SlideShare a Scribd company logo
1 of 7
Download to read offline
American Journal of Multidisciplinary Research & Development (AJMRD)
Volume 3, Issue 01 (January- 2021), PP 01-07
ISSN: 2360-821X
www.ajmrd.com
Multidisciplinary Journal www.ajmrd.com Page | 1
Research Paper Open Access
SECURING LECTURE HALL KEY SYSTEM USING RFID
TECHNOLOGY
Dr. Egho-Promise E.I.1
, Bamidele Ola 2
, Bright- Edujih Kuleke 3
1
Regional Technical Head, Glo Mobile Ghana Ltd, Tamale, Ghana
2
Technobeacon Consulting Ltd, London, UK
3
Koforidua Technical University, Koforidua, Ghana
A CASE STUDY OF KOFORIDUA TECHNICAL UNIVERSITY, GHANA
Abstract— Radio Frequency Identification (RFID) is a device that identifies any object attach to it. With the help
of RFID technology, students or lecturers eligibility for keys to lecture halls or offices can be validated.
Most of the smart cards are read by smart card readers or Radio Frequency Identification (RFID) Readers. These
readers read the information on the card to perform its designated function.
The use of smart cards has become a pivotal point of interest and development pattern to most organizations and
institutions because of its efficiency in making tasks to be performed faster without waste of time in terms of staff and
students checking in and checking out at work. Most organizations in Ghana use these smart cards technologies to
check-in and check-out their staffs.
Keywords— RFID, RFID tags, Key System
I. INTRODUCTION
RFID is a wireless device which automatically identify any object attach to it through tag which stores the
information [1]. It can be used to track objects, people or animals using tags that respond to radio waves.
The Radio Frequency Identification is a system which consists of a label or tag and a reader. The RFID label
has a transceiver (transmitter and receiver) implanted. The RFID module on the label comprises microchip which
stores and processes data and an antenna which receives and transmits signal. The label encompasses a precise
sequential code for the exact entity.
Two-way radio transmitter-receiver called a reader emits a signal to the label using an antenna whenever the
data embedded on a label is to be read. The label responds with the data in its memory bank and the reader transmits
the results to the RFID computer as shown in figure 1 below [2].
Information technology professional stated that high tech non-contact card offers institutes the capability to
provide much protection and greater experience for staff and students on campuses [3].
SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY
Multidisciplinary Journal www.ajmrd.com Page | 2
Figure 1: RFID System
1.1 Problem statement
There is frequent access to lecture hall and office keys at the security posts by unauthorized persons and these keys
are not returned.
1.2 Objectives
1. To prevent unauthorize access to lecture hall and office keys
2. To send notification through email on misplaced ID card to the authentic owner
3. To electronically collect and store students data whenever key is collected at the security post
1.3 Importance of the study
The system will help to collect and store students data whenever they collect lecture or office key for use. It
will help to trace any missing key to the real student who collected the key at security post. Students who are not
eligible to collect lecture hall or office key will be denied access.
II. LITERATURE REVIEW
Different literatures were studied and properly reviewed to discover issues associated with them and bridge
such gaps.
University of Ghana introduced the use of multi-purpose customized card called UG-Cruz Card to assist
their students and lecturers in performing their activities. The card acts as a proof of identity for students and eases
admittance to libraries and gain access to other services [4]. It was discovered that the UG-Cruz card does not provide
functionality of automatically checking-in students when signing in for keys to their various departments, faculties
and classrooms for the purpose of lectures, seminars, among others. This was a major challenge of the smart card.
University of Cape Coast also implements the use of smart card to perform their basic operations. Just as the
UG-Cruz card works for University of Ghana, the smartcard for the university of cape coast works in the manner but
does not allow students to automatically check in whenever key is to be collected at security post. This was another
challenge associated with the smart card.
A web based automated system call securing lecture hall key system using RFID technology will be
designed and developed to bridge these identified gaps.
III. METHODOLOGY
In this study, qualitative approach will be used and the research instrument will be interview because it
generates more insightful responses [5].
3.1 Agile Model
The Agile model will be adopted to develop the system. It is a set of principles for software development in
which requirements and solutions evolve through collaboration between self-organizing and cross-functional teams
[6]. The model has the followings benefits namely:
 It promotes adaptive planning
 It allows early delivery
 It permits continuous improvement of the system
3.2 Phases of Agile Model
Below figure represents the different phases in agile model
SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY
Multidisciplinary Journal www.ajmrd.com Page | 3
Figure 2: Agile mode diagram showing all the phases involve in software development
3.3 Use Case Diagram
The use case stated below demonstrate relationship between users and the system
Figure 3: Use case diagram
3.4 Database Tables
Name of Key Time Taken Time Returned
str (value) strftime (value) strftime (value)
Table 1: the table shows data types declarations for fields names used to store issued keys
Name of Key Time Taken Time Returned
str (value) strftime (value) strftime (value
Table 2: the table displays data types declaration for field names used to store returned keys
Students ID Number Student Name Student Programme Student Eligibility
SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY
Multidisciplinary Journal www.ajmrd.com Page | 4
Table 3: the table shows data types declarations for field names used to students details
3.5 Software Development Tools
The system will be developed using the below programming tools:
 Python
 PyQt
 Qt Designer
 PyCharm
3.5 Functional Requirements of the system
The followings are the system functional requirements to be implemented namely:
 Issuing key to student
 Collecting key from student
 Displaying eligibility of student
 Sending email notifications to student who misplaced ID card
 Permitting or denying student access to lecture hall key
3.6 Non-Functional Requirements of the system
 Automatic Searching for key
 Authenticating users before issuing key
Verifying users login credentials before gaining access to the system
IV. RESULTS
4.1 Main Connector Source codes
Figure 4: showing the main connector source codes of the system
4.2 Records Source Codes
str (value) strftime (value) strftime (value) img (value)
SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY
Multidisciplinary Journal www.ajmrd.com Page | 5
Figure 5: showing the students records source codes
4.3 Return Key Source Codes
Figure 6: displaying key source codes
4.4 System Testing
After developing the system, different tests were performed to ascertain the usability, adaptability,
reliability and maintainability of the system. The tests include unit testing, integration testing, system testing, white
box testing, black box testing and usability testing. All the tests conducted on the system proved successful.
4.5 System Interfaces
4.5.1 User login interface
SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY
Multidisciplinary Journal www.ajmrd.com Page | 6
Figure 7: it displays the interface where user can provide their login credentials before accessing the system
4.5.2 Issuing key interface
Figure 8: it displays the form where key can be issued to authorize student
4.5.3 Managing settings interface
SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY
Multidisciplinary Journal www.ajmrd.com Page | 7
Figure 9: it shows the interface for managing settings
4.5.4 View records interface
Figure 10: it displays interface that allows students records to be viewed
V. CONCLUSION
With the above demonstrated results, we have effectively developed securing lecture hall key system using
RFID technology that prevents unauthorize access to lecture hall and office keys, sends notification messages
through email about misplaced ID card to the authentic owner and electronically collects and stores students data
whenever key is collected at the security post.
REFERENCES
[1] Chaulya, S.K., Prasad, G.M. (2016). Radio Frequency Identification. ScienceDirect. Retrieved from
https://www.sciencedirect.com/topics/engineering/radio-frequency-identification
[2] Epc-RFID Info(2020). How does a RFID system work?. Retrieved from https://www.epc-rfid.info/rfid
[3] Austin (2017, January 11). HID Global Predicts Top Trends for 2017 in the Identity Technology Industry.
HID. Retrieved from https://www.hidglobal.com/press-releases/hid-global-predicts-top-trends-2017-in-
identity-technology-industry
[4] Tawiah, E.F. (2013, November 30). University of Ghana introduces electronic cards. Modern Ghana.
Retrieved from https://www.modernghana.com/news/505936/university-of-ghana-introduces-electronic-
cards.html
[5] Colson (2017, January 23). In-Depth Interviews: Data Collection Advantages and Disadvantages.
Communications for Research. Retrieved from https://www.cfrinc.net/cfrblog/in-depth-interviewing
Kazia, I.T. (2019, February 26). Agile Software Development: The Way to Revolutionize the Software
Industry. B4. Retrieved from https://medium.com/learnfazz/agile-software-development-way-to-
revolutionize-the-software-industry-1b4cbc6ab9c2

More Related Content

Similar to SECURING LECTURE HALL KEY

A Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionA Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionIRJET Journal
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET Journal
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...IRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMijsptm
 
IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIRJET Journal
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceIOSR Journals
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...IRJET Journal
 
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...IAEME Publication
 
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...IAEME Publication
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxSMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxDanielGuballo1
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainIRJET Journal
 
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...Henry Chukwuemeka Paul
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFIDIRJET Journal
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...IRJET Journal
 

Similar to SECURING LECTURE HALL KEY (20)

A Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionA Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face Recognition
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google Sheet
 
Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...
 
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
 
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxSMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 

More from ajmrdjournals (20)

C372122.pdf
C372122.pdfC372122.pdf
C372122.pdf
 
E323741.pdf
E323741.pdfE323741.pdf
E323741.pdf
 
E372731.pdf
E372731.pdfE372731.pdf
E372731.pdf
 
G316268.pdf
G316268.pdfG316268.pdf
G316268.pdf
 
D312843.pdf
D312843.pdfD312843.pdf
D312843.pdf
 
D362842.pdf
D362842.pdfD362842.pdf
D362842.pdf
 
G374044.pdf
G374044.pdfG374044.pdf
G374044.pdf
 
D353451.pdf
D353451.pdfD353451.pdf
D353451.pdf
 
E314456.pdf
E314456.pdfE314456.pdf
E314456.pdf
 
F364959.pdf
F364959.pdfF364959.pdf
F364959.pdf
 
C352033.pdf
C352033.pdfC352033.pdf
C352033.pdf
 
A380114.pdf
A380114.pdfA380114.pdf
A380114.pdf
 
B340723.pdf
B340723.pdfB340723.pdf
B340723.pdf
 
H374553.pdf
H374553.pdfH374553.pdf
H374553.pdf
 
D372326.pdf
D372326.pdfD372326.pdf
D372326.pdf
 
C322330.pdf
C322330.pdfC322330.pdf
C322330.pdf
 
B381520.pdf
B381520.pdfB381520.pdf
B381520.pdf
 
C342433.pdf
C342433.pdfC342433.pdf
C342433.pdf
 
C382135.pdf
C382135.pdfC382135.pdf
C382135.pdf
 
C311327.pdf
C311327.pdfC311327.pdf
C311327.pdf
 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 

SECURING LECTURE HALL KEY

  • 1. American Journal of Multidisciplinary Research & Development (AJMRD) Volume 3, Issue 01 (January- 2021), PP 01-07 ISSN: 2360-821X www.ajmrd.com Multidisciplinary Journal www.ajmrd.com Page | 1 Research Paper Open Access SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Dr. Egho-Promise E.I.1 , Bamidele Ola 2 , Bright- Edujih Kuleke 3 1 Regional Technical Head, Glo Mobile Ghana Ltd, Tamale, Ghana 2 Technobeacon Consulting Ltd, London, UK 3 Koforidua Technical University, Koforidua, Ghana A CASE STUDY OF KOFORIDUA TECHNICAL UNIVERSITY, GHANA Abstract— Radio Frequency Identification (RFID) is a device that identifies any object attach to it. With the help of RFID technology, students or lecturers eligibility for keys to lecture halls or offices can be validated. Most of the smart cards are read by smart card readers or Radio Frequency Identification (RFID) Readers. These readers read the information on the card to perform its designated function. The use of smart cards has become a pivotal point of interest and development pattern to most organizations and institutions because of its efficiency in making tasks to be performed faster without waste of time in terms of staff and students checking in and checking out at work. Most organizations in Ghana use these smart cards technologies to check-in and check-out their staffs. Keywords— RFID, RFID tags, Key System I. INTRODUCTION RFID is a wireless device which automatically identify any object attach to it through tag which stores the information [1]. It can be used to track objects, people or animals using tags that respond to radio waves. The Radio Frequency Identification is a system which consists of a label or tag and a reader. The RFID label has a transceiver (transmitter and receiver) implanted. The RFID module on the label comprises microchip which stores and processes data and an antenna which receives and transmits signal. The label encompasses a precise sequential code for the exact entity. Two-way radio transmitter-receiver called a reader emits a signal to the label using an antenna whenever the data embedded on a label is to be read. The label responds with the data in its memory bank and the reader transmits the results to the RFID computer as shown in figure 1 below [2]. Information technology professional stated that high tech non-contact card offers institutes the capability to provide much protection and greater experience for staff and students on campuses [3].
  • 2. SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Multidisciplinary Journal www.ajmrd.com Page | 2 Figure 1: RFID System 1.1 Problem statement There is frequent access to lecture hall and office keys at the security posts by unauthorized persons and these keys are not returned. 1.2 Objectives 1. To prevent unauthorize access to lecture hall and office keys 2. To send notification through email on misplaced ID card to the authentic owner 3. To electronically collect and store students data whenever key is collected at the security post 1.3 Importance of the study The system will help to collect and store students data whenever they collect lecture or office key for use. It will help to trace any missing key to the real student who collected the key at security post. Students who are not eligible to collect lecture hall or office key will be denied access. II. LITERATURE REVIEW Different literatures were studied and properly reviewed to discover issues associated with them and bridge such gaps. University of Ghana introduced the use of multi-purpose customized card called UG-Cruz Card to assist their students and lecturers in performing their activities. The card acts as a proof of identity for students and eases admittance to libraries and gain access to other services [4]. It was discovered that the UG-Cruz card does not provide functionality of automatically checking-in students when signing in for keys to their various departments, faculties and classrooms for the purpose of lectures, seminars, among others. This was a major challenge of the smart card. University of Cape Coast also implements the use of smart card to perform their basic operations. Just as the UG-Cruz card works for University of Ghana, the smartcard for the university of cape coast works in the manner but does not allow students to automatically check in whenever key is to be collected at security post. This was another challenge associated with the smart card. A web based automated system call securing lecture hall key system using RFID technology will be designed and developed to bridge these identified gaps. III. METHODOLOGY In this study, qualitative approach will be used and the research instrument will be interview because it generates more insightful responses [5]. 3.1 Agile Model The Agile model will be adopted to develop the system. It is a set of principles for software development in which requirements and solutions evolve through collaboration between self-organizing and cross-functional teams [6]. The model has the followings benefits namely:  It promotes adaptive planning  It allows early delivery  It permits continuous improvement of the system 3.2 Phases of Agile Model Below figure represents the different phases in agile model
  • 3. SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Multidisciplinary Journal www.ajmrd.com Page | 3 Figure 2: Agile mode diagram showing all the phases involve in software development 3.3 Use Case Diagram The use case stated below demonstrate relationship between users and the system Figure 3: Use case diagram 3.4 Database Tables Name of Key Time Taken Time Returned str (value) strftime (value) strftime (value) Table 1: the table shows data types declarations for fields names used to store issued keys Name of Key Time Taken Time Returned str (value) strftime (value) strftime (value Table 2: the table displays data types declaration for field names used to store returned keys Students ID Number Student Name Student Programme Student Eligibility
  • 4. SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Multidisciplinary Journal www.ajmrd.com Page | 4 Table 3: the table shows data types declarations for field names used to students details 3.5 Software Development Tools The system will be developed using the below programming tools:  Python  PyQt  Qt Designer  PyCharm 3.5 Functional Requirements of the system The followings are the system functional requirements to be implemented namely:  Issuing key to student  Collecting key from student  Displaying eligibility of student  Sending email notifications to student who misplaced ID card  Permitting or denying student access to lecture hall key 3.6 Non-Functional Requirements of the system  Automatic Searching for key  Authenticating users before issuing key Verifying users login credentials before gaining access to the system IV. RESULTS 4.1 Main Connector Source codes Figure 4: showing the main connector source codes of the system 4.2 Records Source Codes str (value) strftime (value) strftime (value) img (value)
  • 5. SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Multidisciplinary Journal www.ajmrd.com Page | 5 Figure 5: showing the students records source codes 4.3 Return Key Source Codes Figure 6: displaying key source codes 4.4 System Testing After developing the system, different tests were performed to ascertain the usability, adaptability, reliability and maintainability of the system. The tests include unit testing, integration testing, system testing, white box testing, black box testing and usability testing. All the tests conducted on the system proved successful. 4.5 System Interfaces 4.5.1 User login interface
  • 6. SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Multidisciplinary Journal www.ajmrd.com Page | 6 Figure 7: it displays the interface where user can provide their login credentials before accessing the system 4.5.2 Issuing key interface Figure 8: it displays the form where key can be issued to authorize student 4.5.3 Managing settings interface
  • 7. SECURING LECTURE HALL KEY SYSTEM USING RFID TECHNOLOGY Multidisciplinary Journal www.ajmrd.com Page | 7 Figure 9: it shows the interface for managing settings 4.5.4 View records interface Figure 10: it displays interface that allows students records to be viewed V. CONCLUSION With the above demonstrated results, we have effectively developed securing lecture hall key system using RFID technology that prevents unauthorize access to lecture hall and office keys, sends notification messages through email about misplaced ID card to the authentic owner and electronically collects and stores students data whenever key is collected at the security post. REFERENCES [1] Chaulya, S.K., Prasad, G.M. (2016). Radio Frequency Identification. ScienceDirect. Retrieved from https://www.sciencedirect.com/topics/engineering/radio-frequency-identification [2] Epc-RFID Info(2020). How does a RFID system work?. Retrieved from https://www.epc-rfid.info/rfid [3] Austin (2017, January 11). HID Global Predicts Top Trends for 2017 in the Identity Technology Industry. HID. Retrieved from https://www.hidglobal.com/press-releases/hid-global-predicts-top-trends-2017-in- identity-technology-industry [4] Tawiah, E.F. (2013, November 30). University of Ghana introduces electronic cards. Modern Ghana. Retrieved from https://www.modernghana.com/news/505936/university-of-ghana-introduces-electronic- cards.html [5] Colson (2017, January 23). In-Depth Interviews: Data Collection Advantages and Disadvantages. Communications for Research. Retrieved from https://www.cfrinc.net/cfrblog/in-depth-interviewing Kazia, I.T. (2019, February 26). Agile Software Development: The Way to Revolutionize the Software Industry. B4. Retrieved from https://medium.com/learnfazz/agile-software-development-way-to- revolutionize-the-software-industry-1b4cbc6ab9c2