Vous êtes sur la page 1sur 34

RFID BASED ATTENDANCE

SYSTEM
Arun Chanchlani

Himanshu Chauhan

Ayush Bansal

Guided By: Prof. Vivek Kaundal

College of Engineering
University of Petroleum & Energy Studies
Dehradun
2014-15

1|Page
RFID BASED ATTENDANCE SYSTEM

A project report submitted in partial fulfilment of the requirements for the Degree of
Bachelor of Technology
(Electronics Engineering)

By

Arun Chanchlani Ayush Bansal Himanshu Chauhan

Under the guidance of : Prof. Vivek Kaundal

Approved

………………………………..

College of Engineering
University of Petroleum & Energy Studies
Dehradun
2014-15
(If work done externally then bring a certificate from the external
supervisor else this will be signed by the local supervisor).

CERTIFICATE

2|Page
This is to certify that the work contained in this report titled “RFID Based
Attendance System” has been carried out by Arun Chanchlani, Ayush Bansal,
Himanshu Chauhan under my/our supervision and has not been submitted elsewhere
for a degree.

………………………..
………………………..
……………………….
……………………….
……………………….
Date Date

Acknowledgement
3|Page
We take this opportunity as a privilege to thank all individuals without whose support
and guidance we could not have completed our project in this stipulated period of
time.
First and foremost we would like to express our deepest gratitude to our Project
mentor Prof. Vivek Kaundal, Department of Electronics and Instrumentation
Engineering, for his invaluable support, guidance, motivation and encouragement
throughout the period this work was carried out.
We would also like to thank all the Professors and members of the Department of
Electronics and Instrumentation Engineering for their generous help in various
ways for the completion of the project. We also extend our thanks to our fellow
students for their friendly co-operation.

Arun Chanchlani Ayush Bansal Himanshu Chauhan


R790212014 R790212015 R790212024
500023877 500022681 500022562

CONTENTS
4|Page
LIST OF TABLES 6
LIST OF FIGURES 6
ABSTRACT 7
1 INTRODUCTION 8
1.1 Aim of the project 9
1.2 Scope of the project 9

2. LITERATURE REVIEW 10
2.1 What is RFID? …………………………………………………………..10
2.2 Technical characteristics of RFID…………………………………………….10
2.3 Architecture & operation of a RFID system…………………………………..11
2.3.1 RFID Tag ……………………………………11
2.3.2 RFID Reader …………………………………….12
2.4 Components Specifications ……………………………………………13
2.4.1 ATmega 16 ………………………………………………..13
2.4.2 Power Supply ……………………………………………………14
2.4.2.1 7805 Voltage Regulator IC ………………………………..14
2.4.2.2 Other Components………………………………………...15
2.4.3 RFID Reader..................................................................................…....15
2.4.4 RFID Tag…….…………………………………………………………17
2.4.5 Seven Segment Display….……………………………………………..18
2.4.6 AVR USB Programmer...………………………………………………19
2.5 Communication……..…………………………………………………………20

3. Development Methodology……………………………………………………...21
3.1 The System Overview ………………………………………………………...21
3.2 Flowchart of System………..………………………………………………….22
3.3 Hardware Implementation….………………………………………………….23
3.4 Software Analysis………..…………………………………………………….24
3.4.1 Simulation……….………………………………………………………24
3.4.2 Data Retrieving Using Terminal Software….…………………………..24
3.4.3 AVR Studios 4………….……………………………………………….24

4. Conclusion 25

References 25
APPENDIX 1 26

List of Table

5|Page
(i) RFID Reader specifications …………………………………………….
16

List of Figures

(i) ATmega 16
(a) IC …………………………………………………….. 13
(b) Pin configuration ……………………………………….. 13

(ii) LM7805 Pinout Diagram …………………………………………… 14


(iii) RFID Reader ……………………………………………….. 16
(iv) RFID Tag ………………………………………………….. 17
(v) Seven Segment Display
(a) Pin Configuration ……………………………………………………. 18
(b) IC ………………………………………………………… 18

(vi) AVR USB Programmer …………………………………………….. 19


(vii) The System Overview ………………………………………………. 21
(viii) Flowchart of the System ……………………………………………. 22
(ix) Hardware Implementation …………………………………………… 23
(x) RFID System …………………………………………………. 25

Abstract
6|Page
Radio Frequency Identification (RFID) is a flexible, wireless, automatic identification
technology that transmits about an object or person, using radio waves. It is fast and
reliable means of identifying just about any material object. Primarily the two main
components involved in a RFID system are the Transponder (tags that are attached to
the object) and the Interrogator (RFID reader). Communication between the RFID
reader and tags occurs wirelessly and generally doesn’t require a line of sight between
the devices.
In this project, the RFID module reader typically contains a module (transmitter and
receiver), a control unit and a coupling element (antenna). This module is interfaced
with the micro controller (ATmega 16). When the tag is brought near to the RFID
reader, it reads the data in the tag and displays on the LCD. The detection of valid tag
is indicated by using a seven segment display (common anode).

7|Page
Chapter 1: Introduction

The two major problems faced by organizations are time consuming manual
attendance and wastage of electrical power. Although our university is using the
suitable technology which is free from these type of problems. Our project is on the
same existing RFID technology that our university already supports which is RFID.
Radio Frequency Identification (RFID) is an automatic identification method, relying
on storing and remotely retrieving data using devices called RFID tags or
transponders. So the RFID is a wireless identification. Normally the RFID system
comprises of two main parts are RFID Reader and RFID Tag.
There is a wide research and development in this area trying to take maximum
advantage of this technology, and in coming years many new applications and
research areas will continue to appear. This sudden interest in RFID also brings about
some concerns, mainly the security and privacy of those who work with or use tags in
their everyday life.

In a developing country like ours, lot of latest technology that has been developed
such as RFID, wireless, Bluetooth, robot and so on. Therefore, these technologies can
be adopted to improve our daily routines so take our life more comfortable and easy.
All universities should try adopting these technologies to improve their quality of
student and management. Besides not being left behind in latest development, it will
produce more quality and discipline graduates and they know to use advanced
technology in the future. Attendance taking in universities should be done in more
advanced method with using the latest technology. The attendance system was
developed to help lecturers to manage student attendance in more effective method.

8|Page
1.1 Aim of the project
The aim of this project is:
 To systematically analyze the operating mechanism and characteristics
of RFID.
 To investigate the existing RFID products that is suitable for the
company requirements.

1.2 Scope of the project


RFID based attendance system is a general frame work to implement any other
RFID based application.
Also this attendance system can be modified in many ways:
 A hex key pad can be interfaced to the system for the security purpose.
 Interfacing the system with GSM so that the students automatically
receive their attendance status via message.

9|Page
Chapter 2: Literature Review
The background research on the organization and comparative studies of existing
systems has been done to more understand the system requirements before the system
was developed. The review of literature was comprised of every fundamental which
were:

2.1 What is RFID?


Radio Frequency Identification (RFID) is a flexible, wireless, automatic identification
technology that transmits the identity (in the form of a unique serial number) of an
object or person wirelessly, using radio waves. It comes under the category of
automatic identification technologies.

Auto-ID technologies include optical character readers, bar codes and some biometric
technologies, such as retinal scans. These technologies are mainly used to reduce time
and labor needed for manually data entry and to enhance data accuracy. Some auto-ID
technologies, like bar code systems, often require a person to manually scan a label or
tag to capture the data. While bar code tags and bar code systems are much less
expensive than RFID at present, RFID provides many benefits than barcode system,
which is listed below.

2.2 Technical characteristics of RFID

 Data read and write – RFID reader can read the data to the database without
contact,
and process multiple tags once, and write the logistic processing state into the tag
for
the logistic processing in the next stage.

 Anti-pollution – RFID possesses strong anti-pollution nature for water, oil or drugs.
And in the dark or polluted environment, RFID also can read data.

 Repetitive use – Because RFID is electric data which can be written repetitively, so
10 | P a g e
the tag can be used repetitively.

 Penetrability – If RFID is covered by the paper, wood, plastics or non-metal or non


transparent materials, it can communicate through these materials except for the
irons
or other metals.

 Big memory capacity of data – The data capacity will be extended with the
development of the memory scale, and the quality of the material carried by the
goods
is larger, the requirement of the capacity for the volume label also increase, and
RFID
will not be restrained .

 System safety – The system stores the data from the central computer to the work
piece which will largely enhance the safety of the system .

2.3 Architecture & Operation of a RFID System

A RFID system is composed of two basic components: a tag and a reader.

2.3.1 RFID tags contain tiny semiconductor chips and miniaturized antennas inside
some form of packaging. They can be uniquely identified by the reader/host pair and,
when applied or fastened to an object or a person, that object or person can be tracked
and identified wirelessly.
Types of RFID tags :
i. Active RFID tags include on-board power source (miniature batteries) that are used
to power the tag, and can transmit signals autonomously.
ii. Passive RFID tags don’t include an on-board power source and have power beamed
to them by the reader.
iii. Battery Assisted Passive (BAP) or Semi-passive RFID tags require an external

11 | P a g e
source to wake up but have significant higher forward link capability providing
greater range.

Smart Tags
i. Read only tags: Information is programmed onto chip during manufacturing, no
overwriting, and information constant, least expensive.
ii. Write Once Read Many (WORM) tags: Information added only once along with
unique identifier but can be read many times.
iii. Read-Write tags: Open to data manipulation by user’s system without restrictions.
It contains a unique identifier but carry an updateable memory for that to be added. It
is expensive also.

The following are the commonly used frequencies:


i. Microwave works on 2.45 GHz, it has good reader rate even faster than UHF tags.
Although at this frequency the reading rate results are not the same on wet surfaces
and near metals, the frequency produce better results in applications such as vehicle
tracking, with approximately 1 meter of tags read range.
ii. Ultra High Frequency works within a range of 860-930 MHz, it can identify large
numbers of tags at one time with quick multiple read rate at a given time. So, it has a
considerable good reading speed with a reading range of 3 meters.
iii. High Frequency works on 13.56MHz and has less than one meter reading range
but is inexpensive and useful for access control, items identifications on sales points
etc.
iv. Low Frequency works on 125 kHz, it has approximately half a meter reading
range and mostly used for short reading range applications such as shops,
manufacturing factories, inventory control through in and out counts, access control
through showing a card to the reader. These low frequency tags are mostly not
affected when applied on wet and near metal surfaces.

2.3.2 RFID Readers are composed of an antenna and an electronic module. The
antenna is used for communicating with RFID tags wirelessly. The reader is also
called the coupler. The coupler can send information in two directions:

12 | P a g e
It can read information from a tag and send it to the PC or microcontroller and send it
to an RFID tag.

2.4 Components Specifications

2.4.1 ATmega 16:


The ATmega 16 is a low-power CMOS 8-bit microcontroller based on the AVR
enhanced RISC architecture. By executing powerful instructions in a single clock
cycle, the ATmega 16 achieves throughputs approaching 1 MIPS per MHz allowing
the system designed to optimize power consumption vs. processing speed.
The ATmega 16 provides the following features: 16 Kbytes of In-System
Programmable Flash Program memory with Read-While-Write capabilities, 512 bytes
EEPROM, 1 Kbytes SRAM, 32 general purpose I/O lines, 32 general purpose
working registers, a JTAG interface for Boundary-scan, on-chip debugging support
and programming, three flexible Timers/Counters with compare modes, Internal and
External Interrupts, a serial programmable USART, a byte oriented Two-wire Serial
Interface, an 8-channel, 10-bit ADC with optional differential input stage with
programmable gain (TQFP package only), a programmable Watchdog Timer with
internal oscillator, an SPI serial port, and six software selectable power saving modes.
The pin configuration of Atmega 16 is shown below:

Figure (i-a) Figure (i-b)

13 | P a g e
2.4.2 Power Supply

2.4.2.1 7805 (Voltage Regulator IC)


7805 is a voltage regulator integrated circuit. It is a member of 78xx series
of fixed linear voltage regulator IC’s. the voltage source in a circuit may
have fluctuations and would not give the fixed voltage output.
The voltage regulator IC maintains the output voltage at a constant value.
The xx in 78xx indicatesthe fixed output voltage it is designed to provide.
7805 provides +5V regulated power supply. Capacitors ofsuitable values c
an be connected at input and output pins depending upon the respective vol
tage levels.

Figure (ii)

14 | P a g e
2.4.2.2 For the suitable power supply design the following
components are required:

(i) LED’s
(ii) Diodes (1N4007)
(iii) Capacitors (1000µF/35V)
(iv) Resistors (360 ohm)
(v) DC socket pin
(vi) DC adapter (230V ac to 12V DC)
(vii) Push Button switch
(viii) Connecting Wires
(ix) PCB board
(x) DB-9 (Male & Female connector)
(xi) Soldering wire
(xii) Soldering Iron

2.4.3 RFID reader

Radio Frequency Identification (RFID) Card Readers provide a low-cost solution to


read passive RFID transponder tags up to 7 cm away. This RFID Card Reader can be
used in a wide variety of hobbyist and commercial applications, including access
control, automatic identification, robotics navigation, inventory tracking, payment
systems, and car immobilization. The RFID card reader read the RFID tag in range
and outputs unique identification code of the tag at baud rate of 9600. The data from
RFID reader can be interfaced to be read by microcontroller or PC.
Features
• Low-cost method for reading passive RFID transponder tags
• 9600 bps serial interface at 5V TTL level for direct interface to microcontrollers
• Buzzer & LED indicate valid RFID Tag detection
• Range up to 7 cm for 125 Khz RFID Cards or Keychains Specification.

15 | P a g e
Specifications:
Table (i)
Parameter Value
Input voltage 5 V DC regulated
Output Data speed 9600 BPS
8 bit data/no parity/ 1 stop bit
Output Data Level 5 V TTL level
Detection Range 7 cm. (2 inches) contact less
Valid Tag in Range Indicated by buzzer and LED

Figure (iii)

2.4.4 RFID Tag

16 | P a g e
Each transponder tag contains a unique identifier (one of 240, or 1,099,511,627,776
possible combinations) that is read by the RFID Card Reader and transmitted to the
host via a simple serial interface. It means no two tags are same. Each tag has
different value. This value is read by reader.

Figure (iv)

2.4.5 Seven Segment Display

17 | P a g e
A seven segment display is the most basic electronic display device that can display di
gits from 09. They find wide application in devices that display numeric
information like: digital microwave ovens, electronic meters etc.
Every LED is assigned a name from 'a' to 'h' and is identified by its name. Seven
LEDs 'a' to 'g' are used to display the numerals while eighth LED 'h' is used
to display the dot/decimal.
A seven segment is generally available in ten pin packaging.
The seven segment come in two configurations, namely, Common cathode (CC)
and Common anode (CA). In CC configuration, the negative terminals of all
LEDs are connected to the common pins. The common is connected to
ground and a particular LED glows when its corresponding pin is given high.
In CA arrangement, the common pin is given a high logic and the
LED pins are given low to display a number.

Figure (v-a) Figure (v-b)

2.4.6 AVR USB Programmer

18 | P a g e
Figure (vi)

Features

a) Small Size.
b) 6Pin ISP Connector.
c) Indicator LED (Red) for Power.
d) Indicator LED (green) for writing status.
e) Free open source software like Win AVR, AVR Dude compatible.
f) Does not require any power to program the target microcontroller.
g) Clear indication on the PCB indicating position of different pin configuration.
h) Works under many platforms like Linux, Mac OS X and Windows.
j) Low Cost.
k) Programming up to 5Kbyte per second.

2.5 Communication

19 | P a g e
When the RFID Card Reader is active and a valid RFID transponder tag is placed
within range of the activated reader, the unique ID will be transmitted as a 12-byte
printable ASCII string serially to the host in the following format:

Start Unique Unique Unique Unique Unique Unique Unique Unique Unique Uniq Stop Byte
Byte ID ID ID ID ID ID ID ID ID ue ID (0x0D)
(0x0A) Digit 1 Digit 2 Digit 3 Digit 4 Digit 5 Digit 6 Digit 7 Digit 8 Digit 9 Digit
10

The start byte and stop byte are used to easily identify that a correct string has been
received from the reader (they correspond to a line feed and carriage return characters,
respectively). The middle ten bytes are the actual tag's unique ID.
For example, for a tag with a valid ID of 0F0184F07A, the following ASCII data
would be sent 0F0184F07A. Same data in HEX bytes can be interpreted as: 0x0A,
0x30, 0x46, 0x30, 0x31, 0x38, 0x34, 0x46, 0x30, 0x37, 0x41, 0x0D
All communication is 8 data bits, no parity, 1 stop bit, and least significant bit first
(8N1). The baud rate is configured for 9600 bps, a standard communications speed
supported by most any microprocessor or PC, and cannot be changed. The RFID Card
Reader initiates all communication. This allows easy access to the serial data stream
from any programming language that can open a COM port.

Chapter 3: Development Methodology

20 | P a g e
3.1 The System Overview

Figure (vii)

21 | P a g e
The above diagram shows the basic implementation of the system, if the card is
brought near the RFID reader and if the valid card is detected then status of detection
is displayed on the seven segment display and the attendance is displayed on the
LCD. Also the buzzer sounds when the card is detected.

3.2 Flowchart of System

Figure (viii) Start

Card brought near RFID


Reader

CARD
Detected
NO ?
YES

Get information of student id card

Data matched NO Status of no detection is


with data stored displayed on seven segment
in program
memory display

YES

Compares with that id code

Display the time entered with


his/her name on LCD
22 | P a g e
END

3.3 Hardware Implementation

Figure (ix)

23 | P a g e
3.4 Software Analysis

3.4.1 Simulation

We have used Proteus 8 for simulation purpose. Proteus 8 is a best simulation


software for various designs with microcontroller. It is mainly popular because of
availability of almost all microcontrollers in it. So it is a handy tool to test programs
and embedded designs for electronics students.
After simulating our circuit in Proteus 8 Software we have directly designed
development board and interface the LCD and RFID reader with it.

3.4.2 DATA retrieving using Terminal Software

Start Unique Unique Unique Unique Unique Unique Unique Unique Unique Uniq Stop Byte
Byte ID ID ID ID ID ID ID ID ID ue ID (0x0D)
(0x0A) Digit 1 Digit 2 Digit 3 Digit 4 Digit 5 Digit 6 Digit 7 Digit 8 Digit 9 Digit
10

The 12 byte ASCII string of the tag can be retrieved using terminal software.

3.4.3 AVR Studios 4

Atmel AVR Studios 4 is the Integrated Development Environment (IDE) for


developing and debugging embedded Atmel AVR applications. The AVR Studio 4

24 | P a g e
IDE gives you a seamless and easy-to-use environment to write, build, and debug
your C/C++ and assembler code.
The source code of the system has been feed to microcontroller using this software.

Chapter 4 Conclusion

Figure (x)

Apart from recording attendance, this application we developed, can be implemented


for maintaining student’s database. This would certainly reduce time and labor which
was involved in the manual process.
25 | P a g e
RFID may not be a new concept today but it certainly makes our work easier when it
comes to management. Today we see RFID has almost taken over the barcode system
and has its application in many fields like inventory control, retailing, payment
system, security system etc. Many of the consumer applications and benefits of RFID
are still several years away which would certainly find new and innovative ways.

References

[1] http://www.rfidjournal.com/article/view/1339/
[2] http://www.aimglobal.org/technologies/RFID/what_is_rfid.asp
[3] T. Frank, H. Brad, M. Anand, B. Hersh, C. Anita, K. John, “RFID Security”,
(2006) ISBN: 1-59749-047-4.
[4] H. Stoehman, Communication by Means of Reflected Power, Proceedings of the
IRE, PP: 1196-1204, October 1948.
[5] P. R. Foste, R. A. Burberry; Antenna problems in RFID systems, IEE Colloquium
On RFID Technology, 1999.
[6] S. Garfinkel and B. Rosenberg, editors. RFID Applications, Security,and Privacy.
Addison-Wesley, 2005.
[7] T. Endo, Y. Sunahara, S. Satoh, and T. Katagi, Resonant frequency and radiation
Efficiency of meander line antennas, Electronics and Communications in Japan, Part
2 (Electronics), vol. 83, pp.52-58, 2000.

26 | P a g e
Appendix 1

Source code
#include<avr/io.h>
#include<util/delay.h>
#include<avr/interrupt.h>
#include"lcd.h"

volatile char packet_start;


volatile char id[11];
volatile char i;
volatile char done;

volatile char a1,a2,a3,a4;

static char
db1[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x44,0x43,0x37,0x36,0x31,0x3D};
static char
db2[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x44,0x43,0x31,0x45,0x44,0x0D};
static char
db3[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x44,0x45,0x36,0x42,0x38,0x0D};
static char
db4[]={0x0A,0x30,0x38,0x30,0x30,0x43,0x45,0x30,0x44,0x30,0x31,0x0D};

void delay(uint16_t count);


char verify(const char *str,uint8_t num);

27 | P a g e
char strcmp(const char *str1, const char *str2);

void main()
{
char data;
InitLCD(0);
LCDClear();
USARTInit(77);
LCDClear();
LCDWriteString("Please Show");
LCDWriteStringXY(0,1,"Card");
PORTD=0b00000000;
sei();
while(1)
{

}
}

void delay(uint16_t count)


{
uint16_t i,j;
for(i=0;i<count;i++)
for(j=0;j<1000;j++)
_delay_ms(1);
}

char verify(const char *str,uint8_t num)


{
char data[11];
char i;

for(i=0;i<11;i++)
28 | P a g e
data[i]=*(str++);

switch(num)
{
case 1:
{
if(strcmp(data,db1))

return 1;
else return 0;

break;
}
case 2:
{
if(strcmp(data,db2))

return 1;
else return 0;
break;
}
case 3:
{
if(strcmp(data,db3))

return 1;
else return 0;

break;
}
case 4:
{
if(strcmp(data,db4))

29 | P a g e
return 1;
else return 0;
break;
}
}

char strcmp(const char *str1, const char *str2)


{
char i=0;
char count=0;
for(i=0;i<11;i++)
{
if(str1[i]==str2[i])
count++;
else
break;
}
if(count==11)
return 1;
else return 0;
}

ISR(USART_RXC_vect)
{
char data,j;
data=USARTReadChar();
USARTWriteChar(data);
LCDGotoXY(0,1);
30 | P a g e
LCDData(data);
if((data==0x0A)&&(packet_start==0))
{
packet_start=1;

i=0;

if(packet_start==1)
{
id[i++]=data;
//LCDData(id[i-1]);
PORTD=0b11111001;
delay(2);
PORTD=0b11111111;
if(i>=11)
{

packet_start=0;
for(j=1;j<5;j++)
{
if(verify(id,j))
{
LCDClear();
LCDWriteString("Thank You No.");
LCDWriteInt(j,1);
delay(2);
LCDClear();
LCDWriteString("Your Attendence");
switch(j)
{
31 | P a g e
case 1:
{
a1++;
LCDWriteIntXY(0,1,a1,3);
break;
}
case 2:
{
a2++;
LCDWriteIntXY(0,1,a2,3);
break;
}
case 3:
{
a3++;
LCDWriteIntXY(0,1,a3,3);
break;
}
case 4:
{
a4++;
LCDWriteIntXY(0,1,a4,3);
break;
}
}
delay(2);
LCDClear();
LCDWriteString("Please Show");
LCDWriteStringXY(0,1,"Card");

}
}
}

32 | P a g e
}
else
{
PORTD=0b11000000;
delay(2);
PORTD=0b11111111;
}

ISR(USART_TXC_vect)
{
cli();
}

33 | P a g e
34 | P a g e

Vous aimerez peut-être aussi