IOT BASED SYSTEM FOR IDENTIFICATION OF VALID ID CARD FOR EXAMINATION
IOT BASED SYSTEM FOR IDENTIFICATION OF VALID ID CARD FOR EXAMINATION
EXAMINATION
Domitina Z Renatus
By
Domitina Z Renatus
Ardhi University
July 2022
i
DECLARATION
I Domitina Z Renatus with registration number 23711/T.2019, hereby declare that this report is
my own work and does not been submitted to any university for a similar award. The work in
this report was carried out in accordance with the regulations of Ardhi University and has not
been presented to any university for examination either in Tanzania or elsewhere. Where other
sources of information has been used, they have been shown in the reference lists.
ii
CERTIFICATION
The signed certify that they have read and hereby endorse for acceptance by the Ardhi University
a dissertation titled: “IoT based system for identification of valid ID card for the examination:
case study Ardhi university”. In fulfillment of the requirements for the degree of Bachelor of
Science (Information System Management) at Ardhi University.
iii
ACKNOWLEDGMENT
I would like to thank the Almighty God for providing me with abundant strength for conducting
this dissertation. Secondly, I would like to thank my family; my father and my mother for their
support Thirdly, I would like to sincerely thank my supervisor(s): Mr. Kevin Njuu and Ms. Zulfa
Sammadile for their support and guidance throughout the dissertation.
Lastly, I would like to thank my friends from ISM third year 2021/2022 for support they offered
me on all the way throughout conducting this research.
iv
ABSTRACT
This study focuses on solving problems facing identification of verified students by developing a
web portal and RFID technology based model specifically to determine verified students by
using RFID technology, every student must have a unique RFID card after being registered at the
university until the complete of his or her studies or until when a student discontinues the study
due to different reasons.
The developed system fill the gaps of the current system that facing the university administration
on identification of verified students. The system has been developed by using Rapid Application
Development (RAD) methodology. RAD includes four phases in system development that is
requirement planning that concerns on data collection through interview and observation, user
design that involves the designing of what is expected to be implemented in the next phase,
construction phase that used in implementation of web portal for students registration and
verification also development of RFID technology based model. The model applied in the circuit
base that consists various IoT components that facilitates system functionalities. It has RFID
reader that capture and processing student information from the RFID card also display system
output to the LCD display.
v
LIST ABBREVIATION AND ACRONYMS
vi
TABLE OF CONTENTS
DECLARATION...............................................................................................................................................i
CERTIFICATION............................................................................................................................................ii
ACKNOWLEDGMENT...................................................................................................................................iii
ABSTRACT...................................................................................................................................................iv
LIST ABBREVIATION AND ACRONYMS..........................................................................................................v
LIST OF FIGURES..........................................................................................................................................ix
LIST OF TABLES.............................................................................................................................................x
CHAPTER ONE..............................................................................................................................................1
INTRODUCTION...........................................................................................................................................1
1.1Background information..................................................................................................................1
1.2 Problem statement...........................................................................................................................2
1.3 Objectives.........................................................................................................................................3
1.3.1 General Objective.....................................................................................................................3
1.3.2 Specific Objectives..................................................................................................................3
1.4 Research Questions..........................................................................................................................3
1.5 Significance of the study..................................................................................................................3
1.6 Structure of the report....................................................................................................................3
CHAPTER TWO.............................................................................................................................................5
LITERATURE REVIEW....................................................................................................................................5
1.1 Introduction.....................................................................................................................................5
2.2 Overview...........................................................................................................................................5
2.3 Existing research for identification of valid ID card for examination.........................................5
2.4 Significance of identification of valid ID card for examination by using RFID reader..............6
2.5 Other related works for verification of students...........................................................................6
2.6 Research gap....................................................................................................................................7
2.7 Developed system.............................................................................................................................8
CHAPTER THREE..........................................................................................................................................9
METHODOLOGY...........................................................................................................................................9
3.1 Introduction.....................................................................................................................................9
3.2 Discussion on the selected methodology.........................................................................................9
3.2.1 Requirement collection methodologies....................................................................................9
vii
3.2.2 System analysis and design methodologies...........................................................................10
3.2.3 System implementation and testing methodologies..............................................................10
3.2.4 System testing methodologies.................................................................................................10
CHAPTER FOUR..........................................................................................................................................13
SYSTEM ANALYSIS AND DESIGN................................................................................................................13
4.1 Introduction...................................................................................................................................13
4.2 Requirement analysis....................................................................................................................13
4.2.1 System requirements..............................................................................................................13
4.2.2 Hardware requirement...........................................................................................................14
4.2.4 Data requirement....................................................................................................................16
4.3 User requirement...........................................................................................................................16
4.3.1 Functional requirements........................................................................................................16
4.3.2 Nonfunctional requirements..................................................................................................16
4.4 System design.................................................................................................................................17
4.4.1 System architecture................................................................................................................17
4.4.2 Unified Modelling Language (UML).....................................................................................17
CHAPTER FIVE............................................................................................................................................21
IMPLEMENTATION AND TESTING..............................................................................................................21
5.1 Introduction...................................................................................................................................21
5.2 Web portal......................................................................................................................................21
5.2.1 Home page...............................................................................................................................21
5.2.2 Registration page....................................................................................................................22
5.2.3 Login page...............................................................................................................................22
5.2.4 Administrator’s home page....................................................................................................23
5.2.5 Manage students’ page...........................................................................................................23
5.3 RFID technology based model......................................................................................................23
5.3.1 External parts of RFID technology based model..................................................................24
5.3.2 Internal parts of RFID technology based model...................................................................24
5.4 Testing............................................................................................................................................25
5.4.1 Functional testing....................................................................................................................25
5.4.2 User acceptance testing...........................................................................................................27
CHAPTER SIX..............................................................................................................................................28
RESULTS AND DISCUSSION........................................................................................................................28
viii
6.1 Introduction...................................................................................................................................28
6.2 Findings..........................................................................................................................................28
6.2.1 Products...................................................................................................................................28
6.2.2 Experimental findings............................................................................................................29
6.3 Goals achieved...............................................................................................................................29
CHAPTER SEVEN........................................................................................................................................31
SUMMARY, CONCLUSION AND RECOMMENDATIONS..............................................................................31
7.1 Introduction...................................................................................................................................31
7.2 Summary........................................................................................................................................31
7.2.1 Summary on Research Question 1.........................................................................................31
7.2.2 Summary on Research Question 2.........................................................................................31
7.2.3 Summary on Research Question 3.........................................................................................32
7.2.4 Summary on Research Question 4.........................................................................................32
7.3 Conclusion......................................................................................................................................32
7.4 Recommendation...........................................................................................................................33
REFERENCES..............................................................................................................................................34
ix
LIST OF FIGURES
x
LIST OF TABLES
xi
CHAPTER ONE
INTRODUCTION
1.1Background information
Internet of Things (IoT) technology becomes popular in education sector that involves the use of
internet in learning and provide more opportunity in practical sessions that helps the students to
understand better during class hours because IoT technology involves the use of hardware and
software in development, therefore many students become experts in different sectors through
the use of IoT technology rather than coding programs that needs deeply understanding about
programming languages and involves only software in system development. Therefore the use
of internet makes many things in a short period of time example with the use of internet for
verification of students through RFID card reader and RFID card becomes easy because it is not
costly and done in a short period of time to verify many students in a certain school (Albacete,
2013).
Verification of students is involves the use of ID card that identify a unique student. Some
universities in Tanzania have been experiencing the problem of identification of students who
have been completed to pay the university fees so as to allow them to sit for the final university
examinations. The current system used in verification of student involve the updating students
IDs every semester therefore only students who have already paid all fees use updated IDs that
identify them during the university examination.. Therefore the university administrator must
provide updated student ID cards to the students every semester before university examination
1
time that is very expensive because there are many students at the same university therefore a
large cost needs on IDs updating example at Ardhi University (ARU) there are many students.
There has been use of IoT technology in identification of valid ID card for the student that
involves the use of RFID reader and RFID card. Thus, this system have been designed by using
RFID Technology that includes RFID reader that capture student information from RFID card
pass input data into the microcontrollers for more processing, with the use of internet, the
processed data taken into the database so as to compare the captured data from the RFID card
with the stored data in the database, when the data match the output will be displayed in the LCD
display .The progress of the system starts when the switch of the circuit base is powered ON ,
initially the microcontroller will display the message as insert the card on the LCD display.
When the RFID reader detects the ID card, it will send the unique card no to the microcontroller
via serial terminal. Once, if any of these numbers matches with the received card number, then
the corresponding name of verified student stored in that number is displayed on the LCD
display and also the name of student stored in the corresponding number is marked. By pressing
the button, the card information recorded will be closed and the details will be displayed on the
LCD repeatedly until the microcontroller has been reset.
Different universities are experiencing the problem of identification of students who have
completed payment of fees which allow them to sit for the university examinations, For example
at Ardhi university (ARU) the system used to identify verified student who allowed to sit for
university exams is that, new IDs are created for each student who has completed fee payment in
that semester, for those who have been paid the fees to be given them as the identification to
enter into exams. Since this is the manual system, it is difficult for the authority university to
know the exactly number of students who sit for the exams and those who did not unless they
physically visit each hall.
Also through the manually system used at Ardhi university (ARU) some students fail to sit for
their first exams because they complete fee payment late especially few days before the
university exams that results to many students who needs to be verified in a short time
especially few days before the day of exams.
2
1.3 Objectives
The general objective of this dissertation was to design and implement an IoT based system for
identification of valid ID cards for examination.
Smart ID system have emerged as an efficient and cost-effective solution for tracking students’
information from different technologies like RFID technology. The RFID cards which can be
used as ID is due to its low cost and simplicity of implementation. If there are multiple objects in
the range of a tag reader, they all send their ID to the reader simultaneously in response to the
reader’s query so this will be effective for the need of student’s information to the universities
and it can reduce the cost of production of IDs every year in each course.
This part consist of steps of system development that divided into seven chapters that will be
used to achieve the above-mentioned objectives of this project. These chapters includes
3
Chapter one Introduction: This chapter describes what this dissertation is all about, it is broken
into various components that describes what led to this dissertation to be done, these components
includes the background of the problem, the statement of the problem, objectives of the study
both general objective and specific objectives, significance of the study, limitations of the study
and structure of the report itself.
Chapter two Literature review: This involves reading different sources of information in related
subjects part The sources to be used includes; books, research report and papers, this part
explores the existing systems with limitations and knowledge gaps will be used as reference in
accomplish this project.
Chapter three Methodology: This chapter explains the methodologies and various tools used to
deliver specific objectives of this dissertation, such methodologies used in this dissertation
includes interview and literature review, Object Oriented Analysis and Design ( OOAD),
Iterative Software Development Project Management (SDPM) strategy and beta and alpha
testing.
Chapter four System analysis and Design: This chapter explain the design techniques chosen to
design different diagram that gives understanding about what will be done in implementation
phase. It includes both UML diagrams and Architecture diagram.
Chapter five Implementation and testing: This chapter explain more about system development
which consider specification and functionalities of this dissertation. It includes system testing
both functional and user-acceptance testing
Chapter six Results and discussion: This chapter describes the results of this dissertation with
critical discussion about findings, goals achieved and future work especially parts of this work
that does not completed due to time constraints or other problems.
Chapter seven Summary: Conclusion and Recommendations: This is the last chapter of this
dissertation that includes a summary, conclusion and the recommendations about this study.
4
CHAPTER TWO
LITERATURE REVIEW
1.1 Introduction
This chapter provides necessary information about various aspect related to the project such as
smart ID system and how ID card used to identify a unique person within an origination or at a
certain place. Also involves the study about the use of RFID card for data capturing and how it
captured data from various places
2.2 Overview
In developing countries most universities facing with the identification of verified students until
the use of student ID card. They use a lot time and expensive to renew student ID card every year
of academic study to identify students who have already paid all fees so as to allow them to sit
for their university examination.
Most of researchers on study about smart card ID have basically tried to show the benefits of
identification of valid ID card for membership within the organization, but also they shows the
challenges that faces the organizations when they do not use ID for identification of organization
members with their qualifications in different departments. This research that I have done differ
from those of the researchers, it concentrate on how to identify a valid ID card for examination
by finding the solution on identification of university students who have already paid all fees
so as to allow them to sit for university examinations.
Most researchers on study about identification of valid ID card have basically tried to show
significance of using RFID to identify an individual by using RFID cards in different areas
where there is the need of membership identification it as being described by Martha and Robert.
(1998). Also describes the challenges that facing universities in developing countries on
verification of students so as to determine who have already paid the fees so as to perticipate in
academic isssues.This reserch comes with the solution to fill the gap that left opened by other
researcher that would shows understandable mechanism on student verification process by using
RFID card.
5
2.4 Significance of identification of valid ID card for examination by using RFID reader
ID card used to match students information by compared that is labelled at the card with that is
stored in the database. Only an administrator allowed to update student information therefore
during an examination only teacher access student information to determine verified students by
using student Id card and with RFID reader.
By using RFID reader for identification of valid ID card, less expensive involved compared to
the existing system thst used at Ardhi universty because they produce students ID every year of
academic study.
Therefore in high education student’s verification must done through modern technology os as to
reduce time and extremely cost used produce ID card every year of academic study and reduces
student queues at ID card generator office before universty examinations.
Also it reduce some challenges that facing Ardhi universty students especially those students
who paid all fees late before the examination because their ID provided late also and results to
some students to fail to sit for their exams especaily the first day of univeristy examination.
The following are different literature reviews on the use of smart ID system which is based on
the use of RFID technology in different places like schools and collages as an IOT system for
tracking different students’ records based on their requirements.
According to (Martha & Robert, 1988) identification of student information was done through
the use of smart card, that has unique processing unit in a computer system therefore verification
of student was done through the use computer system that includes smart card memories, smart
card used to store and process the information. Through the use of smart card, student must
insert his card into the card writer device and enter his credential details through the key body of
the card writer device then the card microcomputer chip process that credential details and
compare them with the stored information, when the information of a student match, the
6
information exchanges between the smart card and the host computer to determine the student’s
identity and which files within the host the student is entitled to access. The researcher shows
that, student allowed to read and update files through a terminal connected to the host computer
therefore student is the user of this system who many change is information any time.
According to (Privacy & Committee, 2006)identification of human subjects was done through
the use of RFID technology, human subjects identification help us to differentiate things when
there are interaction of different things at a certain place example at the border, at schools and at
airport where there are interaction of different people so as to ensure security of facilities of all
kinds. The researcher shows that RFID tagged identification documents present a certain
problem along two dimensions whereby an individual carrying RFID-tagged documents may not
always know what information they are sharing when they are identified by using an RFID
technology.
According to (Nailwal, 2021)Identification of student id card was done through the use of RFID
technology, RFID tags store student information that scanned to the RFID reader and provide
it’s an outputs through LCD display after being processed through microcontroller. This
researcher does not includes comparing of student information from the database it only
concerns with identification of a unique student through the scanning of RFID tag through the
RFID reader therefore it basing on hardware only in its work
According to Sumita Nainan and et.al (2013), automated identification of verified students was
done through the use of program error free tag identifier technology, the research used to identify
a unique students based on their unique tag identifiers through performing automated
identification of verified students who have already conducting fee payment basing on their
program Error free tag identifier detection, and Easy scalability to incorporate more records,
Integrity and security in data storage. This research does not use RFID card on its verification.
The developed system includes both hardware subsystem and software subsystem, those
subsystems work together to produce system output. Software subsystem store database
information through web application while hardware subsystem used to capture student
information from RFID card, it passes those information through various parts of this subsystem
then take them into the software subsystem through the use of RS232 port + wire, in software
subsystem student information from the hardware subsystem with that in software subsystem
being compared so as to identify if the student if verified or not, system output produced through
web access.
8
CHAPTER THREE
METHODOLOGY
3.1 Introduction
This part consist of various methods that were used to achieve general objective of the project.
Methodology that were used in this system is Rapid Application Development (RAD)
methodology, RAD involves main four phases in system development such include requirement
planning, user design, construction and system testing (Martha & Robert, 1988). There are
several specific objectives of this study, to achieve each specific objective there were different
methodologies applied such methodologies were widely describes as to how they were applied in
the study.
The following table provides a summary of the methodologies for each specific objectives
There are various methodologies that occurs in a sequence of steps, each step must depend on the
other step, example the next step must depend on the previous step in order to produce end
product.
The followings are the methodologies that have been used to achieve objectives of this project.
This activity involves collection of data and information that will be assist to accomplish the
designing of an expected system. The collection of data has been collected through interview,
observation and literature review methodologies. Interview methodology was used in data
collection, it was conducted face to face between interviewee and interviewer whereby an
interviewee ask question to the interviewer who respond on time about what he or she
understand about the asked questions, an interview was conducted between the developer of this
system with Ardhi university administration that includes search about processes that have been
done to accomplish student’s registration, student verification assurance of student and ID card
and who is conduct that processes at Ardhi University. Another methodology involved in data
collection is literature review that was involved in research finding about the current system
9
through reading different materials like books and research reports so as to find the gap of the
current system. Literature review used in research making about smart card ID, function of RFID
reader has shown by different researchers in their system development for identification of
membership in an organization. Also in this project research was done through observation
methodology that provides actual data from the case study.
This activity used to manipulate collected data using analytical reasoning for components
examination, it used to assist in the designing of the proposed system to come up with various
technologies, software and hardware components of the proposed system. It was done through
different methodologies such are Object Oriented Analysis and Design (OOAD) methodology
that includes unified Modelling Language (UML) diagrams like use case diagram, class diagram
and activity diagrams that were used to design software subsystem also IoT structure that used in
the designing of hardware subsystem of the system of verification of students.
This activity includes relatively high part of the whole work of system development. It depends
on the information that obtained from the previous activity, it was conducted through agile
methodology called Iterative Software Development Project Management (SDPM) strategy that
produce an expected output of the system through software subsystem and hardware subsystem
of the developed system.
This activity was conducted after production of an output of the developed, it used to test the
functionalities of the produced by comparing with expected objectives. It includes functional
testing and user acceptance testing that provide test results and report evaluation of the
developed system.
i Star UML The software that was used for system analysis and
10
design, UML diagrams like use case, class, activity and
sequence diagrams designed by using this software.
ii Integrated Development The software that was used to encompass all program
Environment(IDE) in one application. It offers central interface with the
tools include code editor, compiler, Debugger and
build automation tools.
iii Word processor The software that was used to write text. It consist of
Microsoft word that used in report writing.
vi Visual studio code It is the code editor that used to support system
development operations. Development languages and
Programming languages like PHP, HTML, JS and CSS
applied here.
vii Google chrome It is the free internet browser that allows user to access
web pages.
11
ii Analyze and design Object Oriented Analysis System designs(use case
the IoT system for and Design (OOAD): unified diagram, class diagram, activity
smart ID using Modelling Language (UML) diagram and sequence diagram)
different IoT diagrams system architecture (IoT structure
subsystems for identification of valid ID card)
12
CHAPTER FOUR
4.1 Introduction
This phase were involved in development of conceptual models that describe developer’s ideals
about an expected system, also it give abstract understanding to the user. It comprises IoT based
analysis together with web portal layout design. This chapter contains analysis of data collected,
which leads to design of the proposed system. The analysis involves both the qualitative and
quantitative analysis, hardware and software design are also included. Blocks of proposed system
are designed individually before being interfered together to complete the overall design of the
proposed system. The development of Information Technology (IT) systems involves analysis of
the system that gives the understanding to the user of what is going on for an expected output
(Saravanan et al., 2017). System analysis phase in system development shows the general
objectives of the system, also specify ways that used to solve the problem that facing the current
system through different components according to the system requirements of an expected
system. Proposed components for problem solving work together to ensure efficient and
effectiveness of the proposed system.
This is the process used to determine the needs and expectations of a new product. It includes
both stockholders and end-users of the product to define the problem, to identify the challenges
and resolve them by documenting key requirements (Wiley, n.d.). Also system design refers to
the process of defining the components, modules, interfaces of the system and satisfy the
specified requirements. Both system analyzes and system design used to develop an expected
system in collaboration.
It used to identify the process that needs by a specified system so as to persuade the customer’s
needs. These requirements includes the all needs for system developments like tools and data
such are:
13
4.2.2 Hardware requirement
It includes all hardware required in development of the system for determining the invalid ID
card for examination. These hardware used as described in the table below;
14
features of 16*4 LCD display
includes; Operating voltage :4.7v to
5.3 v, Current features: 1.65Ma,
Display features: alphanumeric and
Backlight :green
15
xix RS232
PORT +
WIRE
It provides device connection, it
connect the circuit with the computer
It includes all information that has been collected through interview and observation
methodology that determine the challenges facing the current methods used in identification of
valid ID card during examination.
It includes what user needs from the system, it explained in functional and non-functional
requirements of the expected system such are;
These are the functionalities that the system is expected to perform, also refers to the product
features that the developer respect to accomplish so as to satisfy user’s needs. The followings are
the functional requirements for an expected system for determination of valid ID card for
examination (Roberts et al., 2015).
i. The system should provide means of identifying verified student by using RFID
reader.
ii. The system should provide means of updating student account and activating student
accounts so as to get exactly information about verified students at a certain semester.
iii. The system should display all system notifications as an output.
Those are the requirements that describe the property or quality of the system (Chung, n.d.).
i. The system must be secure that only authorized person could use the system
16
The system will allow only bursar to update and verify student information through
web application, also will allow only administrator to register new students in the
university system.
ii. The system should be available and accessible all the time
The system will be accessed all the time without any errors that may occurs during
identification of verified students through RFID.
iii. The system should be more convenient to use and user friendly
The system is developed by using simple language that is understandable to the users
by showing directions through display of all actions that is going on in the
development system.
This is the diagram that consists four main building blocks, such blocks are sensor, network and
gateways, middleware and application whereby Sensor capture data from the actual
environment, network and gateways provide connection to the whole system through power
supply, middleware consists database and support processing analyzing and storage of data also
application block provides web access and android access and allow the end user to interact with
the system through web device (Wiley, n.d.).
RFID card
RFID reader
ATMEG328 Web
Database
application
ARDUINO
Key
Power supply
Figure 4.1 IoT system structure
17
4.4.2 Unified Modelling Language (UML)
It language used for specializing and visualizing complex software in a particular large object
oriented projects. It is a methodology used in modern projects and it is broken into four main
phases such are process, design, implementation and deployment. There are various diagrams
that drawn for the purpose of analysis and design and these diagrams gives the understanding for
what is going to be implemented. In this system UML diagrams that used to visualize a system
for identifying valid ID card for examination are use case diagram, class diagram, activity
diagram and sequence diagram.
The followings are the UML diagrams drawn for the analytical and design of the new pharmacy
system management of this study as follows:
4.4.2.1Use-case diagram
Those are the diagrams that show relationship between external parts and internal parts of the
system especially interaction between actors and use cases (James, 2011). According to the
system of verifying valid ID card, a web portal use case diagram used to describe the series of
actions that must considered to verify the student account through web application. Only
authorized users especially bursar who required to update and verify student account, the
diagram consists of various parts include system boundaries, use case, actors, inclusion and
exclusion, generalization and specialization.
18
System
Login
<<include>>
Verify ID card
Invigillator
Logout
4.4.2.2Class diagram
This diagram describes the structure and behavior in the use cases of the system also this
diagram identify end-user interaction. It include various classes whereby each class represented
by a rectangular subdivided into three component s such are name, attributes and operations. A
class diagram designed to develop a system of identification of valid ID card are describes below
19
User
+Userid: int
+UserName: string
+UserEmail: string
+UserPassword: string
+Login()
+Log out()
Administrator Invigillator
+update() +Verify()
1
1 Register
Verify ID card
1..*
1..*
Student
+StudentName: string
+StudentId: int
+Create()
+deactivate()
+verifyStudent()
20
the flow of activities that involved in the development of identification of valid ID card system .
21
CHAPTER FIVE
IMPLEMENTATION AND TESTING
5.1 Introduction
Implementation phase involve the development of designed system so as give the complete
expected output according to the visions and plans that have been set in the previous phase. In
IT system development, implementation phase taken into consideration after designing phase
therefore it depend on the output of design and analyses stage in designing phase that was
presented on the previous chapter. Both web application and RFID technology based model were
developed through the use of t an output of the previous chapter in order to give the real product
of an expected system.
This is an application that developed for the purpose of registration and verification of university
students. Only authorized users interact with the system for different purpose they cooperate to
produce an expected output into the RFID reader model technology. It allow only bursar to
verify new students and registered students also an administrator used to register verified
students into the university system. The followings are the pages for the web application
22
5.2.2 Registration page
This page used to record student and users’ information in the system, authorized users must
registered in order to be allowed to interact with the system by login in by using their username
and password.
This is the first page that an authorized users interact with before entering the system. Only
registered users interact with this page by using their sensitive information (username and
password) that have already stored in the database through registration. Example an
administrator interact with this page that direct him to administrator’s page to register students
who have already verified by bursar.
This is the first page that an administrators interact with after login into the system, it direct him
to perform system operations includes to registers university students and managing registered
student.
This page shows all students registered by an administrator. Only admin interact with this page,
he perform two main activities such are; addition of new students into the system also may delete
students from the system.
This model was developed through the use of IoT technology that provide support through the
use of IoT components that have mentioned in the previous chapter.
The model was designed through the circuit base that used to input data into the model also give
an output of the whole system by using LCD display,RFID technology based model was used to
24
develop a system that support web portal to give an expected output whereby an RFID card
inserted into the RFID reader to capture student information, also captured data pass through
microcontroller to the database, within the database the data processed and compared with that
storage data that was updated and verified by an administrator so as to display verified student as
an output into the LCD display through the use of internet.
This is the upper part of the model that occurs in circuit base, it includes various IoT components
used to input data into the model through the circuit base includes RFID reader that used to
capture students information from RFID card,RS232 port that provides device connection
between laptop and RFID technology based model, input wire that inputs 12v of current into the
circuit model so as to facilitates all activities of the whole model, switch that provide power
supply to the LCD display to turn it OFF or ON,Potentialmeter that vary the brightness of LCD
display,LEDs that used to show the brightness of the LCD display in green color when it is ON
also show the red color to represent that the switch is ON,LCD display used to give an output of
the whole system by display all notification about what is going on in the system.
This is the inner part of the model that shown through the circuit base, it includes various IoT
components that work together to reach an expected goal. These components includes voltmeter
regulators of 7805 (5v) and that of 7812(12v) that regulate voltages accordingly 5v or 12v
25
respectively.7805 (5v) regulates current from the input wire about 5v or below it and transfer it
into the microcontroller, LCD display, RFID reader and into the potential meter, 7812(12v)
regulates the current from the input wire up to the maximum of 12v, it facilitates the regulated
current into the buzzer.
5.4 Testing
It is completed after implementation phase, whereas a functionalities and user acceptance output
produced. The produced functionalities compared with functional requirement of the system also
interview opinions that have been done during data collected being tested so as to obtain if those
opinions have been considered during system development.
26
Table 5.1 Functional testing
The system should Web portal and RFID The web portal provide the list of
provide means of technology based verified student by bursar, each
identifying verified model expected to student have a unique
student by using RFID communicate through identification that is similar with
reader. the use of internet so as the RFID card number, therefore
to identify verified the unique number identify a
student by comparing unique student in the database and
the student information by using RFID card.by using
from the database with RFID reader a user insert RFID
that in the RFID card. card that identify a unique student
to identify if he or she is already
verified, if his or her information
match with that in the database the
output displayed on the LCD
display.
The system should Only Bursar expected Web portal ensures authorized
provide means of to update information users do what they supposed to do,
updating student account of registered students also ensures each student who
and activating student in every semester of have already paid all fees of a
accounts so as to get academic study, certain semester of academic year
clearly information about updates conducted only being verified after making
verified students at a when a student pay all payment.
certain semester. fees.
The system should allow An output of the whole The system provides the output
LCD display to display system expected to be through LCD display, all
all system notifications displayed in the LCD notifications provided within the
27
as an output. display system displayed on the LCD
display.
The system should have The web portal The system provides the student
ability of sending student expected to send information into the RFID card at
information into the student information a time of student registration,
RFID card and the ability after registering the every student receives a unique
of making comparison of student in the database, RFID card and the number of
student information RFID card has a unique RFID card increases due to the
between stored number that being increases of registered students in
information into the updated during student the database.
database and the registration due to the
information stored in number of registered
RFID card. students,
It was conducted through the interview about the study, it includes the opinions from the students
and university administration about challenging facing them on student registration. It have been
done at Ardhi University. Some user’s opinions propose the developed system to be available
all the time and the system must be user friendly, also the RFID technology based model must
give notifications about what is going on in the system.
28
CHAPTER SIX
6.1 Introduction
The chapter shows findings that shows the results of the developed system for identification of
valid ID card that applied during university examination to identify all student who allowed to sit
for their examination.
6.2 Findings
These are output obtained from all processes that have been done in system development. The
output obtained used to solve the challenges that facing the current system used to identify
verified student during examination.
6.2.1 Products
These products are those things that have been achieved from the developed system. In this
system both web portal and RFID technology based model have been achieved that has described
below;
This product obtained, it used for registration and verification of university student into the
database. It used by only authorized users includes administrator who register other users and
university student also he could add, update and delete other users in the system, also an
invigilator verify registered student who have already paid fees.
29
iv. Web portal send students’ information to the RFID technology based model so as to
make comparison between the stored data into the database with that of RFID card that
captured by RFID reader.
IoT based model achieved based on RFID technology. An RFID reader was used to capture
student information from the RFID card through the use of internet. This model was developed
through the circuit case that generates input and output of data. It consists various IoT
components that cooperate to give an expected output, these components includes
microcontroller that control all activities of the circuit base, LCD display that used to display an
output of the whole system and RS232 PORT + WIRE that gives device connection.
Those are the data collected from different resources such as books, literature reviews, interview
that have been conducted in the case study area. These includes;
This part shows the results that have been expected to be achieved at the end of system
development, the obtained results concerns on the specific objectives of this project that have
been mentioned in part 1.3.2.Through the use of different resources of study includes literature
reviews and research findings that have been done through interview and observation, both used
to bring what is achieved at the end of the system development. There are many challenges that
occurred during system development especially expensive consumed to buy required
components that were used in development of hardware subsystem but still the results have been
achieved as follows;
30
i. Implemented system ensure sending of notifications between users and devices through
different activities.
ii. The implemented system have ability to allow device connection so as to show
comparison about student information so as to determine verified student.
iii. The system have ability to scan the student card through the RFID reader in order to
identify a unique student.
iv. The system have ability to display system notification into the LCD display such as
insert card also display all output that have been determined from the inserted card.
31
CHAPTER SEVEN
7.1 Introduction
This chapter presents the summarization of the study, it includes conclusion and
recommendations basing on Ardhi University as the case study that have used in development of
this dissertation project.
7.2 Summary
This part was obtained from the general objective of the study which is to develop an IoT based
system for identification of valid ID cards for examination that was obtained by developing a
web portal and RFID technology based system. The results have been obtained through
providing solutions of the research questions of the study that have been mentioned on chapter
one (1.4). The summary about research question as follows;
The research question aimed at understanding the challenges facing the identification of Verified
student during examination. To answer this question, interview and observation methodologies
were used to collect data from the school administration on the department that deals with
students’ verification. The results shows that student verification was done by using student ID
cards that have been updated every semester of academic study at the university that ensure a lot
of money. The proposed answer is to develop the system that use RFID card and RFID reader to
identify the verified students during university examination.
The research question aimed at understanding the general content of the developed system on
identification of verified student. Some questions were asked about how RFID technology used
in identification of verified student, such questions were how to put student information into the
RFID card, how to capture student information from the RFID card how to compare student
information from that stored in database and that stored in the RFID card. To answer this
question, various diagrams were developed like UML diagram such are use case diagram, use
case diagram and activity diagram that used in development of software subsystem also IoT
32
system architecture was designed that was used in development of hardware subsystem,
hardware subsystem were used to capture student information from the RFID card that were
scanned on the RFID reader also the collected data passed through different parts of the
subsystem into the software subsystem in order to make comparison of student information. Also
the UML diagrams were used in software development. The hardware subsystem that used to
compare student information between the received data from hardware subsystem with the stored
information in the database. on how to verify student by using RFID reader that contains
questions like how to put student information into the RFID card, how to capture student
information from the RFID card how to compare student information from that stored in
database and that stored in the RFID card.
The research question aimed at understanding the output of the designing phase so as give the
product of an expected output from the designing. To answer this question, hardware subsystem
were designed to capture student information from the RFID card that passed through the system
components to the hardware subsystem, in the hardware subsystem student information
compared, if matches the system gives an output of the whole by displaying verified students and
those who have not registered through web access.
The research question aimed on understanding and determine the recommendation from users of
the developed system, by determine whether the developed system solve or does not solve the
challenges faced the current also to identify where there are still challenging on system
functionalities. To answer this question, the users must test the functionalities of developed
system so a recommend about what is produced from what is expected to be an output on
identification of verified student through the use of RFID technology.
7.3 Conclusion
An output of the developed system fill the gap of the current system by providing the modern
ways of identifying verified university students by using RFID technology, the developed
system contain two parts that are hardware subsystem and software subsystem, those subsystems
communicates through the use of RS232 PORT +WIRE through the use of internet, the
33
developed system facilitates the increase of academic performance at universities by reducing
challenges of IDs to students during the examination especially for those who paid late the
university fees. The more study that can be conducted is to develop a system for identification of
verified students by using wireless connection between the databases with an RFID technology
based model in order to make it easy to use.
7.4 Recommendation
An RFID card that updated after student registration that store the same information about a
unique registered student, the process involved to capture student information from the RFID
card is too much and it involves a lot of processes in order to give an output about verified
students when the card information match with that of database therefore I recommend that,
android application may connected to the RFID technology based model to give an output of the
system through android phone whereby an output of the whole students provided through
smartphone in order to increase the number of users because one model may use by whole
students at the time because connection between RFID technology based model and android is
wireless.
34
REFERENCES
Albacete, J. B. (2013). Radio Frequency Identification ( RFID ) Tags and Reader Antennas
Based on Conjugate Matching and Metamaterial Concepts. July.
Chung, L. (n.d.). Non- Non -Functional Requirements Non- Non -Functional Requirements.
Martha, E., & Robert, B. J. (1988). Computer Science and Technology Smart Card Technology :
New Methods for Computer Access Control.
Navaneeth, S., Megha, P. M., Sruji, N. M., Anusha, T. R., & Haritha, S. (2018). Students smart
card using RFID. International Research Journal of Engineering and Technology, 5(4),
1125–1127.
Privacy, D. H. S. D., & Committee, I. A. (2006). Report No . 2006-02 The Use of RFID for
Human Identity Verification I . Introduction and Executive Summary II . RFID Technology
Overview. Technology, 1–13.
Roberts, S., Roberts, S., & Sanders, G. H. (2015). R EQUIREMENTS D OCUMENT Digitally
signed by. 1–55.
Saravanan, K., Floyd, R. W., Mcllroy, D., Morris, C., Boehm, B., Methodol-, C., Highsmith, J.,
& North, D. (2017). SYSTEMS DEVELOPMENT METHODOLOGIES : CONCEPTUAL
STUDY. 14(1), 27–37.
Zhu, X.W., Mukhopadhyay, S.K. and Kurata, H. (2012) A Review of RFID Technology and Its
Managerial Applications in Different Industries. Journal of Engineering and Technology
Management, 29, 152-167. https://doi.org/10.1016/j.jengtecman.2011.09.011
35
[2] Fang, Z.Y., Wei, L., Chen, W. and He, Y.J. (2012) A RFID-Based Kindergarten Intelligence
Security System. In 2012 IEEE Ninth International Conference on e-Business Engineering,
Hangzhou, 9-11 September 2012, 321-326. https://doi.org/10.1109/ICEBE.2012.59
[3] Vidyasagar, K., Balaji, G. and Narendra Reddy, K. (2015) RFID-GSM Imparted School
Children Security System. Communications on Applied Electronics (CAE), 2, 17-21.
[4] Curran, K. and Norrby, S. (2009) RFID-Enabled Location Determination within Indoor
Environments. International Journal of Ambient Computing and Intelligence (IJACI), 1, 63-86.
https://doi.org/10.4018/jaci.2009062205
[5] Iyer, S. (2005) RFID: Technology and Applications. Eleventh National Conference on
Communications.https://www.worldcat.org/title/proceedings-of-the-eleventh-national-
conference-on -communications-ncc -2005-28-30-january-2005/oclc/296289117
36