Académique Documents
Professionnel Documents
Culture Documents
Development of Student Monitoring System with the use of Low Frequency Radio
Frequency Identification (RFID) and Short Messaging Service (SMS)
Rhowel M. Dellosa
College of Computer Studies
Lyceum of the Philippines – Laguna
ABSTRACT
This study aimed to develop a Student Monitoring System using low frequency Radio Frequency Identification
(RFID) and Short Messaging Service (SMS) in order to keep track of the students within the school premises. A
computer program is to be developed to interact with the system. A series of tests was conducted to prove the
accuracy of the entire system. With the aid of Chi-square test, the researcher determined the significant difference
between the observed and expected data. The developed software can capture and record the name, entry and exit
time of the students. Moreover, the developed software can monitor the entry and exit time, account balance and
schedules of current classes of the student thru Short Messaging Service (SMS). Future studies related to the topic
may focus on the use of high frequency radio frequency (RF) reader instead of low frequency radio frequency (RF)
reader. This will facilitate convenience to the students by just wearing or hanging the identification card with RF
tag every time the student enters and exits the school premises.
Keywords: student monitoring system, radio frequency identification (RFID), short messaging service(SMS),
program development,
INTRODUCTION
Identification of objects aside from its name enables the industry to operate more efficiently. In most
cases, special numbers and codes are the representation of identification. Implementing automatic
identification system in a certain institution creates fast and easy access. RFID enables computers to sense
objects and collect the identification codes that are assigned to the objects.
In this research, the researcher used the Radio Frequency Identification in identifying students The
Radio Frequency (RF) tag is to be integrated to the student identification card. RF tag is the key to access
information in the database in the computer where the RF reader was attached. The identification card is
used to tap to the RF reader since the researcher used a low frequency RF reader. The researcher
developed a computer program that monitored the presence of the students in school and other
information thru Short Messaging Service (SMS).
The researcher is connected with an academic institution wherein students are passing through a
common gate for entrance and exit. In this institution, identification card is the pass to enter the school
premises. The security guard on duty is always checking the student identification card but there is no
record keeping of the students who enter and exit the gate. To keep track of the students who enter and
exit the school premises, application of RFID can be considered as an appropriate solution to these
problems. The researcher would like to come up with the solution on how a low frequency radio
frequency identification (RFID) be used in order to keep track of the students within the school premises.
In addition, the researcher would also like to determine how a computer program could be developed in
order to capture and record the name, entry and exit time of the students. Moreover, the researcher would
like to determine on how the recorded data will be used to monitor the student inside the school premises.
.
Conceptual Framework
The study is anchored on the input-processs-output model since a student monitoring program was
developed. The input includes the descriptions and components of the computer program, specifically the
low frequency radio frequency identification (RFID) and the features of the short messaging service
36
LPL Research Journal Vol 1 No. 1 July 2011
(SMS). The system was developed following certain accuracy measurements and when finally
developed, the accuracy of its use was verified.
37
.
The low frequency band RFID tags were also used to monitor patient environment in the medical
field. In this system, tags are automatically identified, which avoids placing an extra burden on the nurses
and other medical professionals. In this study, the identification performance of RFID tags is improved
and the feasibility of their use as a practical system is verified by an experiment in an environment
simulating an actual site (Hosaka, 2004).
Bose & Pal (2005) also reported the use of RFID tags in supply chain. A chip is embedded in each
manufactured item displayed in retail stores.
Rosales (2005) integrated the SMS Technology in the LED Matrix Display. The user can post
announcement in the LED Matrix via SMS Technology regardless of sender’s proximity, while Dellosa
(2007) developed a Radio Frequency Identification (RFID) Interface System. A low frequency radio
frequency (RF) reader is to be connected to RFID Interface system. Tam (2005), on the other hand,
considered the extent of this ever-increasing problem and illustrates how RFID technology can assist in
providing greater visibility and security as products move through the pharmaceutical supply chain.
From the design of Hayashi (2005), who integrated RFID in Parking Lot System from assessing the
challenges, implementing only the e-Payment system is considered the appropriate strategy for the US.
The general objective of the study to develop a Student Monitoring System using low radio frequency
identification and Short Messaging Service (SMS) in order to keep track of the student within the school
premises.
Specifically, the study aimed:
1. to develop a student monitoring system that will capture and record the name and entry and exit
time of the students
2. to develop a student monitoring system that monitors the student’s entry and exit time, account
balance and schedules of present classes thru Short Messaging Service (SMS)
3. to test the accuracy of the student monitoring system
This study has great significance to the technology, students and researcher, and the institution.
The technology is also benefited since this is another innovation in the field of computer engineering.
This study serves as a ladder for future design of the radio frequency identification.
The student is also benefited since the design can be a reference and guide for students who are
interested in software and hardware design using Short Messaging Service (SMS) and Radio Frequency
Identification (RFID). It is also open for those students who would want to enhance the researcher’s
designs and operation and predict some new ideas.
The student monitoring system is a contribution to the institution since it could live to its name of
being a technology institution that makes full use of technology and various programs to assist in
monitoring the students in the campus.
METHOD
The research is a developmental type which devised a system for monitoring the entry and exit of
students using RFID. The study was conducted in Lyceum of the Philippines-Laguna from January 15,
2007 to June 25, 2007. A Computer with Windows Operating System (XP), Visual Basic 6.0 Professional
Edition, Nokia Sofware Development Kit, One low frequency (inside contactless accesso reader) with a
reading range of 4 cm (max), nine RF tags (pico pass), Nokia Phone Model 8310 and Infrared Data
Acquisition were utilized in the study. The process of transmission of messages via SMS Technology
from sender to receiver’s cellular phone is independent into the network provider. The software is written
38
LPL Research Journal Vol 1 No. 1 July 2011
in Visual Basic 6.0 and is capable of collecting information through its database. It is also capable of
letting other people inquire about the logs of student, student’s schedule and student’s account balance
thru Short Messaging Service (SMS) provided that the cellular phone has a load. The information to be
received by the requesting party thru text was limited to 255 text characters. The software will only
execute in Windows Operating System. In case of wrong code information from requesting party, a
warning message will then be replied to the requesting party. Other expectations such as power outage
and cellular phone signal availability in case of weak signals are no longer part of this study.
Procedure
The following figure presents the flowchart of activities.
39
.
The test included the test of the logs of students and the sending of data and request of information
thru text messages. The test logs of students were made for twelve (12) hours that started from 7:00a.m.
to 7:00p.m. A total of sixty (60) test logs for twelve (12) hours were gathered. Chi-square test is used as a
statistical tool to determine the significant of fit between the observed data and the expected data. It used
counts or frequencies as data rather than means and standard deviations.
For the test of response of the system to the requested information the following steps should be
considered:
1. For student logs: from the message box of the cellular phone just type student number,
ATTENDANCE and send to the cellular number of the cellular phone connected to the computer.
2. For student account balance: from the message box of the cellular phone just type student number,
ACCBAL and send to the cellular number of the cellular phone connected to the computer.
3. For student’s present class schedule: from the message box of the cellular phone just type student
number, SCHED and send to the connected cellular number of the cellular.
The student number is the key for the message to be requested. The student numbers considered in
this study are 100,101,102,103,104,105,106,107 and 108. A successful test will be considered if the
response to the request satisfied the request information of the requesting party.
40
LPL Research Journal Vol 1 No. 1 July 2011
The developed system that captures the name and entry and exit time of students was tested.
Accuracy of the entire system was tested. Results of test logs are shown in table 1. Five test logs every
hour were recorded. Data shows a total of 60 test logs in 12-one hour interval. Out of the 12-one hour,
there were two cases that had only three successful logs and one case of 2 successful logs. This yields a
total of 53 actual successful logs out of the 60 test logs made. Chi-square analysis revealed that there is
goodness-of-fit between the actual and the desired number of logs.
Another test made was the response of the system to the requests made through SMS. Requests could
vary from schedule, logs or balance query. Table 2 shows that out of ten trials made, there were seven
requests of schedule, two requests of balance and one request for log. In all trials made, the system
responses were successful.
41
.
The developed software can capture and record the name, entry and exit time of the students within
the school premises. It can likewise monitor the entry and exit time, account balance and schedules of
current classes of the student thru Short Messaging Service (SMS). The system is accurate based on the
requests and the logs made. The RFID is recommended for use in the institution.
Future studies related to the topic may focus on the use of high frequency radio frequency (RF) reader
instead of low frequency RF reader. This will facilitate convenience to the students by just wearing or
hanging the identification card with RF tag every time the student enters and exits the school premises.
42
LPL Research Journal Vol 1 No. 1 July 2011
REFERENCES
Abebe, M., & Elmuti, D. 2005. RFID reshapes the global supply chain. Industrial Management, vol. 37.
No. 5 pp.27-31.
Association Electron Information Technology Industry Survey Rep I. 2001. Network sensing in a
resource recycling society. Tokyo. p9-48.
Bose, I. & Pal, R. 2005. Auto-ID: Managing Anything, Anywhere, Anytime in the Supply Chain.
Communications of the ACM; Vol. 48 Issue 8, p100-106.
Boylestad, R and Nashelsky, N. 1992. Electronic Devices and Circuit Theory.
Chiesa, M., Genz, R., Heubler, F., Mingo, K., Noessel, C., Sopieye, N., Slocombe, D., and Tester, J.
(2002). “RFID a Week Long Survey on the Technology and Its Potential”, Available at
people.interaction-ivrea.it/c.noessel/RFID/RFID_research.pdf
Dellosa, R. 2007. Design of Radio Frequency Identification Interface System: A Prototype. Pamantasan
ng Lungsod ng Maynila Graduate School of Engineering.
EMI Japan. 1998. Data carriers publicized up to presnt. OHM Co., p. 27.
Haas, M. 2004. Infrared SEDs of quasars and radio galaxies: Unification and dust evolution seen by ISO,
SCUBA and MAMBO. Proceedings of the International Astronomical Union 2004: 267-270
Hayashi, R. 2005. RFID and Parking. WINMEC RFID Lab, UCLA
Hosaka, R. 1995. Personal identification system for stray aged persons. Tech Rep In-house medical care
and ME technology. Japan Society MBE. 4:9-12.
Hosaka, R. 2004. Feasibility study of convenient automatic identification system of medical articles
using LF-band RFID in hospital. Systems & Computers in Japan; Vol. 35 Issue 10, p74-82.
Houseley, S. 2004. What are RSS Feeds? http://archive.netdummy.com
Inada, H., Horio, H., Ishikawa, S., Sekita, Y., Nakatani, T., Hosaka, E., Matsuo, K. 1996. Prevention of
straying by elderly suffereing from demential. Proc. 35th Convention Japan Society, MBE. P 339.
Low-cost RFID Tag with Antenna.Source:Innovation; 2006, Vol. 6 Issue 1, p6-9,
Maloney, T. 2003. Industrial Electronics. 5th Edition.
Morris, T. (2006). Battlefield Medical Information System: Mobile Healthcare Case Study. US Army
Medical Research and Materiel Command, Available from: http://www.himss.org/
Rosales, R. 2005. Integration of SMS Technology in LED Matrix Display. Pamantasan ng Lungsod ng
Maynila. Graduate School of Engineering.
Sommerville, I. 1995. Software Engineering. 5th Edition.
Tam, B. (2005). E-Pedigree via RFID. Systems Course Project – Fall 2005.
43