Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance System
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance System
DOOR
UNIT
GRAPHICAL
USER
INTERFACE
(GUI)
DATABAS
E
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
205
2009, researchers successfully glued RFID micro
transponder to live ants in order to study their behavior
[Daniel M. Dobkin and Steven M. Weigand, 2010].
Furthermore, multiple RFID cards can be read all at
the same time. Information about the employees
access and attendance can be stored on the database.
RFID Frequency band: Frequency refers to the size
of the radio waves used to communicate between the
RFID systems components. It can be assumed that
higher frequency resulting faster data transfer rate and
longer reading distance. However as frequency
increases, the sensitivity to environmental factor also
increases. RFID system currently operates at Low
Frequency, High Frequency and Ultra High
Frequency. Generally a lower frequency means a
lower read range and slower data read rate, but
increased capabilities for reading near or on metal or
liquid surfaces. The frequency chart is shown in table
2 [Mc Oswel J amin Sibin, 2010].
Table 2: RFID Frequency Table
Miniaturization: RFIDs are easy to conceal or
incorporate in other items. For example, in 2009
researchers at Bristol University successfully glued
RFID micro-transponders to live ants in order to study
their behavior [Stevan Preradovic and Nemai C.
Karmakar, 2006]. This trend towards increasingly
miniaturized RFIDs is likely to continue as technology
advances. Hitachi holds the record for the smallest
RFID chip, at 0.05mm x 0.05mm. This is 1/64th the
size of the previous record holder, the mu-chips.
Manufacture is enabled by using the silicon-on-
insulator (SOI) process. These dust-sized chips can
store 38-digit numbers using 128-bits read only
memory (ROM) [www.wikipedia.org]. A major
challenge is the attachment of the antennas, thus
limiting read range to only millimeters.
The Radio Frequency Identification (Rfid)
Application Areas: In 2010 three key factors drove
a significant increase in RFID usage. They include;
decreased cost of equipment and tags, increased
performance to a reliability of 99.9% and a stable
international standard around UHF passive tag. The
areas of significant use are financial services for
Information Technology asset tracking and healthcare
with more than 60% of the top medical device
companies using passive UHF RFID in 2010. RFID is
becoming increasingly prevalent as the price of the
Frequency
band
description Operating
range
Application benefits Drawbacks
125KHz
to
134KHz
Low
frequency
Less than
0.5m
to
1.5ft
Access control, animal
tracking point of sale
application, product
authentication, vehicle
immobilizer etc
Works well
around water and
metal products
Short read range
and slower read
rate
13.56MHz High
frequency
Less than
1m
to
3ft
Smartcards library books,
airline baggage etc
Low cost of tag High read rate
when compared
to low frequency
860MHz
To
930MHz
Ultra high
frequency
(UHF)
3m
to
9ft
Parking lot access,
electronic toll collection
etc
EPC standard
built around this
frequency
Does not work
well with high
water or metal
content
2.4GHz Micro-
wave
1m
to
3ft
Airline baggage,
electronic toll collection
Most expensive Fastest read rate
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
206
technology decreases [www.wikipedia.org].
Therefore, the current uses include:
Electronic Vehicle Registration: With security of
cars being a major concern in many countries, RFID
technology is being leveraged by government for
Vehicle Registration
[http://www.rfidjournal.com/article/view/3321]
[MarkusHansenandSebastianMeissner,2000]. This
helps detect stolen cars and in their retrieval
[http://www.rfidjournal.com/article/view/89 Smart
LicenseMayCutCarTheft] [Mc Oswel J amin Sibin,
2010].
Payment by mobile phones: Since summer 2009,
two credit card companies have been working with
Dallas, Texas-based Device Fidelity to develop
specialized microSD cards. When inserted into a
mobile phone, the microSD card can be both a passive
tag and an RFID reader
[http://www.tollroadsnews.com/node/4513, 2009].
After inserting the microSD, a user's phone can be
linked to bank accounts and used in mobile payment.
Diaryqueen in conjunction with Vivotech has also
begun using RFIDs on mobile phones as part of their
new loyalty and rewards program. Patrons can ask to
receive an RFID tag to place on their phone. After
activation, the phone can receive promotions and
coupons, which can be read by Vivotech's devices
[MaryCatherineO'Connor, 2009]. Similarly, Nokia's
2008 device, the 6212, also has RFID capabilities.
Credit card information can be stored, and bank
accounts can be directly accessed using the enabled
handset. The phone, if used as a vector for mobile
payment, has added security in that users would be
required to enter a passcode or PIN before payment is
authorized [MaryCatherineO'Connor,2009].
Transportation payments: Governments use
RFID applications for traffic management, while
automotive companies use various RFID tracking
solutions for product management.
Car-sharing: The Zipcar car-sharing service uses
RFID cards for locking and unlocking cars and for
member identification [Mary Catherine O'Connor
2008].
Toll roads: The tags, which are usually the active
type, are read remotely as vehicles pass through the
booths, and tag information is used to debit the toll
amount from a prepaid account. The system helps to
speed traffic through toll plazas as it records the date,
time, and billing data for the RFID vehicle tag. This
has been introduced in some places in Nigeria.
Public transit (bus, rail, subway): In South
Korea, t-money cards can be used to pay for public
transit. It can also be used in most convenience stores
and vending machines in subways as cash. 90% of
cabs in Seoul accept card payment, including most
major credit cards and the T-money card. T-money
replaced UPASS, first introduced for transport
payments in 1996 using MIFARE technology
[Greene.C.Thomas,2004]. Also, in Hong Kong, mass
transit is paid for almost exclusively through the use
of an RFID technology, called the octopus card. This
has also been used in various other countries like
Canada, Russia etc [Greene.C.Thomas,2004].
Asset management and retail sales: RFID
combined with mobile computing and Web
technologies provide a way for organizations to
identify and manage their assets. It was initially
introduced to major retail by Craig Patterson,
Knoxville, TN. Mobile computers, with integrated
RFID readers, can now deliver a complete set of tools
that eliminate paperwork, give proof of identification
and attendance.
Web based management tools allow organizations to
monitor their assets and make management decisions
from anywhere in the world. Web based applications
now mean that third parties, such as manufacturers and
contractors can be granted access to update asset data,
including for example, inspection history and transfer
documentation online ensuring that the end user
always has accurate, real-time data. Organizations are
already using RFID tags combined with a mobile asset
management solution to record and monitor the
location of their assets, their current status, and
whether they have been maintained.
RFID is being adopted for item-level retail uses. Aside
from efficiency and product availability gains, the
system offers a superior form of electronic article
surveillance (EAS) and a superior self-checkout
process for consumers. The financial services
technology consortium (FSTC) set a technical
standard for tagging Information Technology assets
[http://www.rfidjournal.com/article/view/3321] and
other industries have used that standard as a guideline.
For instance the US State Department is now tagging
IT assets with passive RFID using ISO/IEC 18000-6
standard [www.rfidnews.com].
Schools and universities: School authorities in the
J apanese city of Osaka are now chipping children's
clothing, back packs, and student IDs in a primary
school.
Similarly, Whitcliffe Mount School in
cleckheaton England uses RFID to track pupils and
staff in and out of the building via a specially designed
card. In the Philippines, some schools already use
RFID in IDs for borrowing books and also gates in
those particular schools have RFID ID scanners for
buying items at a school shop and canteen, library and
also to sign in and sign out for student and teacher's
attendance [www.rfidnews.com].
Human implants: Implantable RFID chips
designed for animal tagging are now being used in
human beings. An early experiment with RFID
implants was conducted by British professor of
cybernetics Kevin Warwick, who implanted a chip in
his arm in 1998. In 2004 Conrad chase offered
implanted chips in his night clubs in Barcelona and
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
207
Rotterdam to identify their VIP customers, who in turn
use it to pay for drinks. In 2004, the Mexican Attorney
General's office implanted 18 of its staff members with
the verichip to control access to a secure data room
[Greene.C.Thomas,2004].
Figure.6a Hand with the planned
Figure.6b the hand just after the operation to insert
location of the RFID chip. The RFID tag was
completed. The yellow is from the iodine disinfection
before inserting the chip
D. Applications of rfid technology in nigeria:
The RFID technology has been suggested to be
applied in various sectors in Nigeria to reduce
corruption. These sectors include; the monitoring of
crude oil, tracking the movement of money, drug
agencies and monitoring containers entering the
country. Other proposed applications include: the
cloning of documents such as certificate of occupancy,
bills of lading and university certificates etc.
An RFID technology company in Nigeria started
providing anti-money laundering (AML) solutions to
banks. The technology tracks the movement of money
and alerts the Nigerian Financial Intelligence Unit of
any suspicious activities. The company is providing
the service to five major Nigerian banks. This
technology has been used by NAFDAC to reduce the
importation and distribution of counterfeit drugs 2008
[Emenike .U. Ugwuatu, 2007].
4. System Design And Implementation
Methodology
The method/approach used in achieving this
project design include; the designing of a hardware
unit consisting of a motor interfaced with a designed
database and graphical user interface(GUI) that will
be responsible for taking and storing the data received
from the reader. And the software development unit
consisting the Microsoft visual studio, Microsoft .Net
framework and Microsoft access. This is done by
comparing the information received from the RFID
reader to the information stored in the database.
The Hardware: The hardware architecture consists
of the UME4100 RFID tag, the SEEED 125 KHz
RFID reader, the ATMEL AT89S52 microcontroller,
the computer, the door unit, the power supply unit, the
universal serial bus (USB), USB to serial converter,
the RS-232 interface, the universal asynchronous
receiver transmitter (UART) and the serial data
transmission.
The RFID reader in figure 7 uses low frequency
band, and practically, the reading distance between the
tag and the reader is about 7cm. The output of this
reader is transmitted serially, and data is transmitted at
9600 baud rates. However, this reader has been
chosen because it has a DB9 female header, which
can be used to connect to the serial port of personal
computer, and it can display the unique ID of the tag
in Window operating system. Its applications includes
Pet Toys and Access Control System
Figure.7 The SEEED RFID reader
[www.seeedstudio.com] (module and antenna)
The figure 8 shows the RFID tags used in this
paper. These RFID tags are passive tags thus it
has no internal power supply. These tags activated
by radio frequency transmitted by the reader. The
reading distance is about 7 cm. When the RFID reader
receives the data from the tag, the data then will be
compared with the data in the database to identify the
holder of the tag.
Figure.8 The UEM4100 RFID tag
This design consists of the RS-232 circuit, the
motor circuit and the microcontroller. The RFID
reader sends signals to the RS-232 circuit which
interfaces with the serial port. The microcontroller is
programmed to receive signals from the RS-232
circuit and sends signals to control the motor circuit
which controls the direction of movement of the door.
The crystal oscillator generates pulses that enable the
microcontroller to execute instructions. The
microcontroller codes are written with assembly
language.
The motor unit controls the movement of the
door. The microcontroller sends signals to the
transistor which acts as a switching device. These
transistors allow current flow into the relay.
The RS-232 converts the transistor-transistor
logic data to enables communication with the serial
port.
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
208
The Software: The software development unit
consisting: the Microsoft visual studio, Microsoft .Net
framework and Microsoft access [JuliaCaseandAnita
.C.Millspaugh,2005].
Microsoft Access Database: There are two
databases designed using Microsoft Access 2007. The
databases named regDB and attendance. The
regDB database stores information of registered
users. This information is used by the administration
to identify and manipulating attendance information.
In the other hand, the attendance database stores all
attendance related data. Besides that, there are three
tables inside the attendance database which act as
temporary data storage which are tagid, username
and datereg. These tables are essential to the
program flow. The database has a login password
which allows access. Figures 9a & 9b are the pictures
of the regDB database and attendance database.
Figure.9a regDB database
Figure.9b Attendance database
Time Attendance GUI design: The GUI of the
Time Attendance is developed using Microsoft Visual
Studio 2008. However, it is difficult to design an
attractive GUI using the basic controls provided by the
Microsoft Visual Studio. Thus, third party add-on
software which is Developer Express 2011 has been
used to enhance the appearance of the GUI. This
software is integrated into Microsoft Visual Studio
2010. The Time Attendance interface is divided into
two parts which are login part and the main interface
part. The purpose of the login part is to make the
system more secure as user has to login before having
the access of the main interface. The folder of the
design project is named RFID BASED
ATTENDANCE SYSTEM. The output of the
compilation is in Debug folder within the project
folder. Figure 10 is the flow chart for the login
transaction [Amirjan Bin Nawabjan, 2009].
NO
YES
NO
IdentificationNot
Matched
Insertusername
andpassword
Usernam
efound?
Comparepasswordwiththe
passwordstoredinthe
database
Searchusername
inthedatabase
Password
matched?
Usernamenot
found
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
209
YES
Figure. 10 Flow chart of the login transaction
5. Coding Technique
Figure.11 The dataset
Database queries: SQL statements such as INSERT,
DELETE and UPDATE are used to retrieve and
manipulate data in the database. Besides that, getting
data row from dataset method is also used to retrieve
the data without manipulating it, as used to display the
data in the database interface. Furthermore, try-catch
statement is implemented to control the program
exception during the queries.
Serial port interfacing: Microsoft Visual Studio
provides the serial port class library to make
communication between serial port and the window
form. This method is interrupt-driven. The serial
handler codes are illustrated below.
Private Sub SerialPort1_Data Received(ByVal sender
As Object, By Val e As System. IO. Ports. Serial
Data Received Event Args) Handles
SerialPort1.DataReceived
Control. Check for Illegal Cross Thread Calls =False
SerialPort1.Read (MyData, 0, 14)
For each check As Integer in My Data
Txt Rfid. Append Text (check)
Next
Data =Txt Rfid. Text
Reg Attendance()
System. Threading. Thread. Sleep(2000)
Txt Rfid. Text =""
Txt Name. Text =""
Txt Time. Text =""
End Sub
6. Tests, Results And Discussion
Figure.12 The RFID output
The serial watcher is used to monitor the output of the
RFID tags. The computer receives 14 digits through
the serial port where the first digit is the start bit, the
next 10 digits is the tag code, the next 2 digits after the
tag code is the checksum bit and the last digit, the end
bit.
5.1.2 The motor unit test
The microcontroller was tested to make sure it
sends the required signal needed to operate the door.
The microcontroller code was adjusted until this
problem was solved, and it sends the required signals
needed for the operation of the door.
Table 3 showing tests comparison of the RFID
attendance with another randomly picked attendance
system.
Table 3 test comparison table between RFID and
magnetic strip
TESTS RFID MAGNETIC
STRIPE
Speed of
registration
2-4
seconds
4-8seconds
Card access
modes
From a
distant
range
By insertion in slot
Tests accuracy 1/10 2/10
GotoMainMenu
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
210
Also, a stained card test was carried out with a stained
both magnetic strip card and an RFID card with dirt,
and then inserted the magnetic strip into the slot. The
magnetic strip seemed not to work as a result of the
dirt making the reader malfunction. In the case of the
RFID card, the signal from the transponder was
retrieved because communication is by contactless
radio frequency.
7. Operation
Figure.13 Login interface
The figure13 shows the login form to get the
access of the Time Attendance system by the
administrator. The Administrator has no data
manipulation restriction. This interface is created to
limit access to only the administrator for security
purposes.
The attendance main interface
Figure.14 The attendance main interface
The figure 14 shows the attendance main interface
of the system. There are three options which are show
attendance, add user and delete user. Time
attendance menu is chosen to access the time
attendance system. The show attendance displays all
the attendees cards that have been scanned.
Figure.15a the show attendance interface
The add user is used to register a card. The card is
first scanned and a username is attached to the data
received before storing it in the database.
Figure.15b Add user interface
The delete user is used to remove an already
registered card from the database. This is done by
scanning the card and attaching the required
username of the card before clicking on the delete
button.
Figure. 15c Delete user interface
8. Conclusion
In conclusion, the objective to build an RFID
based attendance system with a door unit was
successfully achieved. In terms of performance and
efficiency, this project has provided a convenient
method of attendance marking compared to the
traditional method of attendance system. By using
databases, the data is more organized. This system is
also a user friendly system as data manipulation and
retrieval can be done via the interface, making it a
universal attendance system. Thus, it can be
implemented in either an academic institution or in
organizations.
However, some further improvements can be
made on this RFID in order to increase its reliability
and effectiveness. *By incorporated an indicator or an
LCD screen in the system to indicate when an
unregistered card is scanned. *An IP camera can be
integrated into this system to enable the monitor to
view the person who makes the transaction to avoid a
problem of a person scanning in for another person.
*A reminder alert also can be developed to effectively
track any ID that has been absent for an unacceptable
times in a row. *Finally, this attendance system can be
improved by adding a feature where the attendance
system indicates when an employee or a student is late
for work or classes as the case maybe.
References
[1] Daniel M. Dobkin and Steven M. Weigand
(2010), Environmental effects on RFID tag
antennas, Bulis press, California.
Int. J Sci. Emerging Tech Vol5 No 6, June 2013
211
[2] SEEED RFID Reader Manual,
www.seeedstudio.com.
[3] J ulia Case and Anita .C. Millspaugh (2005),
Programming in visual basic. NET Mcgraw
press, Sao Paulo.
[4] Financial Consortium Publishes RFID Standards
for IT Assets. Retrieved on 2010.
[5] Amirjan Bin Nawabjan (2009), Automated
attendance management software, University
of technology, Malaysia: degree thesis
[6] Stevan Preradovic and Nemai C. Karmakar
(2006), RFID reader: a review, Monash
University, Australia
[7] www.wikipedia.org
[8] www.rfidnews.com
[9] Carlos .C. Murphy (2005), Automated
attendance systems, J avier pressm, Argentina
[10] Mohd Firdaus Bin Mahyidin (2008), students
attendance system using RFID technology,
Malaysia.
[11] Billard .F.Cookes (2001),Fundamentals on
barcode technology, Rafot press ltd, Cyprus
[12] Gordon .N. Withtaker (2002), introduction to
biometrics technology, Dint and sons ltd,
England.
[13] Markus Hansen and Sebastian Meissner (2000),
Identification and Tracking of Individuals and
Social Networks using the Electronic Product
Code on RFID Tags, IFIP Summers ltd,
Sweden
[14] http://www.rfidjournal.com/article/view/89
Smart License May Cut Car Theft
[15] Greene.C. Thomas (2004), "Feds approve human
RFID implants",
http://www.theregister.co.uk/2004/10/14/human
_rfid_implants/. Retrieved
[16] Mary Catherine O'Connor (2009), "Sun
Microsystems Piloting RFID Tagging for
Financial Customers", preston press, USA.
[17] Emenike .U. Ugwuatu (2007), Future of RFID
technology in Nigeria, loyato press, Ibadan
[18] Mc Oswel J amin Sibin (2010), RFID Based
Attendance System, University of Technology
Malaysia: Degree Thesis.
[19] http://www.tollroadsnews.com/node/4513
Mexico's Electronic Vehicle Registration
system opens with Sirit open road toll
technology, Dec 29, 2009.
[20] Mary Catherine O'Connor (2008). "RFID Is Key
to Car Clubs' Success". RFID J ournal.
Retrieved 2011.
[21] http://www.rfidjournal.com/article/view/3321
Bermuda's RFID Vehicle Registration System
Could Save $2 Million/Year
Authors
Engr. Okorafor, G. Nwaji is a Master Degree Holder on
Electronics Computer Engineering (ECE) in the Department of
Electrical/Electronic Engineering, Federal University of
Technology, Owerri (FUTO). He is a research on computer and
communication related subject matters.
E-Mail: [email protected]
Engr. Nosiri, C. Onyebuchi is a Lecturer in the Department of
Electrical/Electronic Engineering, Federal University of
Technology, Owerri (FUTO). He is a research on communication
engineering related subject matters.
E-Mail: [email protected]
Engr. Dr. Opara, F. Kelechi is a Reader in the Department of
Electrical/Electronic Engineering, Federal University of
Technology, Owerri (FUTO); and a major in Data Communication
Engineering. He is a researcher on Communication related matters.
E-Mail: [email protected].