UIU Smart Card
UIU Smart Card
By
November 5, 2020
Smart cards have been around for a while now. These days we see various use cases of
smart cards based on a number of different technologies, mostly in banking sectors and
in payments. Students are required to carry a separate identification card. These cards
however don’t allow the students to mark their attendance or make necessary payments in
campus. Student attendance is a one of the important issues for any educational institution
as it has shown to have an impact on the result of the students. Most of the universities in
Bangladesh still uses the outdated paper or name-calling for recording student attendance.
Moreover most of the educational institutions around the globe don’t allow the facility of
card payments in campus. Thus, there is a need to develop a system that reduces burden
in analyzing the attendance and enhance smooth functioning of educational institutions.
This report describes a brief introduction to a RFID based student smart card system that
compiles all the different aspects of a students’ in campus activities under one system.
RFID or Radio Frequency Identification is an emerging technology which brings enormous
benefits in applications where unique identification is required. With the usage of RFID
cards to identify the students uniquely, coupled with a robust web application and an an-
droid application for convenience, this system is sure to improve upon the existing methods
of attendance taking and in campus payments which would on terms greatly increase pro-
ductivity and benefit the educational institutions.
i
Acknowledgements
The completion of the project was a team effort. Hard work, determination, compat-
ibility and consistency of all the team members have made it possible. Throughout the
entire project we have received great support from both our supervisor Assistant Profes-
sor Mr. Suman Ahmmed and course instructor Professor Dr. A.K.M Muzahidul Islam.
Without their proper support and guidance we would have taken a longer time to achieve
the progress we have made so far. We also acknowledge all the researchers and the studies
they have published and made available which helped us learn a great deal about the
related topic, which have been a great help throughout the project.
ii
Table of Contents
Table of Contents iv
List of Figures v
List of Tables vi
1 Introduction 1
1.1 Project Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Research Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Project Outcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.6 Organization of the Report . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.7 Research Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3 Methodology 12
3.1 Requirements Analysis and Initial Planning . . . . . . . . . . . . . . . . . . 12
3.2 Methodology and Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3 Outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.4 Accompanying Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
iii
Table of Contents Table of Contents
6 Conclusion 30
6.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.3 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
References 33
iv
List of Figures
v
List of Tables
vi
Chapter 1
Introduction
This chapter is going to introduce the project in a systematic and brief manner by going
through the overview of the entire project first. Then the chapter will talk about the
motivation, problem statement, research objectives and expected outcomes of the project
for the ease of understanding of the readers. The organization of the report would guide
the readers throughout the entire report. And finally the research framework would paint
a rough picture about the approach taken to implement the project itself.
1.2 Motivation
Educational institutions’ administrations in our country and the whole world are concerned
about the regularity of student attendance. Students’ overall performance is affected by it.
The traditional method of registering attendance by calling names or by signing in paper
is very time consuming, not to mention inefficient as well. Moreover, students’ interaction
with other university activities such as tuition fee payments, library book issuing etc. are
handled by various different authorities having no correlation or collaboration among them.
Students have to maintain separate library cards and payment cards to take advantage of
services offered by these authorities. All of the above mentioned problems have motivated
us to take on this project to implement RFID based smart card system, which would solve
the issues and improve efficiency in the aforementioned fields.
1
1.3. Problem Statement Chapter 1. Introduction
2
1.7. Research Framework Chapter 1. Introduction
3
Chapter 2
This chapter summarizes the related literature studied by the team to get a thorough
understanding of the condition of the real world in terms of usability and research on
the related sector. This would help the readers understand the lacking of the currently
implemented systems, and help them understand why this project is unique to the others.
Liu, Zhao, Zhao, Li, Zhong, Zhou, Fu, and Kwak (2006) [2] worked on the GPRS mo-
bile payment system based on RFID. In this paper, the authors have introduced a design
of the GPRS Mobile Payment System based on RFID as a transitional solution before the
prevalence of the NFC cellphone. The system’s framework is easily understandable and
takes full advantage of the existing GSM mobile communication network. Besides, this
system does not require their user to change their cellphone to support RFID chip. It
provides an integrated and safe GPRS Mobile Payment System based on RFID which is
4
2.1. Literature Review Chapter 2. Literature Review and Analysis
Rinky Yadav et al.[3] worked on a multipurpose student smart card system by imple-
menting the hardware part with RFID tags, RFID readers and NodeMCU and used a web
page and database to implement the software side of their project. In their system, they
replaced a conventional student identification card with RFID card and used NodeMCU
with RFID readers that allowed their system to be OTA(over the air). Using NodeMCU
allowed their system to communicate with their web server via TCP/IP protocol stack.
When RFID cards get scanned by RFID reader, the associated NodeMCU with the reader
makes a HTTP request to the server and both credentials get verified and necessary data
gets exchanged from the database. Moreover, Their system allows a student to recharge an
amount via their web page which enables the students to enjoy cash-free daily campus life
and purchase various services without the hassle to wait in a queue. Though the system
is solely related to the transactional activities of the students and does not necessarily
provide other automated facilities such as attendance.
K.Sree et al.[4] developed bus surveillance and notification system using RFID cards
and reader, various sensors such as level and speed sensors, PIC micro-controller and An-
droid device coupled together. They aimed to determine the precise location of an ongoing
bus and monitor if everything is safe for the on-board students. RFID cards and reader
identifies every student on-board. Speed and level sensors paired with WIFI and GSM
module collect and sends data to the cloud. An android device used to provide internet
connectivity to the whole system. Using this framework data gets collected and saved in
the cloud database. Sensors collect data such as fuel level and speed and GSM provides the
GPS location of the bus to the cloud to save in the database. During an emergency situa-
tion there is a mechanical switch on board that triggers the system to send a notification
to the concerned authority and guardian of the students. As previously mentioned, the
detection of an emergency incident relies on pushing a manual mechanical switch which
might not be an optimal choice and it should have been replaced with a more logical
software solution.
Davinder Parkash et al. [5] in their paper “The RFID Technology and Its Applica-
tions: A Review” presents an overview of current state and trends of RFID technology.
In this paper, they give a consolidated introduction to principles of RFID, an overview of
current applications, frequencies used, types of RFID tags reader, its benefits also the
limitations. RFID is known as Radio Frequency Identification which is a generic term for
5
2.1. Literature Review Chapter 2. Literature Review and Analysis
technologies that use radio-frequency waves to transfer data. It can automatically identify
people/objects from a distance of several inches to hundreds of feet. An RFID system is
known as the combination of RFID technology and computing technology and it consists
of five components those are: Tag, Antenna, Reader, Communication infrastructure Ap-
plication software. In RFID technology four types of frequencies are mostly used: Low,
High, Ultra High Microwave.In this paper, they have mentioned the privacy issue of the
RFID technology but they did not elaborate or explain anything about this topic. Thus,
in the first part of their paper, they have explained the RFID technology its components,
the authors have discussed the terms of advantages limitations in the second part and in
the last part, explored RFID technology applications. The paper considers providing new
capabilities and efficient methods for several applications.
Leandre Nsengumuremy et al. [6] worked on a Smart id card system using RFID tech-
nology in which their system will ease the work of the student by helping to track money
transactions spent around the campus at a given time and also keep track of the atten-
dance reports. In this system, the administrator will be able to make reports easily by one
simple click. There are two major parts include in the system one is hardware and another
is software. The system will provide multiple functionalities such as managing student in-
formation, attendance management, conducting various reports. They have developed this
system specifically for colleges and universities. In the development process, some reviews
were conducted to understand the basic theory, system requirements, hardware require-
ments, methodologies that can be used to achieve the objectives of the system. By these
reviews which were conducted, research on the existing system was also enlightening which
gave them insights about the current system, requirements like hardware as well as soft-
ware to develop a system that can be related to the current one but with a better approach.
Agarwal and Bansal (2013) [7] in their paper “Online Attendance Management System
Using RFID with Object Counter” proposed a RFID based attendance system to mitigate
the wastage of time in taking attendance during class hours and came up with a solu-
tion to counter the practice of “Fake/Proxy Attendance”. They have discussed various
methods and systems for taking attendance and chosen RFID technology (with all of its
imposed limitations) to implement the system. The authors then characterize RFID tech-
nology in great detail, mentioning the physical structure of a RFID tag, different types of
RFID tags and their features, applications of RFID in various scenarios. They continue
by explaining their proposed system in a step by step manner in which the data from
RFID tags is recorded into the RFID card reader, then it gets sent over to a middleware
device which saves the data in a back-end database. Furthermore, the authors discuss the
implementation of an object counter to tackle the proxy attendance situation, in which
they are somewhat lacking in my opinion. In our project, we will try improving on the
said topic. The paper is concluded by debating the advantages of the system against the
conventional methods of taking attendance.
6
2.1. Literature Review Chapter 2. Literature Review and Analysis
Bose, Ngai, Thomposon and Spiekermann (2009) [8] in their paper “Managing RFID
Projects in Organizations” review the several existing and emerging use cases of RFID
technology. Bose et al.[8] first introduces RFID as a technology and then states, the key
advantage of RFID is that it leads to increased visibility of items, pallets or people on
the move and allows for real-time querying of the location of these entities[8]. The au-
thors then talk about the various applications of RFID including, but not limited to, in
healthcare eg: keeping track of pharmaceutical inventory, managing patient identification
and medication etc. , in natural disaster sensing using RFID and USN (ubiquitous sen-
sor networks) and livestock and food traceability applications: which would be able to
produce many benefits such as: fast withdrawal of various products, providing consumer
protection, higher efficiency etc. Additionally, the authors talk about the issues associated
with using RFID such as cloning RFID tags, using spy-chips to fool the RFID reader and
several other privacy concerns while also mentioning several campaigns against the use
of RFID, with hopes that with the advancement of time these issues will be addressed
accordingly. Finally, Bose et al.[8] scrutinize the value of RFID both in individual use
cases and RFID industry as a whole by reviewing several other papers on the said topic.
A.A. Olanipekun and O.K. Boyinbode [9] in their paper “A RFID Based Automatic At-
tendance System in Educational Institutions of Nigeria”, address issues involving current
manual attendance systems, which include delays regarding documentation, human errors
such as forgetfulness, and misinformation as a result of violation of the usual proper pro-
cedures. The issues are solved using Radio frequency identification (RFID) which involves
machines into the process, therefore allowing for better accuracy, fast implementation of
additional tasks such as processing student information regarding their eligibility for an
exam. Automated warnings are also implemented to allow for awareness among students
regarding their lack of presence in class. However, they have not given any solution for
the anti-proxy attendance issue which can be handled by implementing an object counter
that we have decided to add to our project. The implementation procedure discussed in
the paper uses a graphical user interface integrated into the host system, which consists
of login, admin, database, main menu, class record and admin registration. A database
record is also interfaced with USB UART serial communication with the RFID reader
which handles data records over 7 tables built in Microsoft Access. Eight frames were de-
signed by the team using vb.net which include frame login, class record, admin, database,
student evaluation, admin registration, student record and course record.
7
2.1. Literature Review Chapter 2. Literature Review and Analysis
been used to read or write necessary information to the tags. To create the user interface
of the system, MATLAB Graphical User Interface Development Environment (GUIDE)
tool has been used. For being so much secured and user friendly, the database has been
maintained with MySQL using MATLAB. As it’s range of frequency is 13.56 MHz’s and it
can read up to 15 tags at the same time, the end result after using this proposed system in
the library is very much pleasing though an additional web technology to search available
books could have made the experience better. Soon enough, this RFID technology will
take over all the current technologies due to its vast possibilities.
Peter et al. [11] worked on a project “RFID Based Security Access Control System
with GSM Technology” based on RFID and GSM technology. This entire system prevents
unauthorized access to controlled environments such as secured premises. To achieve this,
they have used RFID System with an operating frequency of 125 KHz, microcontroller
programmed to send control signals, DC motor, relay, buzzer, Liquid Crystal Display
(LCD) and GSM/GPRS Modem. When the RFID tag, which contains the users informa-
tion, is scanned by the RFID reader and confirmed the match between the information
stored previously in the microcontroller, the microcontroller[11] turns on the DC motor
through L293D driver, displays “RFID tag” and “username” on the LCD display, turns
on the GPS/GPRS to send SMS alert “AUTHORIZED” to the security personnel. And
if not matched then the DC motor remains off, LCD displays “RFID not valid” and
“UNAUTHORIZED” SMS is sent to the security personnel via GSM system. The elec-
tronic circuit was implemented, the codes for microcontroller were written in assembly
language, debugged and compiled using the KEIL Micro vision 4 integrated development
environment.[11] Being cheap and more efficient compared to the manual operated systems
or key lock systems is one of the most important implication of this paper.
Dr. Manoj Kumar Sinha and Anupam Chanda worked on a library management system
based on Radio Frequency Identification (RFID) technology in their paper “EXPLORING
RFID TECHNOLOGY APPLICATION FOR MANAGING LIBRARY AND INFORMA-
TION SERVICES IN UNIVERSITY AND INSTITUTIONAL LIBRARIES OF NORTH
EAST INDIA: AN OVERVIEW”[12]. The first part of the paper is about the historical
development, concept, components of RFID technology. And second part describes about
the application of RFID technology for managing housekeeping operations. Whole RFID
system for library management has been described as combination of six components as
RFID tag, a staff checkout station, self return book drop with automatic check in feature,
a tagging station, a security gate and a shelf scanner for inventory as well administrative
station. One can borrow books and return them without help of staffs. And staffs are
also benefited by having the re-shelving of books and updating database faster. Shelving
station and self-check-out station make these returning books and sorting them for shelv-
ing tasks easy and fast. Basic RFID system contains of three main components which are
RFID tags, Sensors or readers and docking station. The tags are programmed electrically
8
2.2. Summary Chapter 2. Literature Review and Analysis
with unique information and readers are the devices that gather information from RFID
tags. Docking station or servers are considered as the heart of RFID system. It is told that
to enhance the performance of the RFID system and fix the existing gaps, soft computing
techniques, genetic algorithms, advance techniques like CDMA etc are yet to be added to
the system.
2.2 Summary
Rehman et al. (2008) [1] worked on building a smart university using RFID technology
to improve room security, equipment tracking, automation of electrical appliances and at-
tendance record maintenance. With this system, employee and student can be identified
along with the theft of costly equipment can be avoided too. Their system will work by
detecting RFID card and forward that to microcontroller which will generate a specific
number after authenticating that ID. Then this specific number will be forwarded to the
Zigbee where it is broadcasted to receiving nodes. Although they wanted to minimize the
level of power loss, a general perception of power loss still persists. Liu et al. (2006) [2]
conducted a study on the GPRS Mobile Payment System based on RFID. The authors
proposed this system, which would provide many services like online E-commerce payment,
pay the living-fare bills, off-line micro payment, mobile bank transactions, ID service, give
mobile insurance, give E-ticket service and provide cash, credit, membership card service,
after analyzing the MP service. Moreover, they also discussed about the disadvantages of
Cellphone wallet payment system like not being able to provide as many services as the
credit card or cash card could do. In their paper, they described the current status of
the mobile payment in china and why they took initiative to implement the GPRS mo-
bile payment system. The system structure of GPRS Mobile Payment System based on
RFID is composed of communication network, mobile terminal, Mobile Payment Platform
(MPP), banks and certificate authority. Rinky Yadav et al.[3] worked on a multipurpose
student smart card system. This system replaced a conventional student identification
card with RFID card and used NodeMCU with RFID readers. Moreover This system,
was implemented by implementing the hardware part with RFID tags,RFID readers and
NodeMCU and the software part with a web page and a database, allows the students
to enjoy cash-free daily campus life by recharging an amount via their web page. K.Sree
et al.[4] developed bus surveillance and notification system using RFID cards and reader,
various sensors, PIC micro-controller and Android device coupled together. Their target
was to determine the location of an ongoing bus and monitor if everything is safe for the
on-board students. Sensors collect data and then send to the cloud. At the same time,
GSM provides the GPS location of the bus to the cloud. In their system, they also pro-
vided an emergency service using a mechanical switch on board. Davinder Parkash et al.
[5] discussed about the RFID Technology and it’s applications. RFID is known as Radio
Frequency Identification which is a generic term for technologies that use radio-frequency
9
2.2. Summary Chapter 2. Literature Review and Analysis
waves to transfer data. In the first part of their paper, they have explained the RFID
technology its components for instance it’s current applications, frequencies used, types
of RFID tags and reader, it’s benefits and limitations. The authors have discussed the
terms of advantages limitations in the second part and in the last part. Leandre Nsen-
gumuremy et al. [6] worked on a Smart id card system using RFID technology which will
track money transactions around the campus and keep track of the attendance reports. In
this system, making reports will be done with just one simple click. They also conducted
some reviews to build a system that can be related to the current one but with a better
approach. Agarwal and Bansal (2013) [7] implemented online attendance management
system using RFID with object counter which came up with a solution to counter the
practice of ”Fake/Proxy Attendance”. The authors discussed how the data from RFID
tags is recorded, it gets sent over to a middleware device and implementation of an object
counter. Furthermore, the paper is concluded by debating the advantages of the system
against the conventional methods of taking attendance. Bose et al. (2009) [8] in their pa-
per ”Managing RFID Projects in Organizations” review the several existing and emerging
use cases of RFID technology. The authors talked about the various applications like in
healthcare, livestock and food traceability applications. Moreover, they also conducted a
study on the issues associated with using RFID such as cloning RFID tags, using spy-chips
and several other privacy concerns. A.A. Olanipekun and O.K. Boyinbode [9] worked on
a RFID based automatic attendance system. This system can give automated warnings
regarding their lack of presence in class along with other tasks. The authors designed
eight frames using vb.net, a database record form with USB UART serial communication
and a graphical user interface into the host system. C. Srujana et al. [10] developed a
RFID based library management system using MATLAB. The system consists of RFID
reader/writer, RFID tag, serial to USB converter and personal computer. The authors
used MATLAB database toolbox which supports communication using ODBC or JDBC
driver with some compatible database. In the last part, the authors talked about how
versatile the RFID is in many real time applications, mainly in library management sys-
tem. Peter et al. [11] developed a RFID based security access control system with GSM
technology. This system prevents unauthorized access using RFID with an operating fre-
quency of 125 KHz, microcontroller programmed, DC motor, relay, buzzer, Liquid Crystal
Display (LCD) and GSM/GPRS Modem. Moreover they implemented electronic circuit,
used assembly language for microcontroller code and then debugged and compiled using
the KELL micro vision 4. Dr. Manoj Kumar Sinha and Anupam Chanda worked on a
library management system based on RFID technology [12]. In the first part the authors
discussed about the historical development, concept, components of RFID technology and
in the second part they described about the application of RFID technology for manag-
ing housekeeping operations. But for fixing the existing gaps, soft computing techniques,
genetic algorithms, advance techniques like CDMA etc are yet to be added to the system.
10
Table 2.1: Summary matrix of literature review
The GPRS mobile payment system based Yes Yes Yes Mobile Payment RFID tag, RFID
on RFID[2] reader, Java cell-
phone MP software
Multipurpose Student Smart Card[3] Yes Yes No Debit Payment, RFID card, RFID
Recharge Reader, NodeMcu,
Webserver
Acute school bus surveillance and notifi- Yes Yes No Bus Surveillance RFID card, RFID
cation system[4] Reader, GPS-GSM
The RFID Technology and Its Applica- Yes No No None None
tions: A Review[5]
Smart ID Card System using RFID Yes Yes Yes Attendance Manage- RFID Reader, RFID
11
Technology[6] ment, Transaction Tag
Model
Online Attendance Management System Yes Yes No Attendance System, Active RFID Tag,
Using RFID with Object Counter[7] Object Counter RFID Reader, Pro-
prietary Software.
Managing RFID Projects in Yes No Yes None None
Organizations[8]
A RFID Based Automatic Attendance Yes No No Attendance System RFID tag and
System in Educational Institutions of reader, USB UART
Nigeria[9]
Development of RFID based library man- Yes No No Library Management MATLAB, MySQL,
agement system using MATLAB[10] System DLP
RFID Based Security Access Control Sys- Yes Yes Yes Entering premises RFID tag,RFID
tem with GSM Technology[11] reader,GSM, Micro-
controller
Chapter 2. Literature Review and Analysis
Exploring RFID technology application Yes Yes No Library services RFID tag,RFID
for managing library and information reader, Docking
services in university and institutional station
libraries of north east India: An
overview[12]
Chapter 3
Methodology
This chapter first describes why we chose this project and whether or not there is actually
a need for such a system. After that this chapter allows the readers to understand how
our project is being implemented step by step manner.
12
3.1. Requirements Analysis and Initial Planning Chapter 3. Methodology
13
3.2. Methodology and Design Chapter 3. Methodology
Moreover, we also designed the activity diagrams for all of our actors that will aid
the development process of our system. It illustrates a clear view of how the actors will
avail their services and also their interaction with the system. These diagrams will ease
the development process when we will be implementing the sytem. Please see the figures
below.
14
3.2. Methodology and Design Chapter 3. Methodology
15
3.2. Methodology and Design Chapter 3. Methodology
16
3.3. Outcomes Chapter 3. Methodology
Progressing onto phase four, we developed the UI (User Interface) for the student front
of our android application. We chose orange as the main color, symbolizing signature color
of our very own United International University. We went with a Materialistic Fluid design
for the android application for its’ smooth, pleasing, attractive and very natural feeling
interface. We were mindful to add all the necessary features such as: smart suggestive
login, logging in with the RFID card, payment and attendance systems, all the necessary
animations and custom GIF’s during the design phase so that later on during the coding
and implementation phase, there is no confusion among the programmers, all the while
trying to keep the UI fairly minimalistic as well, always displaying only what the user
needs to see. While designing the UI we were very cautious not to clutter the interface
with too many elements that might overwhelm the users. For better understanding of the
readers, we arranged the UI in a wireframe design at first and later replaced that with
proper mock-ups of the actual android application. Please check figure 3.3 .
3.3 Outcomes
The outcome of our project is to implement a secure, efficient and well-organized system
for both the students and teachers. For implementing our system, we have chosen RFID
technology which has been coupled with android and web application to record atten-
dance and make on-campus payments, such as canteen bills, tuition fees possible without
17
3.4. Accompanying Tools Chapter 3. Methodology
having to carry cash, which is not only safe and secure but also convenient. All of the
aforementioned systems are to be made available to users with only one card. The atten-
dance system offers significant speed and reliability benefits over the current backdated
method of recording attendance. In the payment process, the use of RFID technology has
a very short time which implies RFID-based payment systems have succeeded in shorten-
ing payment times. With the use of our system, students and faculty members can easily
make the payments in the canteen which will save a lot of time for both the buyers and
the service providers alike. Furthermore, students will not have to wait in a long queue
for tuition fee payments anymore. Finally, with an All-In-One RFID based smart card
system implemented, the users will be provided with an intuitive and convenient system
creating an advanced digitalized environment which will help everyone to keep pace with
the modern era of fast and rapid technological growth, all the while offering a peace of
mind in terms of security.
18
3.5. Summary Chapter 3. Methodology
be rather challenging for us since our hardware wasn’t up to the mark to render 1440p
highly smooth frames. We had to settle for 1080p GIF’s with fairly above average smooth
frames for the time being. Secondly, Android Studio with various libraries has been used to
develop the android application that serves the users with robust functionality. Thirdly,
the XAMPP stack has been used to develop the entire web application along MySQL
for implementing the database. The data flow between the android application and the
database has been handled by several API’s written in PHP, which was also developed
from the ground up by us. Lastly, we have used Web-hosting and CPanel to make the web
application and database online into the World Wide Web. We have been able to organize
our resource files adroitly utilizing the vast functionalities CPanel provides.
3.5 Summary
With astoundingly positive responses from 112 UIU students, the necessity of such a
system is greater than ever before. Students have shared with us their honest thoughts
and suggestions, which honestly have overwhelmed us in the most humble way possible
because of the sheer amount of positive support and response we received. From the
comprehensive review of related literature that we did earlier, the required hardware and
software have been selected. A deeper analysis of the system allowed for a brief data
flow to conceptualize and a simple block diagram visualized that. This visualization of
the data flow in form of a block diagram has proven to be immensely helpful later on
during the implementation phase. The design of an aesthetic fluid android and web UI
has gone a long way in attracting the users and being pleasing to the eyes. Having a
good UI is always the first major step in terms of developing a project, because a bad
UI can break an otherwise very well done project. Whereas a well-done UI would even
mask many shortcomings of a mediocre one. This project offers a convenient and hassle
free attendance and payment system with a All-in-one smart RFID card. This entire
chapter paints a brief picture for the readers to understand the reasoning, inspiration and
methodology behind the development of the project.
19
Chapter 4
This chapter sheds light on the detailed process of implementation phase by first talking
about the environment setup in-depth. Then the chapter talks about the various imple-
mented features for the system. The chapter ends by talking about the results/outcomes
of the project.
20
4.2. Implemented Features Chapter 4. Implementation and Results
student identification and amounts in wallet are not compromised simply by a stolen RFID
card or a device for that matter.
21
4.3. Application Outcome Chapter 4. Implementation and Results
having an intuitive UI to interact with. This would also allow the vendors to have and
provide visual feedback of their payments with card.
4.3.1 Login
The system has a secured login process for each type of user that leads to their corre-
sponding offered services. Furthermore, the android app has a smart login feature that
facilitates fast and secured login to the system. Here is a glimpse of the login process.Figure
4.1 illustrates login on both web and android app.
22
4.3. Application Outcome Chapter 4. Implementation and Results
4.3.3 Dashboards
The system greets the user with their respective dashboard after successful login.Each
actor has his own dashboard which provides easier navigation to the services he intends
23
4.3. Application Outcome Chapter 4. Implementation and Results
to use.Moreover, the simplicity of the dashboard design makes the interaction with the
system fluid and to the point.The dashboards also contain profile details.The dashboards
ensure that user can access all of the features of the system in one place and in a more
efficient manner .Figure 4.3 shows a look of the dashboards.
24
4.3. Application Outcome Chapter 4. Implementation and Results
25
4.4. Summary Chapter 4. Implementation and Results
4.4 Summary
The implementation of this system, however difficult has been worth it. The system has
been of tremendous help to both the students and the teachers alike, not to mention
to the vendors and the authority as well. Through the implementation of this system
we have been able to offer an entirely new experience to the users; offering fast, secure
and convenient method of recording attendance and making payments that have not yet
been introduced in our institution well enough. This system focuses on the ease of use
and proper visual feedback for the users, while also providing very sophisticated technical
benefits and control over the system.
26
Chapter 5
This chapter talks about the various standards used in order to implement the project
in the first section. And in the second phase this chapter sheds lights to the various
impacts and constraints of the project on various aspects of the environment, society and
the industry in general.
27
5.2. Design Constraints Chapter 5. Standards and Design Constraints
• RFID ISO/IEC 14443 used for RFID data read and write
28
5.3. Summary Chapter 5. Standards and Design Constraints
being recorded and are eligible to be fully automated will have the ultimate benefit of this
system.
5.2.8 Sustainability
The entire system is designed in such a way that it is very durable during its usage period.
Any person related to the concerned institution in which the system has been implemented,
would have the eligibility of using the system without any hassle or trouble.
5.3 Summary
Our goal is to lessen the inconvenience and hassle of recording attendance and making on
campus all kind of payments. We have been aware of the fact during the development phase
that the whole system will be used by different level of people and everyone’s capability
of using a system can never be of same standard.So that, we have developed this system
with the ease-of-use and convenience in mind. We have opted for the highest international
standards and were mindful of various constraints during the development phase to ensure
the quality and credibility of our system.
29
Chapter 6
Conclusion
This chapter closes the curtains on this report by summarizing the project first. Then
the chapter goes on to talk about some unwanted limitations that this project faces while
implementing in real life. And finally, this chapter ends the report by discussing the future
scope of our project.
6.1 Summary
Implementing any system in a real-world scenario is always a heavy task, especially when
the system takes on a challenge to improve existing systems. Our journey to implement
and introduce this new technology to our superiors wasn’t an easy task. But through
the numerous ups and downs we faced, we learned a lot of new things and discovered
an entirely new world of access control systems. We first conducted a survey on our
system’s acceptance and feasibility. We wanted to check the public response to our system.
There were several questions about this system and we have received tremendous positive
feedback from almost everyone which has given us more motivation to make this system
stand. Another purpose of conducting this survey was to find out if the system we want to
build is suitable for everyone or if everyone wants something like this. Since we have not
received any negative feedback, we are optimistic about our system. Our implementation
improves upon the conventional method of taking attendance and hazardous on-campus
payments and takes it to an entirely new level with the integration of android and web
applications and real-time visual feedback and wallet management. We, however, did
not stop there. We improved upon several other implementations of all-in-one student id
cards, by improving on checking the proxy attendance situation. At the same time, we
have tried to emphasize privacy and security in our system, because we think everyone
deserves privacy with their data. Security has also been emphasized so that everyone’s
privacy is maintained properly. We have made our attendance system proxy free. However,
we have big plans for new updates in the near future.
30
6.2. Limitations Chapter 6. Conclusion
6.2 Limitations
Although trying our very best to rid the system of any major limitations or loopholes,
we still have some features to be desired, which is always the case with any and all first
generation products. We tried our best to extend our support to any and all users from
different ecosystems of technology. However, due to a shortage of time, we could not
make a native IOS application to support IOS users. Not to mention, our system requires
a constant supply of power and an ”always connected” environment to operate, which
might not always be possible in an underdeveloped or even in a developing country 24/7.
Although to be fair, as previously mentioned the power consumption of our device is very
minor in real world comparisons. But for the sake of transparency and argument, even
that should not be a concern in a perfect world or vacuum. Provided enough resources
and time, We hope to mitigate these limitations soon enough.
31
References
[1] Abu Zafar Abbasi, Zubair A Shaikh, et al. Building a smart university using rfid
technology. In 2008 International Conference on Computer Science and Software
Engineering, volume 5, pages 641–644. IEEE, 2008.
[2] Wei Liu, Chenglin Zhao, Wei Zhong, Zheng Zhou, Feng Zhao, Xiaoji Li, Jielin Fu,
and KyungSup Kwak. The gprs mobile payment system based on rfid. In 2006
International Conference on Communication Technology, pages 1–4. IEEE, 2006.
[3] Rinky Yadav, Rutuja Kadam, and Viraj Kolekar. Multipurpose student smart card.
2019.
[4] K Sree Veda Samhitha and Abdul Gaffar. Acute school bus surveillance and notifi-
cation system. 2019.
[5] Davinder Parkash, Twinkle Kundu, and Preet Kaur. The rfid technology and its
applications: A review. 2012.
[6] Leandre Nsengumuremyi. Smart id card system using rfid technology. 2018.
[7] Ankita Agrawal and Ashish Bansal. Online attendance management system using
rfid with object counter. International Journal of Information and Computation
Technology, 3(3):131–138, 2013.
[8] Indranil Bose, Eric WT Ngai, Thompson SH Teo, and Sarah Spiekermann. Managing
rfid projects in organizations. European Journal of Information Systems, 18(6):534–
540, 2009.
32
References References
[11] Peter Adole, Joseph M Môm, and Gabriel A Igwue. Rfid based security access control
system with gsm technology. American Journal of Engineering Research, 5(7):236–
242, 2016.
[12] Manoj Kumar Sinha and Anupam Chanda. Exploring rfid technology application for
managing library and information services in university and institutional libraries of
north east india: An overview. Int. J. Inf. Sour. Serv, 1:72–85, 2014.
33