SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2566
Automated Face Detection and Recognition for Detecting
Impersonation of Candidate
Jerolin Silviya. A1, Devaraj. V2, Vijay Bhoopathy. R3, Marirajan. S4
1,2,3UG Students, Department of Electronics and Communication Engineering,Valliammai Engineering College,
SRM Nagar, Kattankulathur, Tamilnadu ,India
4Assistant Professor, Department of Electronics and Communication Engineering, Valliammai Engineering college,
SRM Nagar, Kattankulathur, Tamilnadu, India
-----------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - Seating Arrangement of students during
examinations is distributed. Students face troubles as they
have to scrounge for their examination hall numbers and
seating arrangement while they are wits end. A new
technique which could aid the students in findingtheir exam
halls and seats would be welcoming and very rewarding.
This paper ―AUTOMATED FACE DETECTION AND
RECOGNITION FOR DETECTING IMPERSONATION OF
CANDIDATE presents a modernized method of examination
hall management. It is possible for a student to find the
particular exam hall from any other hall, when they swipe
RFID card in a card reader located there. This provides help
for the students to identify the floor or get directionstotheir
respective halls without delays. The card reader is available
at the entrance of the building,ifthestudents enters wrongly
a buzzer alarm sets off, otherwise the room number is
displayed on the LCD, connected to controller.
Key Words: Microcontroller, RFID Reader and Tag, LCD
display, Power Supply, Arduino Uno, Transmitter and
Receiver.
1. INTRODUCTION
Examination procedures are time consumingsinceitis
of write and forward type. The traditional way of
preparing and photocopying the seatingarrangements
creates a mess and consumes student’s time in
discovering their hall andseat number, mainly whenit
comes to universities that accommodate large number
of students. This paper brings out a remedy. RFID
[Radio Frequency Identification] technology is being
widely used in many applications. RFID is a part of
Automatic Identification and Data Capture [AIDC]
technology. They are similar to bar code. RFID module
mainly consist of an interrogator that works as a
transceiver and tags thatcaneitherbeactiveorpassive
ones. The interrogator reads the data in tags using
radio frequencyandalsoprovidespowerdependingon
type of tags. Reader communicates with the tag and
check it with the database for matching tag and
password provided and if verified as true, the LCD
module attached will display the corresponding hall
numberandseatingarrangement,otherwisetheaccess
is denied. , the camera will capture the imagethenpass
it to the Arduino which is programmed to handle the
face recognition by implementing the Local Binary
Patterns(LBP) algorithm .It is given to image
processing and then compared with the database of
known image. If the detected image is matched with
one of the image in database, it will marl present .Thus
the attendance of the candidate is marked
automatically.
2. RELATED WORK
A. Juels, "RFID Security and Privacy”. In this paper, the
problems of privacy and security for radio frequency
identification (RFID) that is protection and integrity
assurance in RFID systems, and treats the social and
technical context of their work. ] A. X. Liu and L. A.
Bailey, "PAP: A privacy and authentication protocol for
passive RFID tags".In this paper, asecurityprotocolfor
RFID tags is necessary to ensure the privacy and
authentication between each tag and their reader. E.
Fleisch presented "From Identification to
Authentication,A Review of RFID Product
AuthenticationTechniques".Inthispaper,investigating
how RFID can be used in product authentication in
supply chain applications and a review of existing
methods is provided. ] Jerry Landt, ―Shrouds of Time,
The History of RFID‖, The Association for Automatic
Identification and Data Capture Technologies. In this
paper, RFID is originated for short-range radio
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2567
technology used to communicate mainly digital
information between a stationary location and a
movable object or between movable objects .N.W.Lo
and K.H.Yeh presented "Novel RFID Authentication
Schemes for Security Enhancement and efficiency"
which provides the security flaws of two recently
proposed hash-based authentication schemes are
analyzedatfirst.Basedonthisanalysis,weestablishthe
security and privacy criterions for the authentication
process of RFID systems, and propose a new mutual
authentication scheme to eliminate possible security
flaws and enhance privacy protection to the owner of
an object with RFID tag attached on it . E.W.T. Ngai,
Karen K.L. Moon, Frederick J. Riggins, Candace Y. Yi ―
RFID research: An academic literature review (1995–
2005) and future research directions‖ International
Journal of ProductionEconomics.Inthispaper,thefour
main categories: technological issues, applications
areas, policy and security issues, and other issues.
3. NETWORK ARCHITECTURE
In this paper, power supply is given to the Arduino
Uno(Processor) and the tag is scanned by the RFID
reader and it sends the examination hall details to the
arduino module.Thecodingisgeneratedusingarduino
programming. Thentheoutputisgeneratedintheform
of hex decimal .The output is displayed in LCD. The
webcam in the examination hall capture the image of
the students which is passed to the Arduino which
handle Face recognition .The Arduinowillcomparethe
detected image with the image in database, if it
matches, the attendance of the particular student is
marked present.otherwise, it is marked absent.
4. METHODOLOGY
INPUT MODULE:
For every tag there is a unique number, the tag consist
of student name. The tag is scanned by RFID reader
which reads the data and the LCD display will display
the student name, exam name, exam hall number, seat
number. The details in the reader is n the form of ASCII
codeanditsendstoarduinomodule whichisconverted
into HEX decimal. Then output will be displayed in LCD
display.
ARDUINO MICROCONTROLLER:
The Arduino Mega 2560 microcontroller board based
on the ATmega2560 is used for the project. It receives
the data and convert the data into original form and
then it is displayed in the Laptop.
OUTPUT MODULE:
In the output, the attendance of the student is marked
present if the face is matched with the image in the
database. If not matches, the buzzer sound will be
heard.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2568
5. CONCLUSION
RFID technology is prominenttechnologywhichcanbe
used in wide range of applications. By integrating both
RFID and microcontroller creates a project with wider
boundaries and effective solutions. Here a simple but
effective systemhasbeendesignedfortheconvenience
of students using the spliced technology and a
prototype to prove the feasibility and demonstrate the
attributes has been developed. This idea can be
improved upon by adding more features like -
maintaining student’s details like fee due, library
transactions, attendance etc... The idea is beneficial to
both the student and the corporate society depending
upon its effective implementationasitsowintheseeds
to develop various veritable projects.
REFERENCES
1) A. Juels, "RFID Security and Privacy: A
Reasearch Survey," RSA Laboratories, 28
September 2005.
2) A.X.Liu and L.A.Bailey, "PAP: A privacy and
authentication protocol for passive RFID tags"
Computer Communication, vol. 32, pp. 1194-
1199, 2009.
3) E. Fleisch, "From Identification to
Authentication–A Review of the RFID Product
AuthenticationTechniques,"Printedhandoutof
Workshop on RFID Security, Springer, 2006.
4) Jerry Landt, ―Shrouds of Time, The History of
RFID‖, The Association for Automatic
Identification and Data Capture Technologies,
March 2006.
5) N. W. Lo and K.H. Yeh, "Novel RFID
Authentication Schemes for Security
EnhancementandEfficiencyofsystem,"Lecture
Notes in the department of Computer Science,
Secure Data Management, vol. 4721/2007, pp.
203-212, 2007
6) E.W.T. Ngai, Karen K.L. Moon, Frederick J.
Riggins, Candace Y. Yi ― RFID research: An
academic literature review (1995–2005) and
future research directions‖ International
Journal of Production Economics, Volume 112,
Issue 2, April 2008, Pages 510-520

More Related Content

What's hot

10.1.1.70.1834
10.1.1.70.183410.1.1.70.1834
10.1.1.70.1834Bhaskar Reddy
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
Product Recognition using Label and Barcodes
Product Recognition using Label and BarcodesProduct Recognition using Label and Barcodes
Product Recognition using Label and BarcodesIRJET Journal
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
Call for papers - 9th International Conference on Signal, Image Processing an...
Call for papers - 9th International Conference on Signal, Image Processing an...Call for papers - 9th International Conference on Signal, Image Processing an...
Call for papers - 9th International Conference on Signal, Image Processing an...sipij
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)
CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)
CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)VLSICS Design
 
Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...sipij
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
8 th International Conference on Signal and Image Processing (SIPRO 2022)
8 th International Conference on Signal and Image Processing (SIPRO 2022)8 th International Conference on Signal and Image Processing (SIPRO 2022)
8 th International Conference on Signal and Image Processing (SIPRO 2022)ijesajournal
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...sipij
 
8th International Conference on Signal and Image Processing (SIPRO 2022)
8th International Conference on Signal and Image Processing (SIPRO 2022)8th International Conference on Signal and Image Processing (SIPRO 2022)
8th International Conference on Signal and Image Processing (SIPRO 2022)ijesajournal
 

What's hot (17)

SMART CLASSROOMS
SMART CLASSROOMSSMART CLASSROOMS
SMART CLASSROOMS
 
10.1.1.70.1834
10.1.1.70.183410.1.1.70.1834
10.1.1.70.1834
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
Product Recognition using Label and Barcodes
Product Recognition using Label and BarcodesProduct Recognition using Label and Barcodes
Product Recognition using Label and Barcodes
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
Call for papers - 9th International Conference on Signal, Image Processing an...
Call for papers - 9th International Conference on Signal, Image Processing an...Call for papers - 9th International Conference on Signal, Image Processing an...
Call for papers - 9th International Conference on Signal, Image Processing an...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)
CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)
CFP: 8th International Conference on Signal and Image Processing (SIPRO 2022)
 
Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
8 th International Conference on Signal and Image Processing (SIPRO 2022)
8 th International Conference on Signal and Image Processing (SIPRO 2022)8 th International Conference on Signal and Image Processing (SIPRO 2022)
8 th International Conference on Signal and Image Processing (SIPRO 2022)
 
Rfid privacy1.1
Rfid privacy1.1Rfid privacy1.1
Rfid privacy1.1
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...Call for papers - 6th International Conference on Signal, Image Processing an...
Call for papers - 6th International Conference on Signal, Image Processing an...
 
8th International Conference on Signal and Image Processing (SIPRO 2022)
8th International Conference on Signal and Image Processing (SIPRO 2022)8th International Conference on Signal and Image Processing (SIPRO 2022)
8th International Conference on Signal and Image Processing (SIPRO 2022)
 

Similar to IRJET- Automated Face Detection and Recognition for Detecting Impersonation of Candidate

IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIRJET Journal
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORIRJET Journal
 
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIRJET Journal
 
Smart Security System Using R.F.I.D.
Smart Security System Using R.F.I.D.Smart Security System Using R.F.I.D.
Smart Security System Using R.F.I.D.IRJET Journal
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID MechanismIRJET Journal
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...IRJET Journal
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTIRJET Journal
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET Journal
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGIRJET Journal
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
IRJET - A Novel Approach for Automating Vehicle Verification and Tracking
IRJET - A Novel Approach for Automating Vehicle Verification and TrackingIRJET - A Novel Approach for Automating Vehicle Verification and Tracking
IRJET - A Novel Approach for Automating Vehicle Verification and TrackingIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET Journal
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFIDIRJET Journal
 

Similar to IRJET- Automated Face Detection and Recognition for Detecting Impersonation of Candidate (20)

IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google Sheet
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
 
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEM
 
Smart Security System Using R.F.I.D.
Smart Security System Using R.F.I.D.Smart Security System Using R.F.I.D.
Smart Security System Using R.F.I.D.
 
IRJET - Design of Student Security System using RFID Mechanism
IRJET -  	  Design of Student Security System using RFID MechanismIRJET -  	  Design of Student Security System using RFID Mechanism
IRJET - Design of Student Security System using RFID Mechanism
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoTA Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
 
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital IndiaIRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
IRJET- IoT Enabled Smart Class Room: A Step Towards Supporting Digital India
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
IRJET - A Novel Approach for Automating Vehicle Verification and Tracking
IRJET - A Novel Approach for Automating Vehicle Verification and TrackingIRJET - A Novel Approach for Automating Vehicle Verification and Tracking
IRJET - A Novel Approach for Automating Vehicle Verification and Tracking
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance System
 
Frid smart lms
Frid smart lmsFrid smart lms
Frid smart lms
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
IRJET- Students Smart Card using RFID
IRJET-  	  Students Smart Card using RFIDIRJET-  	  Students Smart Card using RFID
IRJET- Students Smart Card using RFID
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

IRJET- Automated Face Detection and Recognition for Detecting Impersonation of Candidate

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2566 Automated Face Detection and Recognition for Detecting Impersonation of Candidate Jerolin Silviya. A1, Devaraj. V2, Vijay Bhoopathy. R3, Marirajan. S4 1,2,3UG Students, Department of Electronics and Communication Engineering,Valliammai Engineering College, SRM Nagar, Kattankulathur, Tamilnadu ,India 4Assistant Professor, Department of Electronics and Communication Engineering, Valliammai Engineering college, SRM Nagar, Kattankulathur, Tamilnadu, India -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - Seating Arrangement of students during examinations is distributed. Students face troubles as they have to scrounge for their examination hall numbers and seating arrangement while they are wits end. A new technique which could aid the students in findingtheir exam halls and seats would be welcoming and very rewarding. This paper ―AUTOMATED FACE DETECTION AND RECOGNITION FOR DETECTING IMPERSONATION OF CANDIDATE presents a modernized method of examination hall management. It is possible for a student to find the particular exam hall from any other hall, when they swipe RFID card in a card reader located there. This provides help for the students to identify the floor or get directionstotheir respective halls without delays. The card reader is available at the entrance of the building,ifthestudents enters wrongly a buzzer alarm sets off, otherwise the room number is displayed on the LCD, connected to controller. Key Words: Microcontroller, RFID Reader and Tag, LCD display, Power Supply, Arduino Uno, Transmitter and Receiver. 1. INTRODUCTION Examination procedures are time consumingsinceitis of write and forward type. The traditional way of preparing and photocopying the seatingarrangements creates a mess and consumes student’s time in discovering their hall andseat number, mainly whenit comes to universities that accommodate large number of students. This paper brings out a remedy. RFID [Radio Frequency Identification] technology is being widely used in many applications. RFID is a part of Automatic Identification and Data Capture [AIDC] technology. They are similar to bar code. RFID module mainly consist of an interrogator that works as a transceiver and tags thatcaneitherbeactiveorpassive ones. The interrogator reads the data in tags using radio frequencyandalsoprovidespowerdependingon type of tags. Reader communicates with the tag and check it with the database for matching tag and password provided and if verified as true, the LCD module attached will display the corresponding hall numberandseatingarrangement,otherwisetheaccess is denied. , the camera will capture the imagethenpass it to the Arduino which is programmed to handle the face recognition by implementing the Local Binary Patterns(LBP) algorithm .It is given to image processing and then compared with the database of known image. If the detected image is matched with one of the image in database, it will marl present .Thus the attendance of the candidate is marked automatically. 2. RELATED WORK A. Juels, "RFID Security and Privacy”. In this paper, the problems of privacy and security for radio frequency identification (RFID) that is protection and integrity assurance in RFID systems, and treats the social and technical context of their work. ] A. X. Liu and L. A. Bailey, "PAP: A privacy and authentication protocol for passive RFID tags".In this paper, asecurityprotocolfor RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. E. Fleisch presented "From Identification to Authentication,A Review of RFID Product AuthenticationTechniques".Inthispaper,investigating how RFID can be used in product authentication in supply chain applications and a review of existing methods is provided. ] Jerry Landt, ―Shrouds of Time, The History of RFID‖, The Association for Automatic Identification and Data Capture Technologies. In this paper, RFID is originated for short-range radio
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2567 technology used to communicate mainly digital information between a stationary location and a movable object or between movable objects .N.W.Lo and K.H.Yeh presented "Novel RFID Authentication Schemes for Security Enhancement and efficiency" which provides the security flaws of two recently proposed hash-based authentication schemes are analyzedatfirst.Basedonthisanalysis,weestablishthe security and privacy criterions for the authentication process of RFID systems, and propose a new mutual authentication scheme to eliminate possible security flaws and enhance privacy protection to the owner of an object with RFID tag attached on it . E.W.T. Ngai, Karen K.L. Moon, Frederick J. Riggins, Candace Y. Yi ― RFID research: An academic literature review (1995– 2005) and future research directions‖ International Journal of ProductionEconomics.Inthispaper,thefour main categories: technological issues, applications areas, policy and security issues, and other issues. 3. NETWORK ARCHITECTURE In this paper, power supply is given to the Arduino Uno(Processor) and the tag is scanned by the RFID reader and it sends the examination hall details to the arduino module.Thecodingisgeneratedusingarduino programming. Thentheoutputisgeneratedintheform of hex decimal .The output is displayed in LCD. The webcam in the examination hall capture the image of the students which is passed to the Arduino which handle Face recognition .The Arduinowillcomparethe detected image with the image in database, if it matches, the attendance of the particular student is marked present.otherwise, it is marked absent. 4. METHODOLOGY INPUT MODULE: For every tag there is a unique number, the tag consist of student name. The tag is scanned by RFID reader which reads the data and the LCD display will display the student name, exam name, exam hall number, seat number. The details in the reader is n the form of ASCII codeanditsendstoarduinomodule whichisconverted into HEX decimal. Then output will be displayed in LCD display. ARDUINO MICROCONTROLLER: The Arduino Mega 2560 microcontroller board based on the ATmega2560 is used for the project. It receives the data and convert the data into original form and then it is displayed in the Laptop. OUTPUT MODULE: In the output, the attendance of the student is marked present if the face is matched with the image in the database. If not matches, the buzzer sound will be heard.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2568 5. CONCLUSION RFID technology is prominenttechnologywhichcanbe used in wide range of applications. By integrating both RFID and microcontroller creates a project with wider boundaries and effective solutions. Here a simple but effective systemhasbeendesignedfortheconvenience of students using the spliced technology and a prototype to prove the feasibility and demonstrate the attributes has been developed. This idea can be improved upon by adding more features like - maintaining student’s details like fee due, library transactions, attendance etc... The idea is beneficial to both the student and the corporate society depending upon its effective implementationasitsowintheseeds to develop various veritable projects. REFERENCES 1) A. Juels, "RFID Security and Privacy: A Reasearch Survey," RSA Laboratories, 28 September 2005. 2) A.X.Liu and L.A.Bailey, "PAP: A privacy and authentication protocol for passive RFID tags" Computer Communication, vol. 32, pp. 1194- 1199, 2009. 3) E. Fleisch, "From Identification to Authentication–A Review of the RFID Product AuthenticationTechniques,"Printedhandoutof Workshop on RFID Security, Springer, 2006. 4) Jerry Landt, ―Shrouds of Time, The History of RFID‖, The Association for Automatic Identification and Data Capture Technologies, March 2006. 5) N. W. Lo and K.H. Yeh, "Novel RFID Authentication Schemes for Security EnhancementandEfficiencyofsystem,"Lecture Notes in the department of Computer Science, Secure Data Management, vol. 4721/2007, pp. 203-212, 2007 6) E.W.T. Ngai, Karen K.L. Moon, Frederick J. Riggins, Candace Y. Yi ― RFID research: An academic literature review (1995–2005) and future research directions‖ International Journal of Production Economics, Volume 112, Issue 2, April 2008, Pages 510-520