Smart Attendance Using Rfid
Smart Attendance Using Rfid
BY
SATHYABAMA
INSTITUTE OF SCIENCE AND TECHNOLOGY
(DEEMED TO BE UNIVERSITY)
Accredited with Grade “A” by NAAC
JEPPIAAR NAGAR, RAJIV GANDHI SALAI, CHENNAI - 600 119
APRIL 2023
DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING
BONAFIDE CERTIFICATE
Internal Guide
Dr. S. NIRMAL RAJ
We AKASH KUMAR.A (Reg. No. 39140001) and SANJAY.K (Reg. No. 39140048)
hereby declare that the Project Report entitled “SMART ATTENDANCE USING
RFID” done by us under the guidance of Dr. S. NIRMAL RAJ is submitted in partial
fulfillment of the requirements for the award of Bachelor of Engineering degree in
Electrical and Electronics Engineering.
1.
2.
DATE:
ii
ACKNOWLEDGEMENT
We would like to express our sincere and deep sense of gratitude to our
Project Guide Dr. S. NIRMAL RAJ for his valuable guidance, suggestions and
constant encouragement paved way for the successful completion of our project
work.
iii
ABSTRACT
Attendance systems are commonly used in schools, colleges and offices etc.
Manual attendance method only used in many places. It is quite boring and it takes
much time for the staffs and they needs to take care of their records for long time.
Fingerprint sensor and using Radio Frequency Identification (RFID). By using RFID
card, we can authenticate a person. First we need to Enroll all the information like
student ID, class, and finger print details. When student enter to the class room it
will read the student information using RFID attached with student id card then it will
check the finger print of the student after the verification success it will ask the lunch
automatically stores the information in a IOT cloud. So the staffs can access these
data’s at any time. Here we are using web server to store the Students data’s. If
unauthorized persons touch the senor, it will not take as a valid ID.
iv
TABLE OF CONTENTS
ABSTRACT iv
LIST OF TABLES vii
LIST OF FIGURES vii
LIST OF ABBREVIATIONS ix
1 INTRODUCTION 1
2 LITRATURE REVIEW 2
2.1 SURVEY PAPERS 2
3 EXISTING SYSTEM 7
3.1 INTRODUCTION 7
3.2 BLOCK DIAGRAM 9
3.3 DISADVANTAGES 10
3.4 PROBLEM IDENTIFICATION 10
3.5 IEEE STANDARDS 11
4 PROPOSED SYSTEM 12
4.1 INTRODUCTION 12
4.2 OBJECTIVE 12
4.3 SCOPE OF THE PROJECT 13
4.4 METHODOLOGY 13
4.5 APPLICATIONS 14
4.6 BLOCK DIAGRAM 14
4.7 ADVANTAGES 15
4.8 DISADVANTAGES 15
4.9 RELATED WORKS 16
v
CHAPTER NO TITLE PAGE NO
5 HARDWARE DETAILS 19
5.1 HARDWARE REQUIREMENT 19
5.1.1 ESP 32 19
5.1.2 FINGERPRINT SENSOR R307 21
5.1.3 LCD 22
5.1.4 RFID 25
5.1.5 GSM 29
5.2 SOFRWARE REQUIREMENT 30
5.2.1 EMBEDDED C 30
6 CONCLUSION 32
7 SUMMARY 33
8 REFRENCES 35
vi
LIST OF TABLES
vii
LIST OF FIGURES
viii
LIST OF ABBREVIATIONS
ix
CHAPTER 1
INTRODUCTION
1
CHAPTER 2
LITRATURE REVIEW
2
Srivignessh PSS et al.,(2019) Found a system that, RFID and Pose
Invariant Face Verification for automatic attendance system. This system
works under two-factor verifications. In the first step, students need to
use RFID tag which is read by RFID reader. If the first step is succeeded
then it moves to second step of verification, if not, student becomes under
unrecognized category. The second step is Face verification, if the face
match with particular RFID tag then it marks attendance into database.
Missing the above both readings, the system identifies the fraud students.
This two-factor automatic system reduces the misuse of identity theft for
the purpose of getting attendance [5].
“Arduino Based Smart RFID Security and Attendance System with Audio
Acknowledgement” is developed by Yashi Mishra et al. (2017) SD card
module with RFID tag which carry different voice codes is used in this
system. The tag ID and code of the voice greeting stored in SD card
module. While a student enters the class room door, his / her RFID tag is
3
being read. If the ID of the tag matched with stored data in the SD card
then particular person needs to use the voice greeting, if it is matched
then the door will be opened and the attendance will store in excel sheet.
Student can view the attendance detail using the LCD placed in Arduino.
Here Arduino working as microcontroller to connect LCD, RFID reader,
SD card module and so on. This system is also working as two-factor
verification process. Moreover, this system is very simple schematics
than other system because of very simple components and design. Also
here we get fast response with accuracy [7].
Anil Kumar Shukla (2015) had been created a prototype system called
Microcontroller Based Attendance System Using RFID and GSM. This
system consists three at Mega16 microcontroller placed in between RFID
reader, GSM modem and computer. Each microcontroller has its own
purpose. The system starts whenever a teacher used his/her RFID tag to
enter the class room and students will enter the class room by swapping
their tag within five minutes. RFID reader reads RFID tag and sends the
signal to first microcontroller which analyses the signal of RFID reader
and opens class room door using IR signal which is influenced by a
motor. The signal is temporarily stored in microcontroller, when teacher
finishes his / her class he /she must swap the RFID tag again to the
reader and system decides automatically that the class is over. Thus,
microcontroller passes the temporary stored signal to computer database
as attendance. Electronic copy available at:
https://ssrn.com/abstract=3372734 In case of absent of student, the
signal passes to GSM modem and it will send the message to parents of
the students who were not at the class. If any students go out before
teacher use finishing RFID tag which doesn’t count the status (present)
of the students. This system itself added advanced and reliable security
features. Thus students are not able to cheat the administration and
parents [8].
Sandhya Konatham et al. proposed a system that working with RFID and
GSM. Here they have used microcontroller (LPC) as an intermediate
4
amid GSM module and RFID. Whenever students enter the classroom,
they need to use their tag which read by RFID reader and it send to the
present signal to GSM module. If the ID of the tag does not match with
database it considered as unauthorized access. If it is okay then GSM
module send massage administration and parents. [9].
5
Application. In this system students are needed to meet the teachers for
tapping of RFID tags. If it is matched with tag stored in the database, then
it sends to the attendance to the principal in the form of excel as well as
it sends a message to the specific student’s parent via Telegram
messenger [12].
CHAPTER 3
6
EXISTING SYSTEM
3.1 INTRODUCTION
1) The proposed design has a robust and efficient AI-DL based face
recognition module, customized for virtual learning applications
with an added fake-face identification subsystem that monitors
only genuine faces in the virtual classroom.
7
can effectively reduce dropping out of participants during virtual
learning.
8
3.2 BLOCK DIAGRAM
9
3.3 DISADVANTAGES
► The old RFID Tag reader is not enough just because it is not
accurate and can be easily manipulated.
10
3.5 IEEE STANDARDS
IEEE 802.15.4(MAC) - This standard defines the physical and MAC (Media
Access Control) layer specifications for low-rate wireless
personal area networks (LR-WPANs), which can be used for RFID-
based attendance tracking.
11
CHAPTER 4
PROPOSED SYSTEM
4.1 INTRODUCTION
In this proposed system RFID, Finger print sensor, GSM technologies are
used. When student enter to the class room it will read the student information using
RFID attached with student id card then it will check the finger print of the student
after the verification success it will ask the lunch type (veg/non veg).All the
information send to the parents through SMS/ Email.
4.2 OBJECTIVES
12
4.3 SCOPE OF THE PROJECT
1. The main scope of the project is to reduce the time taken to take
Attendance during the class hours.
2. This gives the teacher more time to focus on class and teach more.
4.4 METHODOLOGY
► The ESP32 chip acts as the core of the component. This chip
contains a total of 48 pins, which serves separate functions.
► The RFID tag is given to the students. The RFID reader Reads
and collects data from the RFID tag.
4.5 APPLICATIONS
13
The main application of the project is to avoid manual data collection and
to use cloud and IOT based data collection to ensure no loss of data. And
help in the process of Food Management.
GSM
FINGER
VEG
PRINT
SENSOR
Web Server
PC WEB SERVER
4.7 ADVANTAGES
Reports
14
Well, the thing of calculations and generating reports is certainly a
frustrating job for many users. With IoT based attendance system, calculating your
attendance based revenues and generating reports will be much easier and fun. The
amount of time it saves will have a tremendous effect on your employee satisfaction
role.
Mobiles and personal computers have been a great help to the IoT based
smart attendance system. The devices can keep a good track of the location of the
person checking back on the quality and viability of things around. Also, it can
improve safety and quality of life.
Since the IoT system senses your presence based on an activity, the
chance for human errors and redundant data is reduced. The time and attendance
system based on the IoT technology has shown that 99% of data is accurate with
minimal human intervention.
4.8 DISADVANTAGES
15
Our primary criteria is to review all studies that have used IoT technology
to track student attendance in order to determine which technology is the highest
quality and most effective. Numerous studies have suggested various strategies and
techniques for the intelligent monitoring system.
16
NFC BLE RFID
Range -15 cm -50 cm -100 cm
Network type Point to Point WPAN Point to Point
Frequency HF UHF/HF LF/UHF/HF
Set-up Time -0.1S -9S -0.1s
Communication Two-Way Two-way One-Way
Power Consumption Varies with
Very-Low Very-low
Frequency
Cost of Device Very-Low High Low/High
A wireless communication technology called RFID (Radio Frequency Identification) has a range
of roughly 100 cm. It is frequently used to keep track of stock and assets, including automobiles
and shipping containers. Depending on the application, RFID can operate at low frequency (LF),
high frequency (HF), or ultra-high frequency (UHF). Setup occurs very quickly, usually in less than
0.1 seconds. One-way communication is supported by RFID, thus information can be read from
but not written to an RFID tag. Depending on the frequency being used, RFID devices use different
amounts of power. Depending on the application, RFID-enabled devices might be expensive or
inexpensive.
17
Fig.4.2: Hardware Kit
IEEE 802.11(LAN)
IEEE 802.15.4(MAC)
IEEE 2917.1(EBAN)
18
CHAPTER 5
HARDWARE DETAILS
5.1.1 ESP 32
The ESP32 chip comes with 48 pins with multiple functions. Not all pins
are exposed in all ESP32 development boards, and some pins cannot be used.
There are many questions on how to use the ESP32 GPIOs. What pins
should you use? What pins should you avoid using in your projects? This post aims
to be a simple and easy-to-follow reference guide for the ESP32 GPIOs.
ESP32 Peripherals
3 SPI interfaces
3 UART interfaces
2 I2C interfaces
2 I2S interfaces
19
Although you can define the pins properties on the software, there are
pins assigned by default as shown in the following figure.
The ESP32 chip contains two processing cores that can run at upto 240
MHz each, along with a variety of built-in peripherals such as Wi-Fi , Bluetooth, and
Ethernet connectivity, analog to digital converters, digital to analog converters, and
many more. It also has a large amount of on-board memory and supports various
types of external memory, making it suitable for running complex applications. The
ESP32 chip is programmed using the Arduino IDE and it also supports various
programming languages such as C, C++ and Python, etc.
20
5.1.2 Finger Print Sensor R307
21
5.1.3 LCD
Pin Description
The most commonly used LCDs found in the market today are 1 line, 2
line or 4 line LCDs which have only 1 controller and support at most of 80characters,
whereas LCDs supporting more than 80 character make use of 2HD44780
controller. Most LCDs with 1 controller has 14 Pins and LCDs with2 controller has
16 Pins. Pin description is shown in the table below.
22
Fig.5.4: LCD display pins
6. E (Enable) When enable pin goes from high to low the LCD takes
command or data
23
7. D0 Data pin0
8. D1 Data pin1
9. D2 Data pin2
24
RFID System
What is RFID?
Radio-Frequency Identification (RFID) is the use of radio waves to read and capture
information stored on a tag attached to an object. A tag can be read from up to
several feet away and does not need to be within direct line-of-sight of the reader to
be tracked.
25
Items, cases or pallets of products, high value goods
Passive Tags
Active Tags
Battery powered
RFID Reader
Reader Functions
Frequency Ranges
26
Low frequency, or LF, (125 – 134 kHz)
High-frequency tags work fairly well on objects made of metal and can
work around goods with medium to high water content. Typically, HF RFID
systems work in ranges of inches, but they can have a maximum read range of
about three feet (1 meter). Typical HF RFID applications include tracking library
books, patient flow tracking, and transit tickets.
27
UHF frequencies typically offer much better read range (inches to 50+
ft. depending on the RFID system setup) and can transfer data faster (i.e. read
many more tags per second) than low- and high-frequencies. However, because
UHF radio waves have a shorter wavelength, their signal is more likely to be
attenuated (or weakened) and they cannot pass through metal or water. Due to
their high data transfer rate, UHF RFID are well suited for many items at once,
such as boxes of goods as they pass through a dock door into a warehouse or
racers as they cross a finish line. Also, due to the longer read range, other
common UHF RFID applications include electronic toll collection and parking
access control.
RFID APPLICATIONS
Logistics management
Retail
Security
Access control
28
Location Tracking
5.1.5 GSM
At the heart of the module is a SIM800L GSM cellular chip from Simcom.
The chip’s operating voltage ranges from 3.4V to 4.4V, making it an ideal candidate
for direct LiPo battery supply. This makes it a good option for embedding in projects
that are short of space.
All the necessary data pins of the SIM800L GSM chip are broken out to
a 0.1″ pitch headers, including the pins required for communication with the
microcontroller over the UART. The module supports baud rate from 1200bps to
115200bps with auto-baud detection.
29
There’s a SIM socket on the back! Any 2G Micro SIM card will work
perfectly. The correct direction to insert the SIM card is usually engraved on the
surface of the SIM socket.
Features
• Make and receive voice calls using an external 8Ω speaker & electret
microphone
5.2.1 Embedded C
30
During infancy years of microprocessor based systems, programs were
developed using assemblers and fused into the EPROMs. There used to be no
mechanism to find what the program was doing. LEDs, switches, etc. were used to
check for correct execution of the program .But they were too costly and were not
quite reliable as well .As time progressed, use of microprocessor-specific assembly-
only as the programming language reduced and embedded systems moved onto C
as the embedded programming language of choice. C is the most widely used
programming language for embedded processors/controllers
31
CHAPTER 6
CONCLUSION
32
CHAPTER 7
SUMMARY
The project aims to develop a smart attendance system using RFID technology. The
system will be designed to track the attendance of students in a classroom
environment. RFID tags are used to identify each student and record their
attendance. The system will also be able to generate SMS and alert the parents if
students are absent. The system will be designed to be user-friendly and cost-
effective. The project will involve the development of the hardware and software
components of the system. The Hardware part includes a ESP32 pin, gsm, RFID
reader, RFID tag, Fingerprint recognition, options to choose between Veg and Non-
veg. The first process is to use the provided RFID tag which contains evey
information about the user. The arrival time, Date, Name of the user, Reg.no.,
department, Type of food are noted in a google sheet or the cloud storage. At first
the user needs to scan his RFID tag then he should verify using the fingerprint
recognition for secondary verification. The next step would be choosing the type of
food he needs for lunch. All interactions are done using a LCD display which is
simple and friendly to use.
The proposed system includes a double verification system with fingerprint recognition,
which provides enhanced security compared to the existing system that only has a
single verification system. Additionally, the proposed system uses RFID tags with
greater accuracy and range, which can be read at a rate of up to 200 tags per second,
compared to the RFID tags used in the existing system that have lesser range and
accuracy.
In terms of convenience, the proposed system offers the advantage of using the RFID
tags as a keychain, making them easy to carry, while the RFID cards used in the
existing system are larger in size and tough to carry. Moreover, the proposed system
requires minimal hardware tools as it uses Bluetooth and wi-fi, while the existing system
requires additional hardware parts like antennas.
33
The proposed system also offers the advantage of acquiring additional data like arrival
time, type of food, and departure time, which can be used for data analysis purposes. In
contrast, the data collected by the existing system is much lesser. Lastly, the proposed
system offers more scalability compared to the existing system, which is a large process
to change.
Overall, the proposed system appears to be an upgraded version of the existing system,
which offers several advantages in terms of technology, authentication, convenience,
integration, data analysis, and scalability.
While both old RFID system and the new RFID system have
their advantages and Disadvantages, the new system typically offers more
advanced technology, higher security, greater convenience and improved
scalability and data analysis capabilities.
34
REFERENCES
[1] Arulogun, O.T., Olatunbosun, A., Fakolujo, O.A. and Olaniyi, O.M., IJSER,
Vol. 4, No. 2, 2013, pp. 1–9.
[2] Chiagozie, O.G. and Nwaji, O.G., Academic Research International, Vol. 2,
No. 2, 2012, pp. 168–183.
[3] Ding, K., Jiang, P., IEEE/CAA Journal of Automatica Sinica, Vol. 5, No. 1,
2017, pp. 128–138.
[4] Irawan, J.D., Prasetio, S. and Wibowo, S.A., “IP based module for building
automation system”, In: Proceedings of Second International Conference on
Electrical Systems, Technology and Information 2015 (ICESTI 2015). F.
Pasila, Y. Tanoto, R. Lim, M. Santoso, N. Pah (Eds), Singapore: Springer
(2016). pp. 337–343.
[5] Nainan, S., Parekh, R. and Shah, T., IJCSI, Vol. 10, 2013, p. 1.
[6] Nguyen, H.M., Kim, S.H., Le, D.T., Heo, S., Im, J. and Kim, D., “Optimizations
for RFID-based IoT applications on the Cloud”, 5th International Conference
on the Internet of Things, Seoul, South Korea, 2015.
[7] Saparkhojayev, N., and Guvercin, S., IJCSI, Vol. 9, No. 3, 2012, pp. 227–
230.
[8] Sharma, T. and Aarthy, S.L., “An automatic attendance monitoring system
using RFID and IOT using Cloud”, Online International Conference on Green
Engineering and Technologies (IC-GET), Coimbatore, India, 2016.
[9] Singh, A., Meshram, S., Gujar, T. and Wankhede, P.R., “Baggage tracing
and handlingsystem using RFID and IoT for airports”, International
Conference on Computing, Analytics and Security Trends (CAST), Pune,
India, 2016.
35