Kilo Grammer Correcred Project - Edited
Kilo Grammer Correcred Project - Edited
INTRODUCTION
1.1 Background to The Study
Bevan (1998) defined a monitoring system as the act of controlling a working environment to
reduce losses resulting from employee, time, and theft. In the modern world, a variety of
monitoring system techniques and procedures, including biometric equipment, are used. The
human resource management system covers this category. The best monitoring system
software on the market will make use of cutting-edge technologies. The presence of
fingerprints is part of modern technology supporting various work contexts. Additionally,
there are mobile applications that function similarly to conventional monitoring system
management. Applications for monitoring systems make use of facial recognition and GPS
technologies. Conventional techniques of almost all monitoring systems included employing
time clocks, time sheets, and time-tracking software. However, a monitoring system goes
further by creating an environment that maximizes and rewards employee safety (Hasanein,
2018). It is now possible to "automatically collect data, which also allows cross-linking
between safety and performance" using real-time location systems. A monitoring system is
practiced on all campuses of higher education, including colleges, universities, and schools.
According to Yuru and Liping (2013), information technology (IT) significantly aided the
development of several academic subjects and sectors, including student monitoring and
management systems. They are essential for tracking students’ location in the context of
schools, colleges, and universities, according to Sunehra and Goud (2016). Because it will
help to strengthen and improve the quality of education and increase learning efficiency, and
level of learning.
Less than before, pupils lacked the drive to be in school early. Students may choose not to get
to school late due to a variety of reasons, including laziness, extracurricular social activities
that do not advance the institution's objectives, non-equilibrium in their academic work, and
much more. The majority of lecturers and administrators in developing nations have
developed various strategies to ensure that students are active in school and that the
interactive contact between students and lecturers is preserved.
RFID (Radio Frequency Identification) technology has found numerous applications in
various industries, including the education sector. In schools, RFID technology is primarily
used for identification, access control, attendance tracking, and asset management. However,
like any technology, RFID faces certain challenges and has future directions for improvement
in the school environment. An RFID (Radio Frequency Identification) tag is a small
electronic device that uses radio waves to transmit and receive data wirelessly. It consists of a
microchip and an antenna, which are embedded in a small tag or card. RFID tags are used for
various purposes, such as tracking and identifying objects, inventory management, access
control, and contactless payment systems. The tags can be passive, active, or semi-passive,
depending on their power source and functionality.
With each swipe, the tag is programmed to carry out a variety of tasks on a different gadget
called an RFID reader. When a swipe is made, the tag uses its specific Id to communicate and
receive data from the reader via the microchip. As a result, RFID is a wireless identification
technology that consists of two components: an RFID reader and an RFID tag. Although
RFID is not a new technology, because of its low cost and accessibility in other application
areas, it has advanced in other computing disciplines. There is a vast array of research and
development being done in this field to fully utilize this technology, and in the upcoming
years, a great deal of new applications and research fields would continue to develop. As a
result, this initiative was adopted and put into practice using RFID to track and monitor
students at Federal Polytechnic Ilaro College.
1.2 Statement of the Problem
In many industries, sectors, and schools, there is a need for effective monitoring and tracking
of assets, personnel, or objects. Traditional methods of manual tracking and monitoring are
often inefficient and prone to errors. Therefore, there is a demand for an automated system
that can accurately track and monitor assets in real time.
1.3 Aim
This project's aim is to develop a monitoring system that combines RFID (Radio Frequency
Identification) technology and a GPS (Global Positioning System) module to provide
accurate and reliable tracking and monitoring of objects or individuals.
1.4 Objectives
In designing and implementing a monitoring system that utilizes RFID and GPS technologies
to track and monitor objects or individuals in real time.
1. RFID Tracking: Develop an RFID system that can track and identify objects or individuals
equipped with RFID tags. The system should be able to read RFID tags within a specified
range and accurately record the tag's identity.
2. GPS Location Tracking: Incorporate a GPS module to determine the real-time location of
the tracked objects or individuals. The GPS module should provide accurate latitude and
longitude coordinates.
3. Data Integration: Establish a mechanism to integrate the RFID and GPS data into a unified
monitoring system. The system should be capable of correlating RFID tag identities with GPS
location data to provide a comprehensive view of the tracked objects or individuals.
6. Scalability and Flexibility: Design the system with scalability in mind to accommodate a
large number of RFID tags and tracked objects or individuals. The system should be flexible
enough to handle different tracking scenarios and be easily configurable to meet specific
requirements.
7. Data Security: Implement appropriate security measures to protect the collected tracking
data from unauthorized access, tampering, or data breaches.
The study of a monitoring system using RFID and GPS module holds significant importance
as it enables organizations and schools to enhance tracking capabilities, improve operational
efficiency, ensure security, and make informed decisions based on real-time data. It has the
potential to transform various industries and sectors by providing a reliable and
comprehensive solution for asset management and monitoring.
1. RFID (Radio Frequency Identification): RFID is a technology that uses radio waves to
wirelessly identify and track objects or individuals equipped with RFID tags. RFID tags
consist of a microchip and an antenna, allowing them to transmit and receive data when in
proximity to an RFID reader.
2. RFID Tag: An RFID tag is a small electronic device that contains a microchip and an
antenna. It is attached to an object or embedded in an ID card or label. The tag stores data and
responds to radio frequency signals from an RFID reader, allowing for identification and
tracking.
3. RFID Reader: An RFID reader, also known as an interrogator, is a device that emits radio
waves and captures the response from RFID tags within its range. The reader communicates
with the tags, retrieves their data, and facilitates their identification and tracking.
4. GPS (Global Positioning System): GPS is a satellite-based navigation system that provides
location and time information anywhere on Earth. It consists of a network of satellites orbiting
the Earth, GPS receivers that receive signals from the satellites, and algorithms that calculate
accurate positioning coordinates.
5. GPS Module: A GPS module is a device that integrates a GPS receiver and associated
circuitry into a compact unit. It receives signals from GPS satellites and processes the data to
determine the latitude, longitude, altitude, and other relevant information about the module's
location.
6. Real-Time Tracking: Real-time tracking refers to the ability to monitor and track objects
or individuals continuously and instantly, with minimal delay. In the context of an RFID and
GPS monitoring system, real-time tracking involves receiving and updating the location data
of tracked entities in near real-time, allowing for immediate visibility and response.
7. Data Integration: Data integration refers to the process of combining and merging data
from multiple sources into a unified format or system. In the context of an RFID and GPS
monitoring system, data integration involves combining the information obtained from RFID
tags (such as tag identities) with GPS location data to provide a comprehensive view of the
tracked objects or individuals.
8. User Interface (UI): The user interface refers to the visual and interactive elements of a
system that allow users to interact with and access its features and functionalities. In the
context of a monitoring system, the user interface provides a graphical representation or
dashboard that displays the tracking data, alerts, and relevant information in a user-friendly
manner.
9. Geofence: A geofence is a virtual boundary defined within a geographic area using GPS
coordinates or other location-based technologies. In a monitoring system, geofences can be set
to trigger alerts or actions when a tracked object or individual enters or exits the defined area.
10. Alerts and Notifications: Alerts and notifications are messages or signals generated by
the monitoring system to inform users or stakeholders about specific events or conditions. In
the context of an RFID and GPS monitoring system, alerts and notifications can include
unauthorized movements, geofence violations, low battery levels, or any other predefined
criteria set by the system or users.
CHAPTER TWO
2. 0 LITERATURE REVIEW
The first recorded instance of radio frequency engineering dates back to 1864 when James
Clerk Maxwell used Maxwell's equations to predict the existence of electromagnetic waves,
of which microwaves are a subset. By creating a device that generated and detected
microwaves in the UHF area in 1881, Heinrich Hertz proved the existence of electromagnetic
waves. A century and a half later, the MIT Auto-ID Center picked this radio frequency for
their passive RFID project. When radar technology was first widely used in military aviation
during World War II, it was in the 1930s. In particular, backscattering radios were employed
to detect friendly planes. backscattered radar signal modulation. Leaving military technology
aside, Harry Stockman published the first important scientific study in 1948.
"Communication by Reflected Power Means." In the late 1960s, Checkpoint and Sensormatic
were founded. Both of these businesses created passive 1-bit RFID passive Electronic Article
Surveillance (EAS) systems. EAS is unquestionably the first and most popular commercial
application of RFID that is still in use today. In the 1970s, Northwestern University used
RFID technology at Los Alamos Scientific Laboratory to track nuclear materials. Aimtech,
which later joined Transcode, was created by Identronix and other members of the same
research team as a spin-off from this Los Alamos facility. This kept promoting automated toll
payment systems throughout the 1980s. There wasn't much data on the tag, even though it
was already at 915 MHz, At the time, tracking cattle was another area of application for
RFID. Initially, the equipment was intended to keep tabs on treated cows, but usage quickly
grew. These applications, which operated at low frequencies of about 125 kHz, made small
tags practical. The TIRIS system, developed by Texas Instruments, was introduced to the
market and is still in use today. Following shortly at 13.56 MHz, high-frequency technology
introduced greater read range and faster data transfer rates. In Europe, Micron (later a
division of Philips, now NXP) introduced MIFARE. Today, NFC and payment cards, along
with many of its versions, are based on MIFARE. In the early 1990s, IBM began developing
RFID UHF technology and conducting pilots with Walmart., But the technology was never
commercially viable. Later, IBM sold the relevant patents to Intermec (which is now part of
Honeywell). Radio frequencies are analogous to other physical signals found in nature, such
as pressure, temperature, voltage, current, and speed. Marlin Mickle discusses in depth "HF
and UHF resolution and integration" how radio frequency waves and radar radiation connect
questioners and tags through "inductive coupling" or "backscatter coupling." The first RFID
applications were created during World War II as part of the Identification Friend or Foe
(IFF) systems, which used RF transponders (tags) and interrogators (readers) to identify
friendly aircraft. An electronic predecessor of passive RFID Article surveillance (EAS)
systems that used short-range detection (DSRC) RF technology was introduced in retail
outlets in the 1970s. With automated data capture (AIDC), Auto-ID RFID technology
develops barcode standards for product identification. Transport costs have significantly
decreased recently as a result of this and the standardization of shipping container
dimensions. Some of the biggest firms in the world today are those whose supply networks
were optimized using this technology. Retailers including Wal-Mart, Metro, Target, and
Carrefour are included. The Universal Product Code (UPC), which was created in the middle
of the 1970s to fulfill the needs of the grocery sector, is the most well-known and common
application of AIDC barcode technology in consumer goods. In these networks, where
barcodes are currently commonly utilized, RFID systems are now being implemented to
speed up the capture of non-line-of-sight data utilizing RF to read the electronic product code
(EPC) on RFID tags. The low-frequency range (125 or 134.2 kHz), which consists of four
primary frequency bands, is frequently employed. 13.56 MHz, 868 to 956 MHz in the
ultrahigh-frequency (UHF) band, and 2.45 or 5.8 GHz in the microwave band. A tag reader
reads the data that is stored on the tags, which generates the energy required for passive tags
to transmit their data. For passive tags, the scan ranges from a very short (0.2 mm) to a very
long (ten meters) distance. RFID applications can be used in different fields.
One of the technologies is the paper attendance machine. Many small businesses use this
method of widespread attendance. The cost is low and the benefit is simple to use, but the
drawbacks are more difficult statistical data, vulnerable data, and increased vulnerability.
This method is not ideal for managing college students since the data volume is too huge,
CARDS and powder ink frequently seem inadequate, and paper waste is not environmentally
acceptable. Protection, the punch machine has a high failure rate. A credit card in the shape
of an attendance machine. This attendance approach is extensively employed at the moment,
In many units, the employee card is the only acceptable form of payment during rush hour.
The use of universities is very widespread. Almost all universities offer services like lending
books, on-campus shopping, and campus ID cards. A university campus card with an
integrated attendance setting feature is used in the dorms of some teaching buildings. To
enter campus, use the CARDS system. Utilize the background management feature next for
information on summary statistical attendance analysis, etc. B. Fingerprint attendance
technology, as each person's fingerprints are distinct and remain the same throughout their
lives. Therefore, it is possible to extract the fingerprint to assess the traits, determine how
each fingerprint differs from one another, and make distinctions between the presented
fingerprints. The features of fingerprints that are based on analysis and are a technique that
tries to identify people are known as fingerprint characteristics. The foundation for a
comprehensive database of fingerprints is this technology. The identification technology for
fingerprints is fairly developed today and ought to be applied broadly in various fields. In
reality, we can read fingerprints on objects and employ analytical tools to examine
fingerprints. Characteristics and the Treasury's fingerprint match, followed by the
fingerprint's characteristic value. The attendance fraud problem has been partially resolved by
fingerprint attendance, however, fingerprint fraud is now also possible with the development
of the fingerprint membrane.
Iris identification is a technology that causes less disruption in the biological recognition of a
person's eyes. Users do not need to interact with the gadget because it employs very common
camera components. Additionally, it can deliver improved performance that adheres to the
template. The most practical and reliable use of any biological recognition technique is iris
identification.
A popular sort of time and attendance system that may either completely automate attendance
or boost the accuracy of measuring and recording employees' time is the barcode system. As
a result, the system offers very high levels of precision and dependability when monitoring
staff attendance. Additionally, compared to the expense of payroll or attendance problems,
the cost of deploying the system is not excessive. The barcode system is simple to use. A
badge or card with a barcode is given to each employee. To check-in or out of the company,
the badge or card is switched on the time clock, which records the information. These clock
data can be downloaded by the manager or administrator, who can then use them to update
and maintain time and attendance records. Retail products are given a 12-digit UPC that
uniquely identifies them as well as the vendor who sold them. The Universal Product Code
(UPC) machine-readable form is always the same for a certain product, and it typically
displays next to the barcode on a product. The first six numbers are the unique identifying
number for the vendor. The first six digits of every product offered by the vendor will be the
same in their UPCs. The following five digits are used to identify the product. The check's
last digit is referred to as that. This is used to confirm that the UPC for that specific product is
accurate. A calculation is made each time a UPC is read, often by a barcode scanner. The
computer knows the UPC is incorrect if the check digit differs from the calculated one.
Data is encoded in the magnetic stripe of the employee card for the magnetic stripe
attendance system. The time clock records the magnetic stripe data from the card when it is
swiped through it by the employee. The usage of barcodes in numerous application-based
systems is well known. However, recent developments in RFID technology have taken center
stage and established themselves as superior technology.
In the regional features analysis method for face recognition, face recognition technology is
frequently employed as a processing tool and combines biological principles of statistics. The
biological statistics approach is used to create a mathematical model, or face feature template,
using computer image processing technologies to extract video portrait feature points. Using
the finished facial feature template and the faces of the tested subjects, similar values are
assigned by the findings of the analysis, allowing one to identify whether the subjects are the
same person. The phenomenon of attendance cheating can be avoided with the deployment of
this technology, but the costs associated with attendance are too expensive.
Due to its exceptional benefits over other existing technologies for identification and data
gathering, Radio Frequency Identification (RFID), a developing technology, has recently
piqued the interest of the academic community. As the technology is still in its early stages of
adoption, the format of this chapter is to evaluate the current RFID literature and explore the
problems in the current RFID systems. In addition to the benefits already mentioned, since
the development of RFID, Technology from the 1900s also has had certain drawbacks or
problems. This chapter's goal is to add to the body of knowledge on radio frequency
identification. Academic investigation and understanding of some of the important problems
preventing the development of RFID technology. There is a critical need to overcome these
difficulties if RFID technology is to boost product velocity and visibility.