Vous êtes sur la page 1sur 8

.

Development of Student Monitoring System with the use of Low Frequency Radio
Frequency Identification (RFID) and Short Messaging Service (SMS)

Rhowel M. Dellosa
College of Computer Studies
Lyceum of the Philippines – Laguna

ABSTRACT

This study aimed to develop a Student Monitoring System using low frequency Radio Frequency Identification
(RFID) and Short Messaging Service (SMS) in order to keep track of the students within the school premises. A
computer program is to be developed to interact with the system. A series of tests was conducted to prove the
accuracy of the entire system. With the aid of Chi-square test, the researcher determined the significant difference
between the observed and expected data. The developed software can capture and record the name, entry and exit
time of the students. Moreover, the developed software can monitor the entry and exit time, account balance and
schedules of current classes of the student thru Short Messaging Service (SMS). Future studies related to the topic
may focus on the use of high frequency radio frequency (RF) reader instead of low frequency radio frequency (RF)
reader. This will facilitate convenience to the students by just wearing or hanging the identification card with RF
tag every time the student enters and exits the school premises.

Keywords: student monitoring system, radio frequency identification (RFID), short messaging service(SMS),
program development,

INTRODUCTION

Identification of objects aside from its name enables the industry to operate more efficiently. In most
cases, special numbers and codes are the representation of identification. Implementing automatic
identification system in a certain institution creates fast and easy access. RFID enables computers to sense
objects and collect the identification codes that are assigned to the objects.
In this research, the researcher used the Radio Frequency Identification in identifying students The
Radio Frequency (RF) tag is to be integrated to the student identification card. RF tag is the key to access
information in the database in the computer where the RF reader was attached. The identification card is
used to tap to the RF reader since the researcher used a low frequency RF reader. The researcher
developed a computer program that monitored the presence of the students in school and other
information thru Short Messaging Service (SMS).
The researcher is connected with an academic institution wherein students are passing through a
common gate for entrance and exit. In this institution, identification card is the pass to enter the school
premises. The security guard on duty is always checking the student identification card but there is no
record keeping of the students who enter and exit the gate. To keep track of the students who enter and
exit the school premises, application of RFID can be considered as an appropriate solution to these
problems. The researcher would like to come up with the solution on how a low frequency radio
frequency identification (RFID) be used in order to keep track of the students within the school premises.
In addition, the researcher would also like to determine how a computer program could be developed in
order to capture and record the name, entry and exit time of the students. Moreover, the researcher would
like to determine on how the recorded data will be used to monitor the student inside the school premises.
.
Conceptual Framework

The study is anchored on the input-processs-output model since a student monitoring program was
developed. The input includes the descriptions and components of the computer program, specifically the
low frequency radio frequency identification (RFID) and the features of the short messaging service

36
LPL Research Journal Vol 1 No. 1 July 2011

(SMS). The system was developed following certain accuracy measurements and when finally
developed, the accuracy of its use was verified.

INPUT PROCESS OUTPUT


Logs of exit and
RF reader Develop the system entry
RF tag Reports of
Data acquired Attendance
through Infrared Develop the software Balance reports
SMS text SMS to parents
Data from the
computer Test the prototype

Figure 1 Conceptual Framework of the study

Radio Frequency Identification (RFID) is a wireless technology employing radio-frequency


communication. An RFID system is composed of three main components; (1) An antenna or coil, (2) A
transceiver (with decoder) and (3) An RFID tag. The antenna will transmit radio signal to activate the tag
so the data could be read or written. Data storage and retrieval purposes are performed using a special
device, the RFID tag. A reader, including an antenna is used to read and/or write data to RFID tags. A tag
is a device that transmits data to a reader. The communication between them RFID uses a defined radio
frequency and protocol to transmit and receive data from tags.
The RFID (Radio Frequency Identification) is a means of storing and retrieving data through
electromagnetic transmission to an RF compatible integrated circuit, and is now being seen as a radical
means of enhancing data handling processes. A range of devices and associated systems are available to
satisfy an even broader range of applications (Chiesa, et al, 2002).
Housley (2004) said that the SMS, also known as short messaging service, is the rage in Europe and
parts of Asia. Gradually SMS is gaining momentum in the US as a low cost messaging solution. SMS is
defined as text messages, up to 160 characters in length, sent to mobile phones. In recent months SMS has
become synonymous with any text message sent to a cell phone.
According to Haas (2004) the Infrared Data Association (IrDA) is an industry standard for wireless,
infrared communication between devices. IrDA speeds range from 9600 bps to 4 Mbps. IrDA can be used
by many modern devices including laptops, LAN adapters, PDAs, printers, and mobile phones.
RFID is a new information medium (Assoc. Electron, 2001’ EMI Japan, 1998) . It is applied in the
noncontact commuter pass-card Suica of JR (Japan Railways). JAL (Japan Air Lines) also decided to use
this technique in next-generation hand-baggage tags. In the medical care sector, Inada and colleagues
developed an application to in-facility locating of wandering elderly persons (Inada, et al, 1996) , and the
author proposed its use to support the life
of elderly persons (Hosaka, 1995) . The RFID in this system uses the low-frequency band, usually
allocated only to marine wireless communications and other limited uses, adverse effects or incorrect
operation due to electromagnetic noise can be largely avoided by using RFID in this frequency band
(Assoc. Electron, 2001).
Several studies had been conducted on the use of the RFID. According to Morris (2006) from
University of KwaZulu-Natal, there is an application of radio frequency identification (RFID) in tracking
system that can be used to track objects as they pass through some region. A log is to be kept of the
transactions that can be processed at a later stage. One of the primary uses of an RFID tracking system is
access control. Abebe and Elmuti (2005) explored the role of Radio Frequency Identification (RFID)
system in improving the performance of supply chain management. The strategic advantages of
integrating Information Technology (IT) into the global supply chain system are also addressed in the
paper.

37
.

The low frequency band RFID tags were also used to monitor patient environment in the medical
field. In this system, tags are automatically identified, which avoids placing an extra burden on the nurses
and other medical professionals. In this study, the identification performance of RFID tags is improved
and the feasibility of their use as a practical system is verified by an experiment in an environment
simulating an actual site (Hosaka, 2004).
Bose & Pal (2005) also reported the use of RFID tags in supply chain. A chip is embedded in each
manufactured item displayed in retail stores.
Rosales (2005) integrated the SMS Technology in the LED Matrix Display. The user can post
announcement in the LED Matrix via SMS Technology regardless of sender’s proximity, while Dellosa
(2007) developed a Radio Frequency Identification (RFID) Interface System. A low frequency radio
frequency (RF) reader is to be connected to RFID Interface system. Tam (2005), on the other hand,
considered the extent of this ever-increasing problem and illustrates how RFID technology can assist in
providing greater visibility and security as products move through the pharmaceutical supply chain.
From the design of Hayashi (2005), who integrated RFID in Parking Lot System from assessing the
challenges, implementing only the e-Payment system is considered the appropriate strategy for the US.

Objectives of the Study

The general objective of the study to develop a Student Monitoring System using low radio frequency
identification and Short Messaging Service (SMS) in order to keep track of the student within the school
premises.
Specifically, the study aimed:
1. to develop a student monitoring system that will capture and record the name and entry and exit
time of the students
2. to develop a student monitoring system that monitors the student’s entry and exit time, account
balance and schedules of present classes thru Short Messaging Service (SMS)
3. to test the accuracy of the student monitoring system

Significance of the Study

This study has great significance to the technology, students and researcher, and the institution.
The technology is also benefited since this is another innovation in the field of computer engineering.
This study serves as a ladder for future design of the radio frequency identification.
The student is also benefited since the design can be a reference and guide for students who are
interested in software and hardware design using Short Messaging Service (SMS) and Radio Frequency
Identification (RFID). It is also open for those students who would want to enhance the researcher’s
designs and operation and predict some new ideas.
The student monitoring system is a contribution to the institution since it could live to its name of
being a technology institution that makes full use of technology and various programs to assist in
monitoring the students in the campus.

METHOD

The research is a developmental type which devised a system for monitoring the entry and exit of
students using RFID. The study was conducted in Lyceum of the Philippines-Laguna from January 15,
2007 to June 25, 2007. A Computer with Windows Operating System (XP), Visual Basic 6.0 Professional
Edition, Nokia Sofware Development Kit, One low frequency (inside contactless accesso reader) with a
reading range of 4 cm (max), nine RF tags (pico pass), Nokia Phone Model 8310 and Infrared Data
Acquisition were utilized in the study. The process of transmission of messages via SMS Technology
from sender to receiver’s cellular phone is independent into the network provider. The software is written

38
LPL Research Journal Vol 1 No. 1 July 2011

in Visual Basic 6.0 and is capable of collecting information through its database. It is also capable of
letting other people inquire about the logs of student, student’s schedule and student’s account balance
thru Short Messaging Service (SMS) provided that the cellular phone has a load. The information to be
received by the requesting party thru text was limited to 255 text characters. The software will only
execute in Windows Operating System. In case of wrong code information from requesting party, a
warning message will then be replied to the requesting party. Other expectations such as power outage
and cellular phone signal availability in case of weak signals are no longer part of this study.

Procedure
The following figure presents the flowchart of activities.

1. Establish 2. Define the 3. Develop the 4. Develop the 5. Test the


the Prototype Prototype Software Prototype
Prototype Functionality
Requirements

8. Maintain the 7. Modify, Test 6. Evaluate and


System and Enhance Provide
Feedback

Figure 2. Flowchart of activities

1. Establish the Prototype Requirements s


In this stage, the prototype requirements for the device were identified. The components are as
follows:
1.1. RF Reader (Inside Contactless Accesso reader) is used to read the serial codes and other
information in the RF tags with corresponding software application
1.2. RF Tag (Pico pass) is used as a key of individual’s information located in the database as being
assigned initially. This contains unique serial code that read by the RF reader in case of access
1.3. IrDA (Infrared Data Acquisition) is used to connect the cellular phone to the computer.
1.4. Cellular phone (Nokia 8310) is used to receive and transmit messages as requested by individual.
NOKIA PC connectivity 3.0 is a service development kit used to connect the cellular phone
required.

2. Define the Prototype Functionality


The accesso reader (RF reader) was used as a receiver of data and pico pass (RF tag) as a transmitter
of data. The accesso reader operates at 13.56 MHz with a reading distance of four centimeters (4 cm.)
with respect to the pico pass (RF tag). For the Short Messaging Service (SMS), Nokia 8310 with Nokia
PC connectivity 3.0 software development kit was used. In order to meet the device specified
functionalities the block diagram of the system was designed.

3. Develop the Prototype


A prototype is an original model on which something is patterned. It establishes an overall system
architecture. The prototype was developed according to the design as shown in figure 3. A student with
the RFID can gain entry to the campus by having the ID read. Information shall be inputed into the
computer. A request through a cellular phone can be done by sending SMS and the requested information
shall be inputed likewise in the computer. All data acquired through the infrared shall be sent to the
computer and replies can made through the cellular phone.

39
.

Computer RF reader, (This is


From and to RF reader
To USB port considered as the access
point of the student.
Sent message

Commands (read and delete)

Infrared Data Cellular Request information RF Tag


Acquisition phone (Cellular phone)
(IrDA) NOKIA 8310
Read message Request message (e.g. 100 sch)

Figure 3 Block Diagram of the Entire System

4. Develop the Software

The following components were considered in developing the software:


1. NOKIA PC Connectivity 3.0 (Service Development Pack), active x component of the Inside
Contactless RF reader installed to the computer, Nokia 8310 IrDA handle manager was also
installed in the computer and Visual Basic 6.0 Professional Edition was also installed in the
computer.
2. A database was created that will store the main information that includes: student information,
schedule of classes, message requested and replied, student’s access and student balance.
3. The software module in reading the RF tags was made. This requires the RF reader (Inside
Contactless) to be connected in the computer.
4. The software module for the reading messages to the cellular phone via IrDA connection was done.
The infrared mode of the Nokia Model 8310 cellular phone must be activated. The software is
capable of reading and storing what was being read in the inbox of the cellular phone before
deleting. Deleting the text messages after the system read is necessary for the purpose of memory
availability.

5. Test the Prototype

The test included the test of the logs of students and the sending of data and request of information
thru text messages. The test logs of students were made for twelve (12) hours that started from 7:00a.m.
to 7:00p.m. A total of sixty (60) test logs for twelve (12) hours were gathered. Chi-square test is used as a
statistical tool to determine the significant of fit between the observed data and the expected data. It used
counts or frequencies as data rather than means and standard deviations.

For the test of response of the system to the requested information the following steps should be
considered:
1. For student logs: from the message box of the cellular phone just type student number,
ATTENDANCE and send to the cellular number of the cellular phone connected to the computer.
2. For student account balance: from the message box of the cellular phone just type student number,
ACCBAL and send to the cellular number of the cellular phone connected to the computer.
3. For student’s present class schedule: from the message box of the cellular phone just type student
number, SCHED and send to the connected cellular number of the cellular.
The student number is the key for the message to be requested. The student numbers considered in
this study are 100,101,102,103,104,105,106,107 and 108. A successful test will be considered if the
response to the request satisfied the request information of the requesting party.

40
LPL Research Journal Vol 1 No. 1 July 2011

6. Provide Evaluation and Feedback


After the test, the system evaluation and feedback were tested for any possible modification in the
entire system.

7. Modify, Test and Enhance


In case of observed errors, modification and enhancement were incorporated to meet the objectives.
It is necessary to modify and enhance the system to cope with newly discovered problems or new
requirements.

8. Maintain the System


System maintenance is part of the design. The system undergoes changes when it is used. Change
could happen because of some unexpected input values into the system. In addition, the changes in the
system could directly affect the software operations. The software should be developed to accommodate
changes that could happen during the post implementation period.

RESULTS AND DISCUSSION

The developed system that captures the name and entry and exit time of students was tested.
Accuracy of the entire system was tested. Results of test logs are shown in table 1. Five test logs every
hour were recorded. Data shows a total of 60 test logs in 12-one hour interval. Out of the 12-one hour,
there were two cases that had only three successful logs and one case of 2 successful logs. This yields a
total of 53 actual successful logs out of the 60 test logs made. Chi-square analysis revealed that there is
goodness-of-fit between the actual and the desired number of logs.

Table 1. Summary of the Test of the Access Point per hour


Expected Actual
Time number of numbr of
test logs test logs
7:00 A.M.–8:00 A.M. 5 5
8:01 A.M.–9:00 A.M. 5 3
9:01 A.M.–10:00 A.M. 5 5
10:01A.M.–11:00 A.M. 5 5
11:01 A.M.–12:00 A.M. 5 3
12:01 P.M.–1:00 P..M. 5 5
1:01 P.M.–2:00 P.M. 5 5
2:01 P.M.-3:00 P.M. 5 5
3:01 P.M.–4:00 P.M. 5 5
4:01 P.M.–5:00 P.M. 5 5
5:01 P.M.–6:00 P.M. 5 5
6:01 P.M.–7:00 P.M. 5 2
TOTAL 60 53

Another test made was the response of the system to the requests made through SMS. Requests could
vary from schedule, logs or balance query. Table 2 shows that out of ten trials made, there were seven
requests of schedule, two requests of balance and one request for log. In all trials made, the system
responses were successful.

41
.

Table 2. System Response to the Request


No. of Trials Request Response Remarks
1 Schedule Schedule Successful
2 Schedule Schedule Successful
3 Schedule Schedule Successful
4 Logs Logs Successful
5 Balance Balance Successful
6 Schedule Schedule Successful
7 Schedule Schedule Successful
8 Schedule Schedule Successful
9 Balance Balance Successful
10 Schedule Schedule Successful

CONCLUSIONS AND RECOMMENDATION

The developed software can capture and record the name, entry and exit time of the students within
the school premises. It can likewise monitor the entry and exit time, account balance and schedules of
current classes of the student thru Short Messaging Service (SMS). The system is accurate based on the
requests and the logs made. The RFID is recommended for use in the institution.
Future studies related to the topic may focus on the use of high frequency radio frequency (RF) reader
instead of low frequency RF reader. This will facilitate convenience to the students by just wearing or
hanging the identification card with RF tag every time the student enters and exits the school premises.

42
LPL Research Journal Vol 1 No. 1 July 2011

REFERENCES

Abebe, M., & Elmuti, D. 2005. RFID reshapes the global supply chain. Industrial Management, vol. 37.
No. 5 pp.27-31.
Association Electron Information Technology Industry Survey Rep I. 2001. Network sensing in a
resource recycling society. Tokyo. p9-48.
Bose, I. & Pal, R. 2005. Auto-ID: Managing Anything, Anywhere, Anytime in the Supply Chain.
Communications of the ACM; Vol. 48 Issue 8, p100-106.
Boylestad, R and Nashelsky, N. 1992. Electronic Devices and Circuit Theory.
Chiesa, M., Genz, R., Heubler, F., Mingo, K., Noessel, C., Sopieye, N., Slocombe, D., and Tester, J.
(2002). “RFID a Week Long Survey on the Technology and Its Potential”, Available at
people.interaction-ivrea.it/c.noessel/RFID/RFID_research.pdf
Dellosa, R. 2007. Design of Radio Frequency Identification Interface System: A Prototype. Pamantasan
ng Lungsod ng Maynila Graduate School of Engineering.
EMI Japan. 1998. Data carriers publicized up to presnt. OHM Co., p. 27.
Haas, M. 2004. Infrared SEDs of quasars and radio galaxies: Unification and dust evolution seen by ISO,
SCUBA and MAMBO. Proceedings of the International Astronomical Union 2004: 267-270
Hayashi, R. 2005. RFID and Parking. WINMEC RFID Lab, UCLA
Hosaka, R. 1995. Personal identification system for stray aged persons. Tech Rep In-house medical care
and ME technology. Japan Society MBE. 4:9-12.
Hosaka, R. 2004. Feasibility study of convenient automatic identification system of medical articles
using LF-band RFID in hospital. Systems & Computers in Japan; Vol. 35 Issue 10, p74-82.
Houseley, S. 2004. What are RSS Feeds? http://archive.netdummy.com
Inada, H., Horio, H., Ishikawa, S., Sekita, Y., Nakatani, T., Hosaka, E., Matsuo, K. 1996. Prevention of
straying by elderly suffereing from demential. Proc. 35th Convention Japan Society, MBE. P 339.
Low-cost RFID Tag with Antenna.Source:Innovation; 2006, Vol. 6 Issue 1, p6-9,
Maloney, T. 2003. Industrial Electronics. 5th Edition.
Morris, T. (2006). Battlefield Medical Information System: Mobile Healthcare Case Study. US Army
Medical Research and Materiel Command, Available from: http://www.himss.org/
Rosales, R. 2005. Integration of SMS Technology in LED Matrix Display. Pamantasan ng Lungsod ng
Maynila. Graduate School of Engineering.
Sommerville, I. 1995. Software Engineering. 5th Edition.
Tam, B. (2005). E-Pedigree via RFID. Systems Course Project – Fall 2005.

43

Vous aimerez peut-être aussi