Vous êtes sur la page 1sur 35

Student Monitoring System Using RFID Module

A research project presented to the faculty of the College of Engineering and Technology Our Lady of the Pillar College Cauayan City, Isabela

____________________________

In partial fulfilment on the requirements of the degree Bachelor of Science in Computer Engineering

____________________________

Alfonso Jose M. Dalupang Mark Jay S. Caoili Roldan Soriano Ernest Jan P. Lucas

S.Y. 2013-2014

Chapter 1 THE PROBLEM AND ITS BACKGROUND Introduction RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose

as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. RFID technology has been available for more than fifty

years. It has only been recently that the ability to manufacture the RFID devices has fallen to the point where they can be used as a "throwaway" inventory or control device. Alien Technologies recently sold 500 million RFID tags to Gillette at a cost of about ten cents per tag. One reason that it has taken so long for RFID to come into common use is the lack of standards in the industry. Most

companies invested in RFID technology only use the tags to track items within their control; many of the benefits of RFID come

when items are tracked from company to company or from country to country.

The Theoretical Model People gather information by personally going to the

location of it, or using multiple, which is inconvenient and time consuming.


Traditional way of information gathering

Authority physically identify entity

Entity giving information to Authority

Authority verifies Entitys location

Authority denies or grants access

The system way of generating Information

Authority gets authorization and location from the proposed system

Authority denies or grants access

Fig. 1.0: Theoretical Framework of the Study

Figure 1.0 describes the difference in a visual and factual way. The existing system is represented by simply the actions we take today, to obtain information. The existing This the method also requires the authority taken by to the verify entity. of the

physically. After this,

requires

actions

authority

evaluates

the

permissions

entity and grants or denies access.

Taking

school

for

example,

security

personnel

are

required to visibility see proof of identification. This proof is given to the personnel by the student. Once obtained, this information is being evaluated on positive or negative results. With the proposed system, the authority obtains the

information directly. There is no evaluation or action on the entitys part required. In schools, the security personnel gets information from a monitor and acts accordingly.

The Conceptual Model


Entity 1 with RFID

Authority

Output

RIM Software

RF Antenna

Entity 2 with RFID

Entity 3 with RFID

Fig. 2.0: Conceptual depiction of the proposed system Figure 2.0 shows the concept of the proposed system on a high level explosion. The RFID tags pass information to the RF antenna, which is processed by the proposed system. The result

of the processing will be displayed on an output device. Through it the user is given a summary of processed data. The proponents goal with this systems implementation is to improve the speed in gathering data. The system uses newest technology to achieve this. The existing method of obtaining information is time consuming and tiring, factors which the

proposed system will eliminate. The effectiveness of implementing RFID system in olpcc

depends upon the school what progress, change and benefit it can bring to the education of the school, by knowing the perception of students and faculty of olpcc about it. Paradigm

INPUT

PROCESS

OUTPUT

Students Profile based on: a. Sex b. Age c. Civil status d. Course e. Field of specialization /course Analysis of data/information in the questionnaires and interview techniques Summary of the response of students on the proposed RFID monitoring system.

Feedback

The researchers were guided by the paradigm in this study. On the input box are the students/respondents profiles. On the process box are the analysis and tabulation of data/information in the questionnaires and interview techniques and finally on the output box is the summary of the response of students on the proposed RFID monitoring system. Statement of the Problem This study aimed to make an assessment of the

implementation of the Radio Frequency Identification in Our Lady of the Pillar College Cauayan. More problems: 1. What was the profile of the respondents with respect to the following variables: a. Sex b. Age c. civil status d. Course e. field of specialization/course 2. What problems were met in the implementation of the RFID? specifically, it attempted to answer the following

3.

What

suggestions

were

given

by

the

respondents

to

improve the implementation of the RFID system? Assumption The researchers aim to know if RFID is the best solution to what we call absentness in our society especially in schools. To meet the aim of the researchers, they assume that the RFID

system will help every parent that worries about their children if they are attending classes during school hours. With the RFID system, parents will be confident that their children will learn more because they will know if their children go to school or not. Scope and Delimitation Scope. The proposed system will allow administrators to

monitor entities within the premises. Monitoring and locating entities Automated Data gathering and authorization verification. The overall design of the system, RF antenna and lag

connection as well as the program structure and compatibility need to be designed very well. Delimitation. The system is just designed for monitoring purposes. It does not give detailed information about the entity in range or pinpoint its 100 percent accurate location. It

serves

merely

as

an

indicator

of

the

entitys

approximate

position and identification. Significance of the Study The significance and of the study of the deals with the careful of

formulation

presentation

possible

application

knowledge that denotes why developing the proposed device is important and worthwhile. This piece gives further explanations of the possible latent and manifest applications of the study. The proponent believes that the proposed system will

enhance security and make the processing of information easier. Social Significance. The study the proponents conduct is for great value. Since its main purpose is monitoring. It

automatically provides better overall security. It raises the awareness of monitoring methods like RFID. Educational Significance. The study showcases the use of the relatively new RFID technology, which might inspire other researches to explore newer technologies as well. Technological Significance. Since the system base is the RFID technology, which is not yet common in citizens, it

introduces a new and more efficient way to use this technology for everyday tasks.

Economic Significance. The production price is relatively low which as a result can generate.

Definition of Terms For a better understanding of the study, the following

terms were defined operationally. RFID It is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data

from a tag attached to an object, for the purposes of automatic identification and tracking. Tags - It contains identifying information or may just be a key into a database. An RFID system may replace or supplement bar codes and may offer another method of inventory management and self-service device, checkout taking by the patrons. place of It can also act as a

security

the

more

traditional

electromagnetic security strip. System It is a number of things adjusted as a connected whole. Radio waves - It is an electromagnetic radiation at radio frequencies. Antenna - It is for receiving and transmitting signal.

Integrated

circuits

These

are

complex

circuits

etched

onto tiny chips of semiconductor (silicon). Electromagnetic field external number magnetic field by a to It is a coil that modulates an a coded This identification small type is

transfer

when

queried

reader

device.

incorporated in consumer products, and even implanted in pets, for identification.

Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIES The following literature and studies were incorporated due to their relevance to the present study and quality of

information that these content. Related Literature Related literature is the summary of all the former

writings showing what is already known and still unknown about the proposed topic. Some related literature made a huge impact with respect to in the study especially the device in and determining its the

requirements

developing

accompanying

software. During the length of the search for related literature and studies the proponents found out that the topic is the first of its kind and ideas close to the project has never been put in mound. The researchers gathered the following related

literatures to add on their familiarity the study. RFID tags have been around since the late 70s originally developed for Russian spies. How exactly RFID chips work can be found on HowStuffWorks.com Long checkout lines at the grocery store are one of the biggest complaints about the shopping experience. Soon, these lines could disappear when the ubiquitous Universal Product Code

(UPC) bar code is replaced by smart labels, also called radio frequency identification (RFID) tags. RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart. Imagine going to the grocery store, filling up your cart and walking right out the door. No longer will you have to wait as someone rings up each item in your cart one at a time. Instead, these RFID tags will communicate with an electronic reader that will detect every item in the cart and ring each up almost network instantly. that will The send reader will be on connected your to a large to the

information

products

reader and product manufacturers. You bank will then be notified and the amount of the bill will be deducted from your accounts. No line, no waiting. RFID tags, a technology once limited to tracking cattle, are tracking consumer products worldwide. Many manufacturers use the tags to track the location they make of each product they make from the time its made until its pulled off the shelf and tossed in shopping cart. Outside the realm of retail merchandise, RFID tags are

trucking vehicles, airline passengers. Alzheimers patients and pets. Soon, they may even track your preferences for chunky or creamy peanut butter. Some critics say RFID technology is

becoming too much a part of our lives that is, if were even aware of all the [arts of our lives that it affects. In this article, youll learn about the types of RFID tags and how these tags can be tracked through the entire supply chain. Well also look at the non-commercial uses of RFID tags and how the Department of State and Homeland Security are using them. Lastly, well examine what some critics consider an

Orwellian application of RFID tags in animals, humans and our society. The use of RFID tags is highly polarizing and

controversial, the strongest argument being the total control over every individuals personal information, similar as in

George Orwells 1984. George Orwells 1984, tells the story of a society in which all citizens are patrolled by the Thought police, who ensure that no one has any independent or rebellious thoughts that arent sanctioned by the Party. In this society, everyone answers to Big Brother the ultimate authority on education, government and recreation. When critics of RFID call the

technology Orwellian, they mean that the technology is too invasive and that of businesses private and government just are made too

knowledgeable watching us.

our

actions,

like

Big

Brother

Conservative Christian critics even claim that RFID and its possible use is a sign for the end of times. According to

Revelation 13: 16-17 the Antichrist will place the mark of the beast on the right hand or on the forehead of humans which they need for commerce. And causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.

- Revelation 13: 16-17 The use RFID chips however is undeniably various. A list of possible application can be found in an article of the Seattle Times Website, although with a negative connection. Microchips Everywhere: a Future Vision By TODD LEWAN AP National Water Heres a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually

everything you buy, wear, drive and read, allowing retailers and

law

enforcement

to

track

consumer

items

and,

by

extension,

consumers wherever they go, from a distance. A seamless, global network of electronic sniffers will scan radio tags in myriad public setting, identifying people and their tastes instantly so that customized ads, live spam, may be beamed at them. In Smart will Homes, sensors built into walls, floors and

appliances

inventory

possessions,

record

eating

habits,

monitor medicine cabinets all the while, silently reporting data to marketing eager for a peek into the occupants private lives. Science fiction? In truth, much of the radio frequency identification

technology that enables objects and people to be tagged and tracked wirelessly already exists and new and potentially

intrusive uses of it are being patented, perfected and deployed. Some of the worlds largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about

sales and buyers to company databases. Already, microchips are turning up in some computer

printers, car keys and tires, on shampoo bottles and department store clothing tags. Theyre also in library books and

contactless payment cards (such as American Express Blue and ExxonMobils Speed test.)

Related Studies Since RFID arguably the hottest and the most controversial piece of technology currently around, a lot of studies have been conducted. The German Federal Institute for Information Security published a study of RFID, its capabilities and vulnerable,

entitled Security Aspects and Prospective Applications of RFID System. Here a passage of the study regarding types of attacks on RFID tags. 7. Threat situation and invention of common security measures 7.1 Overview Once of the goals of the present study is to investigate the future threat situation resulting from the application of RFID systems (within a time frame of three to five years), as well as to assess the effectiveness security measures. The

present chapter describes the results of this phase of the work. Sections 7.2 to 7.7 provide an overview of possible attacks and countermeasure. Section 7.8 contains an evaluation of the threat situation, especially with regard to the practically and coat of the

attacks and countermeasures. A list of the experts who were consulted regarding these matters can be found at the beginning of the study in the Section Authors and Experts Section 7.9

contains

brief

description

of

the

current

availability

of

security measures.

One

application

was

explored

in

an

eBook

containing

collections of sample case studies by Abhisam software, 2007. The following passage is taken the section titled Anti-Theft System The RFID Solution Each item to be protected is tagged with an RFID anti-theft tag. The tag can be re-used in many cases. The tag is typically attached by a strong string or a plastic band or other means (similar to a price tag, sometimes it is the price tag), to the item (say for example an umbrella). Now once a shoplifter takes this umbrella and walks to the exit, large RFID door antennas placed near the exit detect the presence of the tag and sound an alarm. In case of a genuine shopper, if he takes the umbrella to the checkout counter, the clerk, after receiving payment for the item, cuts the plastic band and removes the tag. The umbrella can now be carried by the shopper outside passing by the door antennas, without triggering any alarm. The store staff will then typically attach the same tag to a new umbrella that would be now kept on the store shelf. Alternatively, in case of

disposable tag, the checkout clerk will hold the item nears a

tag

killer

machine,

which

kills

(destroy)

the

tag

by

subjecting it to strong electromagnetic radiation. The tag, then though physically present on the item, will not trigger the alarm while passing through the door antenna field. As one can see, there are various fields of application for RFID tags already available. The components think it is time to make the next step and incorporating it in schools.

Chapter 3 METHODS OF RESEARCH AND DESIGN Research methods are very vital in gathering data about the proposed proponents system device. to The methods apply of are research of great that help the in

decided

use

and

determining how and where they can find the data and information needed in order to produce a possible solution to problems of the existing systems. This chapter contains information regarding the methods of research used, the data gathering instruments used, the

analytical tools, as well as methods used in developing the devices and its software. This chapter also contains the methods used for product evaluation, technical, operational and economic feasibility of the proposed system. Methods of Research Used Statistics are requires and are of significance in the

development of the proposed system. The proponents made use of different approaches or methods of research for this study in order to process all the accumulated data, produce reliable

information and build the proposed system. Descriptive Method. This method was used by the proponents to further understand the existing system. It is a fact-finding

with proper interpretation of the data gathered which were used to analyse how the existing system. Through this method the

researchers were able to examine and construe the information that they have gathered, hoping that it will lead them to the achievement of this study. Internet Research Method Data gathering for this study

started over Internet. Since the data and information available over the Internet is unlimited in relation to the study to find more adequate data for the proposed device. The history and topics regarding existing devices. Door lock systems were mostly found in the web. Creative Research Method. Creativity means being able to use ones imagination in to an develop artistic to new and original This the ideas or was and

things, employed

especially by the

context.

method layout

researches

conceptualize

design of the proposed system. The proponents realized that it is not always possible to find all needed materials in any study or research, but by means of creativity, the proponents hope that they will be able to come up with a system that will meet the needs of their target user. With this, this determines the proponents unique imagination that would help them in making the impossible possible.

Prognostic

Research

Method.

Prognosis

is

an

act

of

pretending hoe a given situation will develop or turn out in the future. Prognostic Research method refers to any scientific

investigation in which the main and stated purpose is to predict the future operation of factors. This method will be used in the form of scientific observation prognosis on how the system will perform in the future in terms of effectiveness and reliability. Evaluation forms and Market Analysis were also considered in order to determine if the proposed system is technically,

operationally and economically feasible. Historical Research Method. This method interprets past

trends of attitude, events and facts. From one point of view, history deals with unique phenomena, collected and reported

without ordered reflective thoughts. The proponents made use of this method to fully understand the development history of

peripheral hardware devices in existence today. And these were used as strong information for the development of the proposed devices. Data Gathering Instruments The data are are gathering instruments to be used and in by the

researchers forms. These

questionnaires, tools which

observation, are sufficient

evaluation gathering

information for the completion of the study.

Observation.

This

method

is

the

taking

notice

of

the

current systems/devices, describing and identifying the problems encountered. It serves as an additional judgment in order to improve the existing system/devices. It is also used to agree or contradict the data gathered from interviews, questionnaires and other research methods. With this, the proponents in general carefully and critically used observation with respect to the parts and parcels concerning the assistive and adaptive proposed device with its accompanying software. Questionnaire. A questionnaire, basically, is a set of

carefully organized and logically ordered questions. This is a tool to investigate on the interest and knowledge of the people on the existing and proposed system. This helped the proponents anticipate the probability of effectiveness of the proposed

system. In the case of the study, the questionnaire prepared by the proponents would help the proponents themselves on how to develop and further enhance the proposed device with respect to the data results of the questionnaires respondents. Evaluation Form. This tool aided the researchers in

determining the distinction between the existing and proposed system. It basically determines the operational feasibility of the proposed device and its software. The criteria used as bases in the evaluation form are Efficiency, Reliability,

Accessibility,

User-friendliness,

Ergonomic,

Compatibility,

Assistive and Adaptability. Statistical tools used Based on the need of the study, the researchers employed simple applications of statistics. These are frequency count, percentage count, and mean and t-test analysis to provide a clearer view and deeper interpretation and meaning of the

analyzed data. Frequency count. It is used in determining the number or cases

belonging to a certain classification like male and female. Percentage. It is used to determine the relative magnitude of certain cases. * 100 Where: P = percentage f = frequency n = number of respondents 100 = constant multiplier

Slovins sample or

Formula.

This

was that

used will

to

determine

the

number

of of

respondents

represents

the

consumers

Olpcc in Cauayan City.

Where : S = Slovin n = total number of population 1 = constant

Analytical Tools These tools serve as illustration of the systems structure and essentially a diagram of how the system flows. Since the

proposed study is a device, the proponents used the following Analytical tools: the Context Flow Diagram (CFD), visual table of Contents (VTOC), Input Process output (IPO) and Program

Flowchart. Context Flow Diagram (CFD). This tool is used to

graphically illustrate the highest level in a data flow diagram and contains one process, representing the entire system. The

modelling tool will provide the proponents to have a concept of systems environment. Data Flow Diagram is also regarded as

bubble chart and bubble diagram. Visual Table of Contents (VToC). It presents a tree-

structured diagram which illustrates the program flow. It is a stylized structure chart, moving from general to specific,

graphically, describing the system. Furthermore, it illustrates the hierarchical process in the level of detail, increase from the top to bottom and as said, from general to specific. Input Process Output (IPO. It is a chart which gives

processing sequence and detailed information about the input, process activities and output for any given unit in the Visual Table of Contents. Program Flowchart. It is graphical representation of the logic and data flow of the entire program. A block diagram used in the designing of of the software, on it the puts into view the It

succession

steps

performed

computer

program.

provided the proponents a representation of the algorithm in amore visual form. It is an overview of the programs major processes and other actions inside the program.

Methods Used In Developing the System This part of the study is concerned with the actual

development and procedures on implementing the proposed system. The traditional software engineering models do not deal

with the risks involved in the projects. Many projects have failed because the risks involved were not taken into account at all. Barry Boehm tried to fix this by incorporating the

strengths of other models namely the Waterfall model and coming up with the spiral model, and changing the management emphasis to risk analysis. This model development combines the features of the prototyping model and the waterfall model. The spiral model is favoured for large and complicated projects.

Figure 2.0 Barry Boehms Spiral Model

Planning. This phase is where the objectives, alternative, and constraints are determined. Requirements are gathered during the planning phase. A prototype is produced at the end of the risk analysis phase. Risk Analysis. In the risk analysis phase, a process is undertaken to identify risk and alternate solutions. A prototype is produced at the end of the risk analysis phase. . What

happens here is that alternative solutions and constraints are defined, and risks are identified and analyzed. If risk analysis indicates uncertainly in the requirements, the prototyping model might be used to assist the situation. Engineering. Software is a product in the engineering

phase, along with testing at the end of the phase. Here the costumer decides when the next phase of planning and risk

analysis occurs. If it is determined that the risks are too high, the project can be terminated. Evaluation. The evaluation phase allows the costumer to

evaluate the project to date before the project continues to the next spiral. In this phase, the customer will assess the

engineering results and make changes if necessary.

Justification of Method Used Out of many methods, the proponents have chosen Barry

Boehms Spiral model. Since the proponents are going to enhance existing peripheral system, the development and creation of the proposed system must be carefully taken into account. It is in a way complex and complicated for the proposed system is something new among the line. In view of the fact that the spiral life cycle model is the combination of the classic waterfall model and an element called risk analysis. This model is very appropriate for the proposed system have higher risk than those of simpler projects. This is the reason why risk analysis is very essential in creation and development of the system, and for the record, only the Spiral model offer risk analysis. Moreover, the strengths of the spiral model include the direct consideration of risks of all levels greatly reduces problems. It is also good for large complex projects. This models evaluation allows for any changed deemed necessary, or would allow for new technological advances to be used. Lastly, it allows the user or customer and the developer to determine and to react to risk each evolutionary level.

Methods Used for Product Evaluation The evaluation of the proposed system is based on its

performance and feasibility. To prove the effectiveness of the proposed system, the proponents tested its technical, economic and operational feasibility. Technical Feasibility. This evaluation method will determine if the software and hardware specifications of the needed in the is

development

and

implementation

proposed

system

currently available. Moreover, this is also a way to find out if the current technical resources can be upgrade or added to in a manner that fulfils the request under consideration. Operational Feasibility. This method refers to the significant difference between the existing system and proposed system. The proposed system will be evaluated according to the following criteria: Efficiency The ability of the system to generate results with effectiveness and productivity. Reliability The dependability of the system to perform

required functions. User-friendliness The trouble-free interaction of a user with the system.

Ergonomic The ability of the device in which it maximizes productivity by minimizing operator fatigue and discomfort. Compatibility The condition in which it has an efficient

integration and operation with the user and the system. The criteria ranges from 1 to 5, where 5 excellent, 4 very good, 3 good, 2 fair, and 1 poor. Evaluation Formula

t-Computed =

WMP WME

Let: t = test value N = total number of correspondents WMP = weighted mean of the proposed system WME = weighted mean of the existing system. WMP = summation of the WMP WME = summation of the WME

Mean(M) = f(x1 + x2 + + xn) n

where: f=frequency x(1,2n) = any numerical rating given by the

researchers n = total number of respondents Weighted mean = f(x1 + x2+ + xn) n where: f(x1 + x2+ + xn)/n = represents the sum of all means of each criteria n = total number of criteria Economic Feasibility. This is used in order to determine if the proposed system is more profitable or cost efficient than the existing system. Through the software development cost, the researchers can easily determine which is more expensive, the existing or the proposed system. All of these expenses are shown in the market analysis. The following formula will be used for the market analysis.

Formula for the Computation) A. Computation for the Salvage Value of the Hardware Salvage Value = ((Hardware Acquisition Cost/Life

expectancy)* Devt period)/ 12 B. Computation for The Annual Depreciation Cost of Hardware Annual Depreciation Cost = (Hardware Acquisition Cost

Salvage Value)/ Life Expectancy

C. Computation for Monthly Depreciation Cost of Hardware Monthly Depreciation Cost = Annual Depreciation Cost/ 12 D. Computation for Hardware Development Hardware Development Cost= Monthly Depreciation Cost*Devt period) E. Computation for Salvage value of Software Salvage Period/12 F. Computation for the Annual Depreciation Cost of Software Annual Depreciation Cost = Software Acquisition Cost Value = (Software Cost/Life Expectancy)*Devt

Software Value / Life expectancy G. Computation for the Monthly Depreciation Cost of Software Monthly Depreciation Cost = Annual Depreciation cost / 12 H. Computation for the Software Development Cost Software Development Cost = Monthly Depreciation Cost *

Devt period I. Computation for the Labor Cost Labor cost = Development fee * Devt Period J. Computation for the Kwh Use of Computer Kwh Used of Computer = No.of watts * No. of hours a month *qty / 1000w K. Computation for software Cost Software Cost = Total Devt Cost/ No. of copies L. Computation for Selling Price

Selling Price = (software cost * mark-up) + software cost + CD + packaging M. Computation for the profit for the First Year Profit for the First Year = Total Annual Benefit Total devt Cost N. Computation for the playback Period Playback Period = (Total Devt Cost / Total annual Benefit) * 12 O. Computation for the Investment Return Return of Investment = ( Total Annual Benefit / Total Devt Cost) * 100%

Vous aimerez peut-être aussi