Attendance Management

Published on January 2017 | Categories: Documents | Downloads: 30 | Comments: 0 | Views: 401
of 5
Download PDF   Embed   Report

Comments

Content

International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012

ADVANCED STUDENT TRACKING SYSTEM
First Author Name: V.Mareeswari
. Associate Professor, Department of Information Technology ,Sri Manakula Vinayagar Engineering College,Pondicherry E-mail ID: [email protected]

Second Authors Name: B.Dhinesh Kumar, K.G.Surendar, R.Vimal
Student, Department of Information Technology ,Sri Manakula Vinayagar Engineering College,Pondicherry E-mail ID:[email protected],[email protected],[email protected]

ABSTRACT The embedded technology is now in its peak and its uses are mind blowing. Embedded technology plays a vital role in integrating various functions and thus it reduces man power, saves time and operates efficiently without human intervention. RFID is a new technology and takes a major role in the embedded system. This project describes about design and Implementation of Advanced Student Tracking System. It is designed to track the movement of the students within the college campus as well as automatic Attendance monitoring without human intervention using RFID technology. The proposed system has hardware and software components. The hardware architecture consists of an RFID active tag, RFID transceiver, systems interconnected and database server. The transceiver is distributed around the open area within specific limits. The tags which are given to students consist of unique id on it which cannot be duplicated. The PC can be connected to the transceiver to read the tag id .Software architecture COMM program, an Application Programming Interface (API) that handles and analyses the data, a friendly GUI and a database that saves as well as retrieves all the student information. General Terms Active tags, Passive tags, RF Readers, Local server, Backend system (Master) Keywords Radio Frequency Identification, Authentication, Tracking system, Graphical User Interface. INTRODUCTION Our project Domain is Wireless Network and we are working on connecting a Wireless Network to a Centralized Server via RFID. RFID is abbreviated as Radio Frequency Identification. It is a wireless technology. It is a technology that uses communication through the use of radio waves to transfer data between a reader and an electronic tag attached to an object for the purpose of identification and tracking. Radio Frequency Identification can be in the form tags or chips. Based on it Radio Frequency Identification is generally of three types:    Active Passive Semi-Passive

Active - An active has its own transmitter and a power source to power the microchip’s circuitry and broadcast signals to an RFID reader. The power source is either connected to a powered infrastructure or uses energy stored in an on-board battery. Active tags are usually very costly.

ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology

International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012

Passive - A passive do not have its own power source and scavenges power from the electromagnetic fields generated by readers. A passive tag also has an indefinite operational life and relies on reflecting back the electromagnetic (EM) field generated by the reader and modulating the reader’s EM incident on the antenna to send information back. Semi-Passive - A semi-passive is an RFID tag that has a battery but communicates with a reader using back scatter, like a passive tag without a battery. The battery is usually used to power a sensor, and to run the circuitry on the chip. Semi-passive tags have longer read range than ordinary passive tags. The external construction of RFID tracking system has the following three main components:    Tags Readers Backend system

TAGS - Tags are otherwise called as labels. It are attached to the objects. It consists of Integrated chip(IC) which are used to store the information about the objects to which the tags are attached as an electronic code .The antenna communicates with the tags via the radio waves. When a tag passes through an electromagnetic field generated by a reader, the tag communicates back to the reader the identifying information. The data stored in the tag is usually referred to an Electronic Product Code (EPC).This EPC is a unique identification code for identifying the objects. READERS - The complexity, configuration and function of the readers, also called interrogators, depend on the application, which can differ quite considerably. However, in general, the reader’s function is to generate an electromagnetic (EM) field to power tags and facilitate communication with tags. RFID readers communicate with tags using a radio frequency interface. BACKEND SYSTEMS - The Backend Systems is used as a Centralized Server. It gets the request from the client and then sends the electromagnetic waves to the reader, the reader then sends the electromagnetic waves to the tags. Thus the tag which has the information about the object sends the information about the requested objected to the reader and the reader in turn sends the info to the backend systems. EXISTING SYSTEM We made a survey on various tracking systems that are being employed for the purpose of tracking the goods and tracking the children within a specific limit. The existing system present for the purpose of human tracking is Mobile RFID Tracking System. This system is designed to track a moving child in a limited area, such as a park or mall, using RFID technology.

Fig:1 active tag in the form of wrist-band

ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology

International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012

tag readers are distributed around the open area, e.g. park. The tags are programmed with kid’s profiles and are worn by the kids. Communication between the tag reader and the web server done via wireless LANs.

The

Fig:2 simple demonstration of Mobile RFID Tracking System

PROBLEMS IN EXISTING SYSTEM The major problems in the Mobile RFID Tracking System are as follows:     The system is designed only for the children with specific age limits In this system single rfid tag is used by many users frequently and hence there will not be any type of privacy constrains involved here This system is exists only for limited area This system will be employed only to spot and to trace the movements of the users within a specific limits e.g. Park , Shopping Mall ,etc.,

SOLUTION Our proposed system deals with the construction of wireless network and connecting it to a centralized server for the purpose of effective human via wireless LAN. Here our system is generally designed for the purpose of tracking the students within the institution .This system’s software architecture concentrates on both in the establishment of the network and to produce the output which shows the location of the individual through GUI and the information about the individual is also been published. The main motto of using RFID in our project is Tracking or Traceability. Traceability is nothing but to track the current position of the object and by doing so we can trace the past history about the movement of object and also we can predict the future movements of the object.

Fig:3 active RFID tag used in our system

ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology

International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012

The following are the major advantages of our proposed system:  This system has higher performance rate than the existing system  Since each individual will have their own rfid tags data privacy will be maintained.  These system also consist of the application like automated smart attendance system and also the system which is used to spot the students who leaving the college campus during the college hours. CONCLUSION Since our system uses the external type of RFID it lacks in some part of authentication and hence we have found the system which uses an internal type of RFID called the RFID666 which provides cent percent authentication. The special feature of this system is    The chip here used is an internal rfid chip It will of small in size say 11mm and can be easily embedded into the internal part of the human body without causing harmful effect and hence no way of malfunctions can be done. This system has high data rate and long range of transmission since the RADAR is been used in the system instead of transceiver.

Fig:4 internal type of RFID chip

APPLICATIONS This system can be employed in various fields like:      Education Human Resource Banking Food Processing Forensic

ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology

International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012

REFERENCE PAPERS [1] Kideok Cho, Sangheon Pack, Ted ‘Taekyoung’ Kwon and Yanghee Choi1 “An extensible and ubiquitous RFID management framework over next-generation network”,International Journal Of Communication Systems,2010 [2] A.R. Al-Ali, Fadi A. Aloul, Nada R. Aji, Amin A. Al-Zarouni, Nassar H. Fakhro, “Mobile RFID Tracking System”, Computer Engineering Department, American University of Sharjah,UAE . [3] LIONEL M. NI and YUNHAO LIU, “LANDMARC: Indoor Location Sensing Using Active RFID” , Wireless Networks 10, Pg.701–710, 2004 [4] YanboWu · Damith C. Ranasinghe · Quan Z. Sheng · Sherali Zeadally · Jian Yu,“ RFID enabled traceability networks: a survey”. Springer Science+Business Media, LLC 2011 [5] Phuoc Nguyen Tran and Nadia Boukhatem, “IP-based RFID Location System”, Radio Frequency Identification Fundamentals and Applications, Bringing Research to Practice, Book edited by: Cristina Turcu, ISBN 978-953-7619-73-2, pp. 278, February 2010. [6] Chia‐hung Huang, “An Overview of RFID Technology, Application, and Security/Privacy Threats and Solutions"Scholary Paper,Spring 2009, [7] Ms. C. Divya, “A Study on Comparing the Performance of Low Cost RFID Authentication Protocols”. 2010 IEEE International Conference on Computational Intelligence and Computing Research. [8] Yanjun Zuo, “Secure and private search protocols for RFID systems”., Springer Science + Business Media, LLC 2009 [9] Michael Mehta,"Global Control through the RFID Chip ", MICHAEL Journal,Pg -1,2. [10] Erik-Oliver Blass and Refik Molva, " New Directions in RFID Security," RFIDAP project,

grant reference ANR-07- SESU-009 [11] Ann Cavoukian,“Privacy Implications Information of and

RadioFrequencyIdentification(RFID)TechnologyInformation” PrivacyCommissioner/Ontario,2004

ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close