0% found this document useful (0 votes)
20 views10 pages

Kilo Grammer Correcred Project - Edited

This document discusses the development of a monitoring system that integrates RFID and GPS technologies for real-time tracking and monitoring of individuals and assets, particularly in educational settings. It highlights the limitations of traditional tracking methods and emphasizes the need for automated systems to improve efficiency and accuracy. The study aims to enhance operational capabilities and security through a comprehensive solution that includes features like data integration, real-time monitoring, alerts, and user-friendly interfaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

Kilo Grammer Correcred Project - Edited

This document discusses the development of a monitoring system that integrates RFID and GPS technologies for real-time tracking and monitoring of individuals and assets, particularly in educational settings. It highlights the limitations of traditional tracking methods and emphasizes the need for automated systems to improve efficiency and accuracy. The study aims to enhance operational capabilities and security through a comprehensive solution that includes features like data integration, real-time monitoring, alerts, and user-friendly interfaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

CHAPTER ONE

INTRODUCTION
1.1 Background to The Study

Bevan (1998) defined a monitoring system as the act of controlling a working environment to
reduce losses resulting from employee, time, and theft. In the modern world, a variety of
monitoring system techniques and procedures, including biometric equipment, are used. The
human resource management system covers this category. The best monitoring system
software on the market will make use of cutting-edge technologies. The presence of
fingerprints is part of modern technology supporting various work contexts. Additionally,
there are mobile applications that function similarly to conventional monitoring system
management. Applications for monitoring systems make use of facial recognition and GPS
technologies. Conventional techniques of almost all monitoring systems included employing
time clocks, time sheets, and time-tracking software. However, a monitoring system goes
further by creating an environment that maximizes and rewards employee safety (Hasanein,
2018). It is now possible to "automatically collect data, which also allows cross-linking
between safety and performance" using real-time location systems. A monitoring system is
practiced on all campuses of higher education, including colleges, universities, and schools.
According to Yuru and Liping (2013), information technology (IT) significantly aided the
development of several academic subjects and sectors, including student monitoring and
management systems. They are essential for tracking students’ location in the context of
schools, colleges, and universities, according to Sunehra and Goud (2016). Because it will
help to strengthen and improve the quality of education and increase learning efficiency, and
level of learning.
Less than before, pupils lacked the drive to be in school early. Students may choose not to get
to school late due to a variety of reasons, including laziness, extracurricular social activities
that do not advance the institution's objectives, non-equilibrium in their academic work, and
much more. The majority of lecturers and administrators in developing nations have
developed various strategies to ensure that students are active in school and that the
interactive contact between students and lecturers is preserved.
RFID (Radio Frequency Identification) technology has found numerous applications in
various industries, including the education sector. In schools, RFID technology is primarily
used for identification, access control, attendance tracking, and asset management. However,
like any technology, RFID faces certain challenges and has future directions for improvement
in the school environment. An RFID (Radio Frequency Identification) tag is a small
electronic device that uses radio waves to transmit and receive data wirelessly. It consists of a
microchip and an antenna, which are embedded in a small tag or card. RFID tags are used for
various purposes, such as tracking and identifying objects, inventory management, access
control, and contactless payment systems. The tags can be passive, active, or semi-passive,
depending on their power source and functionality.
With each swipe, the tag is programmed to carry out a variety of tasks on a different gadget
called an RFID reader. When a swipe is made, the tag uses its specific Id to communicate and
receive data from the reader via the microchip. As a result, RFID is a wireless identification
technology that consists of two components: an RFID reader and an RFID tag. Although
RFID is not a new technology, because of its low cost and accessibility in other application
areas, it has advanced in other computing disciplines. There is a vast array of research and
development being done in this field to fully utilize this technology, and in the upcoming
years, a great deal of new applications and research fields would continue to develop. As a
result, this initiative was adopted and put into practice using RFID to track and monitor
students at Federal Polytechnic Ilaro College.
1.2 Statement of the Problem

In many industries, sectors, and schools, there is a need for effective monitoring and tracking
of assets, personnel, or objects. Traditional methods of manual tracking and monitoring are
often inefficient and prone to errors. Therefore, there is a demand for an automated system
that can accurately track and monitor assets in real time.

1.3 Aim

This project's aim is to develop a monitoring system that combines RFID (Radio Frequency
Identification) technology and a GPS (Global Positioning System) module to provide
accurate and reliable tracking and monitoring of objects or individuals.

1.4 Objectives

In designing and implementing a monitoring system that utilizes RFID and GPS technologies
to track and monitor objects or individuals in real time.

The system should address the following requirements:

1. RFID Tracking: Develop an RFID system that can track and identify objects or individuals
equipped with RFID tags. The system should be able to read RFID tags within a specified
range and accurately record the tag's identity.

2. GPS Location Tracking: Incorporate a GPS module to determine the real-time location of
the tracked objects or individuals. The GPS module should provide accurate latitude and
longitude coordinates.

3. Data Integration: Establish a mechanism to integrate the RFID and GPS data into a unified
monitoring system. The system should be capable of correlating RFID tag identities with GPS
location data to provide a comprehensive view of the tracked objects or individuals.

4. Real-time Monitoring: Implement a user interface or dashboard that displays real-time


tracking and monitoring information. The system should provide updates on the location and
status of the tracked objects or individuals in an intuitive and user-friendly manner.

5. Alerts and Notifications: Implement an alerting mechanism to notify users or stakeholders


when specific events or conditions occur. This could include alerts for unauthorized
movements, geofence violations, or any predefined criteria set by the users.

6. Scalability and Flexibility: Design the system with scalability in mind to accommodate a
large number of RFID tags and tracked objects or individuals. The system should be flexible
enough to handle different tracking scenarios and be easily configurable to meet specific
requirements.

7. Data Security: Implement appropriate security measures to protect the collected tracking
data from unauthorized access, tampering, or data breaches.

1.5 Scope of the Study


A mobile device called a tag will wirelessly communicate student data, which will be scanned
by an RFID reader and processed under preprogrammed instructions on the personal computer
(PC). Additionally, it monitors, document, and preserve student arrival/ departure in school
and also allows both the school and guidance to track the location of each student with a
registered tag.

1.6 Significance of The Study

The study of a monitoring system using RFID and GPS module holds significant importance
as it enables organizations and schools to enhance tracking capabilities, improve operational
efficiency, ensure security, and make informed decisions based on real-time data. It has the
potential to transform various industries and sectors by providing a reliable and
comprehensive solution for asset management and monitoring.

1.6 Definition of Terms

1. RFID (Radio Frequency Identification): RFID is a technology that uses radio waves to
wirelessly identify and track objects or individuals equipped with RFID tags. RFID tags
consist of a microchip and an antenna, allowing them to transmit and receive data when in
proximity to an RFID reader.

2. RFID Tag: An RFID tag is a small electronic device that contains a microchip and an
antenna. It is attached to an object or embedded in an ID card or label. The tag stores data and
responds to radio frequency signals from an RFID reader, allowing for identification and
tracking.

3. RFID Reader: An RFID reader, also known as an interrogator, is a device that emits radio
waves and captures the response from RFID tags within its range. The reader communicates
with the tags, retrieves their data, and facilitates their identification and tracking.

4. GPS (Global Positioning System): GPS is a satellite-based navigation system that provides
location and time information anywhere on Earth. It consists of a network of satellites orbiting
the Earth, GPS receivers that receive signals from the satellites, and algorithms that calculate
accurate positioning coordinates.

5. GPS Module: A GPS module is a device that integrates a GPS receiver and associated
circuitry into a compact unit. It receives signals from GPS satellites and processes the data to
determine the latitude, longitude, altitude, and other relevant information about the module's
location.

6. Real-Time Tracking: Real-time tracking refers to the ability to monitor and track objects
or individuals continuously and instantly, with minimal delay. In the context of an RFID and
GPS monitoring system, real-time tracking involves receiving and updating the location data
of tracked entities in near real-time, allowing for immediate visibility and response.

7. Data Integration: Data integration refers to the process of combining and merging data
from multiple sources into a unified format or system. In the context of an RFID and GPS
monitoring system, data integration involves combining the information obtained from RFID
tags (such as tag identities) with GPS location data to provide a comprehensive view of the
tracked objects or individuals.

8. User Interface (UI): The user interface refers to the visual and interactive elements of a
system that allow users to interact with and access its features and functionalities. In the
context of a monitoring system, the user interface provides a graphical representation or
dashboard that displays the tracking data, alerts, and relevant information in a user-friendly
manner.

9. Geofence: A geofence is a virtual boundary defined within a geographic area using GPS
coordinates or other location-based technologies. In a monitoring system, geofences can be set
to trigger alerts or actions when a tracked object or individual enters or exits the defined area.

10. Alerts and Notifications: Alerts and notifications are messages or signals generated by
the monitoring system to inform users or stakeholders about specific events or conditions. In
the context of an RFID and GPS monitoring system, alerts and notifications can include
unauthorized movements, geofence violations, low battery levels, or any other predefined
criteria set by the system or users.
CHAPTER TWO
2. 0 LITERATURE REVIEW

The first recorded instance of radio frequency engineering dates back to 1864 when James
Clerk Maxwell used Maxwell's equations to predict the existence of electromagnetic waves,
of which microwaves are a subset. By creating a device that generated and detected
microwaves in the UHF area in 1881, Heinrich Hertz proved the existence of electromagnetic
waves. A century and a half later, the MIT Auto-ID Center picked this radio frequency for
their passive RFID project. When radar technology was first widely used in military aviation
during World War II, it was in the 1930s. In particular, backscattering radios were employed
to detect friendly planes. backscattered radar signal modulation. Leaving military technology
aside, Harry Stockman published the first important scientific study in 1948.
"Communication by Reflected Power Means." In the late 1960s, Checkpoint and Sensormatic
were founded. Both of these businesses created passive 1-bit RFID passive Electronic Article
Surveillance (EAS) systems. EAS is unquestionably the first and most popular commercial
application of RFID that is still in use today. In the 1970s, Northwestern University used
RFID technology at Los Alamos Scientific Laboratory to track nuclear materials. Aimtech,
which later joined Transcode, was created by Identronix and other members of the same
research team as a spin-off from this Los Alamos facility. This kept promoting automated toll
payment systems throughout the 1980s. There wasn't much data on the tag, even though it
was already at 915 MHz, At the time, tracking cattle was another area of application for
RFID. Initially, the equipment was intended to keep tabs on treated cows, but usage quickly
grew. These applications, which operated at low frequencies of about 125 kHz, made small
tags practical. The TIRIS system, developed by Texas Instruments, was introduced to the
market and is still in use today. Following shortly at 13.56 MHz, high-frequency technology
introduced greater read range and faster data transfer rates. In Europe, Micron (later a
division of Philips, now NXP) introduced MIFARE. Today, NFC and payment cards, along
with many of its versions, are based on MIFARE. In the early 1990s, IBM began developing
RFID UHF technology and conducting pilots with Walmart., But the technology was never
commercially viable. Later, IBM sold the relevant patents to Intermec (which is now part of
Honeywell). Radio frequencies are analogous to other physical signals found in nature, such
as pressure, temperature, voltage, current, and speed. Marlin Mickle discusses in depth "HF
and UHF resolution and integration" how radio frequency waves and radar radiation connect
questioners and tags through "inductive coupling" or "backscatter coupling." The first RFID
applications were created during World War II as part of the Identification Friend or Foe
(IFF) systems, which used RF transponders (tags) and interrogators (readers) to identify
friendly aircraft. An electronic predecessor of passive RFID Article surveillance (EAS)
systems that used short-range detection (DSRC) RF technology was introduced in retail
outlets in the 1970s. With automated data capture (AIDC), Auto-ID RFID technology
develops barcode standards for product identification. Transport costs have significantly
decreased recently as a result of this and the standardization of shipping container
dimensions. Some of the biggest firms in the world today are those whose supply networks
were optimized using this technology. Retailers including Wal-Mart, Metro, Target, and
Carrefour are included. The Universal Product Code (UPC), which was created in the middle
of the 1970s to fulfill the needs of the grocery sector, is the most well-known and common
application of AIDC barcode technology in consumer goods. In these networks, where
barcodes are currently commonly utilized, RFID systems are now being implemented to
speed up the capture of non-line-of-sight data utilizing RF to read the electronic product code
(EPC) on RFID tags. The low-frequency range (125 or 134.2 kHz), which consists of four
primary frequency bands, is frequently employed. 13.56 MHz, 868 to 956 MHz in the
ultrahigh-frequency (UHF) band, and 2.45 or 5.8 GHz in the microwave band. A tag reader
reads the data that is stored on the tags, which generates the energy required for passive tags
to transmit their data. For passive tags, the scan ranges from a very short (0.2 mm) to a very
long (ten meters) distance. RFID applications can be used in different fields.

2.1 The Cassette Attendance System

One of the technologies is the paper attendance machine. Many small businesses use this
method of widespread attendance. The cost is low and the benefit is simple to use, but the
drawbacks are more difficult statistical data, vulnerable data, and increased vulnerability.
This method is not ideal for managing college students since the data volume is too huge,
CARDS and powder ink frequently seem inadequate, and paper waste is not environmentally
acceptable. Protection, the punch machine has a high failure rate. A credit card in the shape
of an attendance machine. This attendance approach is extensively employed at the moment,
In many units, the employee card is the only acceptable form of payment during rush hour.
The use of universities is very widespread. Almost all universities offer services like lending
books, on-campus shopping, and campus ID cards. A university campus card with an
integrated attendance setting feature is used in the dorms of some teaching buildings. To
enter campus, use the CARDS system. Utilize the background management feature next for
information on summary statistical attendance analysis, etc. B. Fingerprint attendance
technology, as each person's fingerprints are distinct and remain the same throughout their
lives. Therefore, it is possible to extract the fingerprint to assess the traits, determine how
each fingerprint differs from one another, and make distinctions between the presented
fingerprints. The features of fingerprints that are based on analysis and are a technique that
tries to identify people are known as fingerprint characteristics. The foundation for a
comprehensive database of fingerprints is this technology. The identification technology for
fingerprints is fairly developed today and ought to be applied broadly in various fields. In
reality, we can read fingerprints on objects and employ analytical tools to examine
fingerprints. Characteristics and the Treasury's fingerprint match, followed by the
fingerprint's characteristic value. The attendance fraud problem has been partially resolved by
fingerprint attendance, however, fingerprint fraud is now also possible with the development
of the fingerprint membrane.

2.1.1 The Iris Recognition of Attendance Technology

Iris identification is a technology that causes less disruption in the biological recognition of a
person's eyes. Users do not need to interact with the gadget because it employs very common
camera components. Additionally, it can deliver improved performance that adheres to the
template. The most practical and reliable use of any biological recognition technique is iris
identification.

2.1.2 Barcode Attendance System

A popular sort of time and attendance system that may either completely automate attendance
or boost the accuracy of measuring and recording employees' time is the barcode system. As
a result, the system offers very high levels of precision and dependability when monitoring
staff attendance. Additionally, compared to the expense of payroll or attendance problems,
the cost of deploying the system is not excessive. The barcode system is simple to use. A
badge or card with a barcode is given to each employee. To check-in or out of the company,
the badge or card is switched on the time clock, which records the information. These clock
data can be downloaded by the manager or administrator, who can then use them to update
and maintain time and attendance records. Retail products are given a 12-digit UPC that
uniquely identifies them as well as the vendor who sold them. The Universal Product Code
(UPC) machine-readable form is always the same for a certain product, and it typically
displays next to the barcode on a product. The first six numbers are the unique identifying
number for the vendor. The first six digits of every product offered by the vendor will be the
same in their UPCs. The following five digits are used to identify the product. The check's
last digit is referred to as that. This is used to confirm that the UPC for that specific product is
accurate. A calculation is made each time a UPC is read, often by a barcode scanner. The
computer knows the UPC is incorrect if the check digit differs from the calculated one.

2.1.3 Magnetic Stripe Attendance System

Data is encoded in the magnetic stripe of the employee card for the magnetic stripe
attendance system. The time clock records the magnetic stripe data from the card when it is
swiped through it by the employee. The usage of barcodes in numerous application-based
systems is well known. However, recent developments in RFID technology have taken center
stage and established themselves as superior technology.

2.1.4 Non-Contact Attendance Technology Face Recognition Technology

In the regional features analysis method for face recognition, face recognition technology is
frequently employed as a processing tool and combines biological principles of statistics. The
biological statistics approach is used to create a mathematical model, or face feature template,
using computer image processing technologies to extract video portrait feature points. Using
the finished facial feature template and the faces of the tested subjects, similar values are
assigned by the findings of the analysis, allowing one to identify whether the subjects are the
same person. The phenomenon of attendance cheating can be avoided with the deployment of
this technology, but the costs associated with attendance are too expensive.

2.1.5 RFID Attendance System

Radio-frequency identification (RFID) An automatic, non-contact identifying method is


RFID (Radio Frequency identifying). Without human intervention, identification can function
in a variety of unfavorable environmental situations. RFID technology can recognize moving
objects and many tags, making the process quick and easy. The reader then receives an RF
signal with inductive current energy to communicate the product's stored information. This is
the fundamental operating concept of RFID technology. The label is placed in a magnetic
field. Send tags with signal initiative or use passive tags Reading involves information
decoding and reading, giving information about data processing to the central information
system. Active tags, active tags, or active tags. based on the second-generation Id card's
RFID attendance system. This can be utilized efficiently for student timekeeping and
summary attendance at school when combined with second-generation Id card reading
technology. At the time, attendance was also a means of social promotion, although it was not
utilized on campus. Many units are extra careful because there are security concerns with
another option to attend that needs ID information. based on the campus card's RFID
attendance mechanism. Additionally, it is a very practical technique of campus attendance to
use the wireless attendance campus card after integrating the campus card with the RFID
(Meghdadi & Aza, 2016).
2.2 Review of Related Work

The construction of a web-based RFID attendance system at an Indonesian higher education


institution is the main topic of Kurnia li (2014). The creation of this system was spurred on
by the realization that student attendance records are one of the key indicators of that
attendance. achievements in the classroom. However, the manual practice currently in use is
what makes things so difficult. However, the creation of this system has motivated senior
management. Additionally, the system is easily accessible through the learning management
system, and a real-time report may be generated.
Web, biometric, and radio frequency identification (RFID) technologies have all been used to
better academic management, according to Zainab's (2014) assessment of the subject. system
(AMS) used on campuses to track and enhance the academic performance of both teachers
and students. Parents will be able to track their children's movements on campus, e-payments,
canteen food preferences, class attendance, and daily academic attendance through a
Smartphone app available on campus. The ability to search for classes and browse class
schedules, teacher appointments, e-payment statements, warnings, and adverts will be
available to students.Radio Frequency Identification (RFID) and Short Messaging Service
(SMS) were used by Isaac (2015) to build and create a web-based management system for
electronic attendance and tracking. Campus security and intelligent information management
are ensured through a portal that allows users to access data in real-time. The RFID card
system will be used by the students to check in and out at the main entrance, tracking
attendance and preventing unwanted entry. The six primary purposes of the LPU-LAGUNA
SEALS system developed in this study are to: effectively and efficiently manage and monitor
student attendance, intranet, and internet logs, use the student RFID chip as a gate pass in the
IDs, send parents daily SMS about the student entry and exit time record, Kong (2016)
investigated the active RFID system and its uses, which included the tracking and recording
of attendance. The system tracks a single student's whereabouts using RFID technology,
optimizing management efficiency and attendance data administration. The professors have
built an RFID-based student database management system, and the RFID tag is affixed to the
student ID card. This system offers data on all students, including the student's basic
information. It can also be used to track other aspects of student attendance, such as course,
attendance, etc. When students use an RFID card, the RFID identity-based monitoring system
manages students and equipment in the literature boarding school using RFID and fingerprint
identification methods. Identification of kids using information and fingerprint detection
identification to track students' movements and increase equipment security. Smart
monitoring is employed by many schools on board, both in elementary and middle schools,
and RFID technology is used for every student to register for an electronic student card and
manage automatically the students' attendance and departure times. A lot of college students
are applying for an RFID-based card because one card can be used for a variety of tasks on
campus, including paying for products, getting into buildings, and more. In addition to
offering pupils a practical way to learn and live, the system is made to improve the school's
security administration. The application of RFID technology to automatically and seamlessly
integrate instructor and student attendance in the classroom was examined by Meghdadi and
Aza (2016). The improvement of data input chores, such as better organizational services, has
been one of the most important objectives that have been sought in most systems. Therefore,
one of the most crucial needs for a management system to gather complete and correct data
and provide complete information is the usage of smart tools. Utilizing modern technology is
advised to create intelligent management systems and to decrease human error. The results of
this study demonstrate that student attendance checks and class lists are used at colleges and
institutions to keep track of students' attendance.Meghdadi and Aza (2016) examined the use
of RFID and the amount of time and energy that must be expended to avoid wasting
important time. Therefore, it is crucial to employ effective methods. By developing and
putting into practice an RFID attendance system to replace the current one, time and energy
wastage might be reduced, and an intelligent and integrated attendance system could be
encouraged. The system is set up to pay academics' wages at the University with their
automatic radio frequency identification after a certain number of hours of presence and
absence, delays, and hurry. This system is economic and is meant to bring about changes in
this sector. Following the marking of the student's biometric identification, Mijanur (2017)
conducted an attendance study. For student identification, a fingerprint-based identification
system is utilized. The best and fastest method for identifying biometrics is thought to be
fingerprint features. Anyone who does not alter their lifetime can use these features with
more safety. Although the science of fingerprint identification is advanced today, it still takes
a lot of time to identify a person from a set of fingerprints. Improving A fingerprint
identification system was crucial for the installation of huge databases, such as those used by
an institution or a nation. In this project, the algorithm is utilized to provide a speedier
implementation of an identity system than any other currently on the market. A student
fingerprint database was used to test the proposed fingerprint-based automated attendance
system. Significant accomplishments were made by the Department of computer science and
Mathematics students. Using the paradigm platform for C# programming, the suggested
approach was put into practice. The technological aspects of RFID advancement that were
mentioned above demonstrate how far the technology has come, but more work still needs to
be done to revive the architectural design of an RFID system that can scale to meet changing
needs.

2.4 Summary of the literature reviewed

Due to its exceptional benefits over other existing technologies for identification and data
gathering, Radio Frequency Identification (RFID), a developing technology, has recently
piqued the interest of the academic community. As the technology is still in its early stages of
adoption, the format of this chapter is to evaluate the current RFID literature and explore the
problems in the current RFID systems. In addition to the benefits already mentioned, since
the development of RFID, Technology from the 1900s also has had certain drawbacks or
problems. This chapter's goal is to add to the body of knowledge on radio frequency
identification. Academic investigation and understanding of some of the important problems
preventing the development of RFID technology. There is a critical need to overcome these
difficulties if RFID technology is to boost product velocity and visibility.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy