alerting System Using RFID And GSM, (IJIRSE) International Journal of Innovative Research in Science & Engineering, ISSN (Online) C. Sai Krisha; N. Sumanth; C. Raghava Prasad, RFID based student monitoring and attendance tracking system, Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on, Year: 2013, Pages: 1 – 5. D. Eridani; E. D. Widianto, Simulation of attendance application on campus based on RFID (radio frequency identifiation), nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), Year: 2015, Pages: 460 – 463. J. Q. Azasoo; F. Engmann; K. A. Hillah, Design of RF based multithreaded RFID student attendance management information system, 2014 IEEE 6th International Conference on Adaptive Science & Technology (ICAST), Year: 2014, Pages: 1 – 5. J. Xu; H. Gao; J. Wu; Y. Zhang, Improved safety management system of coal mine based on iris identification and RFID technique, J. Xu; H. Gao; J. Wu; Y. Zhang, Year: 2015, Pages: 260 – 264. Ji-biao Li; Lei Zhang; Xin-fang Yuan, Development and realization of digitalized Campus based on Mifare-1 Radio Frequency card, nd International Conference on Education Technology and Computer, Year: 2010, Volume: 4, Pages: V V4-499. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
22
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
REFERENCES (2) M. Kohana; S. Okamoto, A System for Confirming Attendance at Work, Network-Based Information Systems (NBiS), th International Conference on, Year: 2015, Pages: 714 – 717. N. Arbain; N. F. Nordin; N. M. Isa; S. Saaidin, LAS: Web-based laboratory attendance system by integrating RFID-ARDUINO technology, Electrical, Electronics and System Engineering (ICEESE), 2014 International Conference on, Year: 2014, Pages: 89 – 94. O. Bjelica; D. Mijic, Hardware design of a reader device in RFID-based class-attendance system, Telecommunications Forum (TELFOR), th, 2012, Pages: 1068 – 1071. R. B. Kuriakose; H. J. Vermaak, Developing a Java based RFID application to automate student attendance monitoring, Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2015, Pages: 48 – 53. S. Geng; G. Li; W. Liu, Design and Implement of Attendance Management System Based on Contactless Smart IC Card, Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, Year: 2012, Volume: 3, Pages: 290 – 294. Srinidhi MB; R. Roy, A web enabled secured system for attendance monitoring and real time location tracking using Biometric and Radio Frequency Identification (RFID) technology, Computer Communication and Informatics (ICCCI), 2015 International Conference on, Year: 2015, Pages: 1 – 5. V. Cernatescu; M. Vladescu, An implementation of a MHz RFID reader, Design and Technology in Electronic Packaging (SIITME), 2014 IEEE 20th International Symposium for, Year: 2014, Pages: 103 – 104. International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
23
International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Thank you TERIMAKASIH International Conference I4CT (19-21 April 2016), Kinabalu-Malaysia
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.