Académique Documents
Professionnel Documents
Culture Documents
I.
INTRODUCTION
RFID is an embryonic technology that has been
utilized in numerous applications such as travelling,
agriculture, retail services, smart plates, edible RFID
tags, navigation system for visually impaired, waste
disposal and defense. RFID is loftier to other tracking
applications such as barcode, magnetic stripe and
biometrics in terms of human-interface, contact
distance and data security. It is an astounding structure
that embraces of tag (transponder), antenna and the
reader (interrogator) arrangements. The frequency
ranges of the RFID technology varies from LF, HF, and
UHF to VHF and also the readers can be handheld,
fixed or integrated as per our requirement and the
application. The general process of the RFID
technology is described as below. The RFID tag
uninterruptedly spreads the RF signals through the
inbuilt or other antennas that are associated externally
and directs information to one or more tags by
modulating an RF carrier using double-sideband
amplitude shift keying (DSB-ASK), single-sideband
amplitude shift keying (SSB- ASK), or phase-reversal
III.
PROPOSED SYSTEM
The proposed framework includes
biometric module and RFID module that comforts to
manage the whole workplace without the prerequisite
of other hardware and software trappings. The
generalized block diagram of proposed model is
illustrated in fig.1
RFID
SENSOR
PC
ALERT
SYSTEM
BIOMETRIC
SENSOR
Fig 1. Block Diagram of Proposed System
a) RFID Sensor:
RFID scheme consists of an antenna and a
interrogator, that declaim the radio frequency and
relocate the facts to a processing device, and a
transponder, or tag, which is an integrated circuit
encompassing the RF electrical structure and data to be
transferred. Information collected from the tags is then
propagated via a communication interface to a host
computer system, where the data can be stored in a
database for later analysis.
b) Biometric Module:
Biometrics
is meant for the validation
procedures that bank on the persons own identity and
their bodily physiognomies that can be inevitably
patterned. The processor customs any of the fingerprint
credentials structures for security to regulate who the
concerned person is, and based on uniqueness [12]
records the attendance. In this system, time and
attendance software that is harmonized with a time
clock for personnel which habits biometric expertise for
endorsement tenacities.
c) PC:
The Personal Computer is used to store the
database of the employees and to execute bidirectional
communication between reader and server system. The
communication infrastructure used is a serial LAN
cable. This module is integrated into the PC together
work to monitor the workplace. The database and the
visual basics systems are programmed using asp.net
programming language. The computer is integrated
with the alert system, which harvests output under
mismatched conditions.
d) Alert System:
The RFID sensor archives the employee ID
and the assets. Any operative when seized other
employee assets, the information passages to the
database and relates the result. Under mismatched
condition, it bounces output to the alert system.
IV.
SYSTEM ARCHITECTURE
The system architecture of an RFID system labels
the hardware and software organization of the
industrialized prototype. The hardware scheme entails
of RFID module (transponder, antenna and
interrogator) and the biometric module. Software
scheme utterly prepared over java indoctrination. The
system architecture can be elucidated with two diverse
facsimiles such as:
a) Hardware Architecture
b) Software Architecture
a) Hardware Architecture
To gratify the system desires, the Electronic
Product Code (EPC) Gen2 passive RFID tag and Ultra
High Frequency (UHF) reader will be selected.
Different parameters are analyzed such as Read
distance up to 3m, multiple tag reading capacity, four
port Fixed Reader Configuration are deliberated. The
frequency is cautiously chosen such that emanates
under the free spectrum certified by FCC and ETSI. The
regulatory compliance of the reader is within control.
The wireless entree socket that families the processor
with the database server will also nominated. Multiple
tag readers are further included to permit the method
trail the employee when moving in and out of the
entrance as shown in fig 2.
b) Software Architecture
The software design built upon a statement
driver that knobs all announcement purposes made in
V.
EXPERIMENTAL RESULTS
Each employees information, including their
trade and zip code, will be placed in a data base that is
linked to their identification number. This new RFID
technology will be able to track all employees by their
given identification number, thus providing the
resources to obtain an accurate assessment of the
amount of employees with the local residential zip
code. This framework records all safety and security
violations, which is significant for record keeping and
the production of leading indicators for safety and
building protocols. The experimental results of this
project is shown in Fig 3. RFID tracking technology
applied on construction assets creates a more
systematic, automated, and intelligent job site and
results in benefits to both the project team and other
industries. The developed hardware system and data
mining algorithms are able to detect personnel and
assets as far as three to five meters away from the reader
antenna, which is unlike the current,
conventional
manual
access control. With this kind of range,
workers will no longer have to swipe a badge at each
sensor as they will be able to simply pass through check
points and portals.
VI.
CONCLUSION
The Employee Management System will maintain the
records of the employees in the database with the
unique RFID tag. The present system of management
is time overwhelming and higher possibility for
miscalculation. It is likewise problematic to cope with
the outsized paper track intricate in this practice. The
proposed Employee Management System will consent
the higher authoritative staff to admit the relevant
information professionally and successfully. All of
these sub-systems (leave request, virtual request, food
request, car request, and permission on-duty request)
requisite to be designed and implemented to succeed
meritoriously. The procedure of evolving the
functionality for retrieving or apprising operative
chronicles tenuously by administrative authorities
using mobile devices like PDA or Mobile phone. The
system can also be designed to send automated emails
reminding the officials of their appointments schedule.
The proposed framework also be designed to send
automated emails reminding the officials of their
appointments schedule. The proposed framework also
provides the ability to measure the employee in and
out time, with this information an enterprise manage