1 / 18

TITLE

TITLE. RFID FOR EDUCATIONAL INSTITUTIONS AND OFFICES. STUDENTS INVOLVED. SANDEEP S RAKSHITH N VINAYAKA D J. CONTENTS. Foreword Rfid readers and software RFID FREQUNCIES RFID tags Concept and working Granting of attendance Id card Sources conclusion. FOREWORD.

dieter
Télécharger la présentation

TITLE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TITLE RFID FOR EDUCATIONAL INSTITUTIONS AND OFFICES

  2. STUDENTS INVOLVED • SANDEEP S • RAKSHITH N • VINAYAKA D J

  3. CONTENTS • Foreword • Rfid readers and software • RFID FREQUNCIES • RFID tags • Concept and working • Granting of attendance • Id card • Sources • conclusion

  4. FOREWORD RFID FOR EDUCATIONAL INSTITUTIONS AND OFFFICES The aim of the project is to develop an RF based ID system for use in schools and colleges. This system can also be used in companies. Here as it is used in college campus, there is no restriction of students, they can move around freely in the campus and any student wearing the tag must be tracked inside the campus. There will be multiple readers employed in every class and labs of the college so that whenever a student enters or leaves the room/lab, a note is made.

  5. RFID READERS AND SOFTWARE RFID READER • RADIO FREQUENCY TRANSMITTER AND RECEIVER • CONTROLLED BY MICROPROCESSOR • CAPTURES DATA FROM RFID TAGS AND PASSES DATA TO COMPUTER THROUGH ANTENNA SOFTWARE • SPECIAL SOFTWARE TO CONVERT RADIO WAVES INTO LOGICAL TERMS

  6. RFID FREQUENCIES • TAGS AND READERS MUST BE TUNED INTO SAME FREQUENCY. • RFID SYSTEMS CAN USE VARIETY OF FREQUENCIES TO COMMUNICATE • HIGH FREQUENCY RFID SYSTEMS (850MHz-950MHz) AND (2.4GHz-2.5GHz) OFFER TRANSMISSION RANGES OF MORE THAN 90 FEET

  7. RFID TAGS • PASSIVE RFID TAGS HAVE NO INTERNAL POWER SUPPLY. • ANTENNA IS DESIGNED TO COLLECT POWER FROM INCOMING SIGNAL AND ALSO TO TRANSMIT POWER • TAGS ARE SMALL • READ DISTANCES OF ABOUT 10cm-FEW METERS • TAGS MUST HAVE MORE THAN 10KB OF STORAGE The advantage of passive tag is that we don’t need a battery unlike the active tag .

  8. CONCEPT • A represents the reader. C and D represent the sensors.vice versa is also possible • You can have more than one entrance in order to avoid the queue. • The sensors work as explained. They send signals of very high frequency from C to D. • When a person enters the classroom\entrance, the tag sends frequency to D. If the student belongs to the class (college), he/she will be granted attendance. Otherwise, an alarm will be sounded. • Only one person can enter the classroom\ENTRANCE at a time.The process is very fast . • It has to be noted that one security guard must be present at the college entrance ONLY .

  9. Here are some of the possible scenarios. The following things takes place in the entrance of the college (The rfid tag gets charged only with the help of the readers .Afterwards it sends the signals to the sensor and to the reader.) Case 1: With valid ID card: If the student enters with valid ID card, part D receives different signals and it allows the reader to communicate with the tag. This process will take place in a fraction of a second. Case 2: Without valid ID card: When a student enters without a valid ID card, the sensor D receives signals and checks it. Thus the alarm will be sounded. Case 3: Without any ID card: When the student enters without any card, the sensor D either receives feeble signals or no signal from C. Thus the alarm will be sounded. Case 4: With Two ID cards: The sensor D receives two signals and thus an alarm will be sounded

  10. Case 5: Tampered ID card: • In case the ID card is broken or not working, the student must inform the security at the entrance so that he will provide a temporary ID card. The person controlling the server must be informed so that the temporary card will be activated. Thus attendance will be provided for the student. • For monitoring the position of the student, the register number of the student is entered in the software, the live information regarding the position of the student will be shown. • There are three softwares registered in the machine:(or it can done in the server,computer ) • To collect the data. • To process the data(attendance) • To monitor the student’s whereabouts. • Note: • The machines at the entrance of classrooms and campus will have readers and sensors. But in the remaining places of the campus, only readers will be installed. • The servers store information like name, USN numbers, address, code of the tag, telephone number, photo, blood group, etc.

  11. Implementation of Readers: Along the corridors, a reader will be installed for every 10m. It must cover the range of 5m. Care must be taken so that the readers do not interfere with each other. It is better to use Linux based system as it is inexpensive and we can change it according to our satisfaction and requirements. Rfid readers and sensors need 24 hrs power backup .If you are environment conscious you can use solar power or you can use normal power supply ,ie 240v power supply.

  12. Brief concept WORKING

  13. Detaileddesign GRANTING OF ATTENDANCE • When a student enters the classroom, the sensors will detect and the reader will note the time and will grant attendance to the student. The reader will also not the time if the student walks out of the class. Attendance will only be granted if the student stays in the class for a minimum of thirty minutes.  • When the student enters the canteen, attendance will not be given but the reader will only gather the where about of the student for live monitoring. If a student or faculty or any other member of the college enters, the machine will not sound because the software is designed to suit it. • At the college entrance, only monitoring is done, no attendance will be taken. Attendance will only be taken in the classroom and labs.

  14. The data collected regarding the attendance and the position of the • Student is kept in the computer .It can be accessed via computer , • Mobile phone .What must be done is that go to the site and just type • The roll number of the student or the employee of a company . • Instantly the position and attendance of the student or the • employee is given in the case of a company . • With our project the teachers need not take the attendance of the • Students and is a paperless work.you save a lot on paper work. • We need not take the attendance of the teachers ,working staff • manually, as they have their own Id cards . • The process is efficient ,streamlined and fast .It is very accurate and • the scope for errors is very less.

  15. RFID ID CARD • A: Photo of the student. • B: Hole to insert the plastic wire. • C: Name of the student. • D: Address with telephone number of the student. • E: Blood group of the student. • F: Details of the college Inside the card the tag Is present

  16. SOURCES OF INFORMATION • GOOGLE WEBSITE • www.datascansystems.com/RFIDsolutions.htm • A BOOK CALLED ``PRINCIPLES OF RFID``

  17. CONCLUSION • We have tried to install technology wherein a student cannot misuse the card. The developed technology should be able to eliminate malpractices such as giving proxy attendances. We are and will be committed to further work on the project to install better technologies in the future. We will try to install more features and develop new soft wares. We have made a conscious effort to reduce the cost of the project.

  18. THE END

More Related