With the rapid increase in the number of institutions as well as number of students in every
institution, it is very difficult to monitor whether the students are attending the classes as per the time
table or not. Even the students are in the campus but not present in the classes during the class hour.
In the existing system, presence of students in the class is being monitored by taking attendance
manually in the class. In this paper, we propose an intelligent student tracking system based on RFID
and ZigBee wireless network. The proposed system reads the RFID tags data through RFID reader,
and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node gives
corresponding warning or hints by the result of matching master-slave RFID tag information. Here
each and every student is assigned with different RFID tags with individual tags numbers and the
RFID readers are placed in campus at different locations which identifies the persons coming to that
location by reading tag numbers of the students and intimates to the control room about their status.
The document is a thesis proposal for an automated classroom door lock and attendance monitoring system using RFID from Notre Dame of Tacurong College. It outlines the background and need for increased security and attendance tracking. The proposed system would use RFID cards to unlock doors and track student attendance digitally. It presents the objectives, significance, scope, definitions, related works, technical background, methodology, and budget for the project. The system would aim to help enforce rules and save energy while upgrading the school's technology.
RFID Based Student Attendance Management System in IndiaSmart Schooling
Smart Schooling presents RFID based Attendance System, i.e. ID cards embed with RFID tags which facilitate auto attendance, saving time for the teacher as well as students for effective student attendance management system in India.
Using rfid technology to develop an attendance system and avoid traffic 1Baghya Lakshmi
The document describes using RFID technology to develop an active student attendance system for kindergartens that sends messages to parents' phones informing them when their children safely arrive at and leave school. It also aims to reduce traffic congestion when parents pick up their children after school. RFID tags would be attached to student IDs and parent vehicles. Readers at school entrances would track attendance and trigger messages. Vehicle tags would allow notifying parents inside of child pickup to ease congestion.
This document presents an automated attendance system using RFID (radio-frequency identification) and IoT (Internet of Things) technologies. The system aims to address issues with the current manual attendance recording process. It will allow students to have their attendance automatically captured when they flash their student ID cards, which are tagged with RFID passive tags, at RFID readers. The attendance data will then be updated and stored in an online database system. The key objectives are to develop a real-time attendance system using RFID and test its functionality. The system will consist of an admin interface to manage users and schedules, and interfaces for lecturers to view and edit attendance reports and for students to update their profiles.
This document describes a student smart card system that uses RFID technology. An RFID tag carries student details and is scanned by an RFID reader connected to a microcontroller. If the student is authenticated, their details are displayed on an LCD screen. The system aims to streamline the student registration process and allow registration at a single access point by scanning the RFID tag, rather than requiring students to visit multiple stations. It provides a more efficient alternative to the traditional manual registration process.
This document describes an RFID-based student attendance system. It aims to easily and efficiently track student attendance by having each student carry an RFID tag. When a student's tag is scanned by the RFID reader, their attendance will be logged as present or absent in the Arduino microcontroller. Ultrasonic sensors also help detect if students are entering or leaving the classroom. This automated attendance system could replace manual attendance tracking and provide benefits like time savings, easy control and reliability for universities.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
The document is a thesis proposal for an automated classroom door lock and attendance monitoring system using RFID from Notre Dame of Tacurong College. It outlines the background and need for increased security and attendance tracking. The proposed system would use RFID cards to unlock doors and track student attendance digitally. It presents the objectives, significance, scope, definitions, related works, technical background, methodology, and budget for the project. The system would aim to help enforce rules and save energy while upgrading the school's technology.
RFID Based Student Attendance Management System in IndiaSmart Schooling
Smart Schooling presents RFID based Attendance System, i.e. ID cards embed with RFID tags which facilitate auto attendance, saving time for the teacher as well as students for effective student attendance management system in India.
Using rfid technology to develop an attendance system and avoid traffic 1Baghya Lakshmi
The document describes using RFID technology to develop an active student attendance system for kindergartens that sends messages to parents' phones informing them when their children safely arrive at and leave school. It also aims to reduce traffic congestion when parents pick up their children after school. RFID tags would be attached to student IDs and parent vehicles. Readers at school entrances would track attendance and trigger messages. Vehicle tags would allow notifying parents inside of child pickup to ease congestion.
This document presents an automated attendance system using RFID (radio-frequency identification) and IoT (Internet of Things) technologies. The system aims to address issues with the current manual attendance recording process. It will allow students to have their attendance automatically captured when they flash their student ID cards, which are tagged with RFID passive tags, at RFID readers. The attendance data will then be updated and stored in an online database system. The key objectives are to develop a real-time attendance system using RFID and test its functionality. The system will consist of an admin interface to manage users and schedules, and interfaces for lecturers to view and edit attendance reports and for students to update their profiles.
This document describes a student smart card system that uses RFID technology. An RFID tag carries student details and is scanned by an RFID reader connected to a microcontroller. If the student is authenticated, their details are displayed on an LCD screen. The system aims to streamline the student registration process and allow registration at a single access point by scanning the RFID tag, rather than requiring students to visit multiple stations. It provides a more efficient alternative to the traditional manual registration process.
This document describes an RFID-based student attendance system. It aims to easily and efficiently track student attendance by having each student carry an RFID tag. When a student's tag is scanned by the RFID reader, their attendance will be logged as present or absent in the Arduino microcontroller. Ultrasonic sensors also help detect if students are entering or leaving the classroom. This automated attendance system could replace manual attendance tracking and provide benefits like time savings, easy control and reliability for universities.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
This document summarizes a student tracking and management system using RFID technology. The system uses RFID readers and tags to identify students. Readers are connected to a monitoring computer via GSM modules to transmit identification data via SMS, GPRS, or email. The monitoring computer stores tracking data and can notify parents. Algorithms are provided for reading tags, checking a database, and transmitting data. The system provides a way to identify and track students both inside and outside of a facility.
1) The document describes a smart library management system that uses RFID technology to automate processes like book checking in and out.
2) RFID tags are attached to books and readers are used to scan the tags and update a database, allowing users to check books in and out without human intervention.
3) The system aims to streamline library management and reduce errors by automating manual tasks like tracking book loans and returns and calculating overdue fines.
Attendance management system using rfid or biomatricShitalinfotech
The document proposes an RFID-based attendance system to automate the process of taking attendance in schools. It describes how RFID tags given to each student would be read by a reader and the attendance data stored in a database when students enter the school premises or class. This would eliminate the need for manual attendance taking and allow for easy generation of attendance reports. The system would also track student locations in real-time within the school and on school buses equipped with GPS.
This document describes an RFID-based system to track students on school buses and notify parents. The system uses passive RFID tags issued to each student and RFID readers installed at the entry points of buses. When a student boards or exits a bus, their RFID tag is scanned by the reader which records the student ID and time. This data is sent to the school's database system via Zigbee. Parents receive email notifications when their child boards or exits the bus. The system aims to safely transport students and reduce parents' concerns by informing them of their child's movements between home and school.
The document describes the implementation of an RFID system at the Jayakar Library of the University of Pune in India. It discusses the components of RFID technology including tags, readers, and antennas. It also outlines some of the initial barriers faced during implementation, such as a lack of technology experts, user resistance to change, issues with technology-literate users removing tags, a lack of standards, problems with moisture affecting tags, and compatibility issues between the library software and RFID system. Overall, the library was able to overcome many of the initial problems and RFID has proved beneficial for improving security and efficiency.
A survey on various technologies available for Smart lab based on Internet of...IJSRD
This paper explores some approaches to harnessing the IoT in teaching field. The Internet of Things (IoT) is a fast emerging system of physical sensors and connected devices, enabling an advanced information gathering, interpretation and monitoring. Smart Lab is still in need of an efficient attendance system which takes attendance in real time. Various Research papers are summarized in this paper. This paper describes the concept of development of Smart Lab which takes attendance by using RFID technology. Then it improves the efficiency of attendance taking system by analyzing the reading range of RFID system. The Smart Lab concept also monitors and controls the temperature and humidity of the computer system.
IRJET- Smart Cart Using Arduino and RFIDIRJET Journal
This document summarizes a research paper on developing a smart shopping cart using Arduino and RFID technology. The smart cart is intended to improve on existing barcode-based shopping systems. It would allow customers to scan items themselves as they shop and see a running total, eliminating the need to wait in line to check out. The cart would use RFID tags on items rather than barcodes for more efficient scanning. The system is described as having an Arduino microcontroller, RFID reader, buttons and an LCD screen. It would store item information from RFID scans and allow customers to delete or view totals. When complete, a bill could be generated by connecting the cart to a billing system via USB. The researchers believe this smart
This document describes a smart library management system using RFID technology. The system allows for automated book check-out and return processes using RFID tags attached to books and RFID readers connected to a database. Key components of the system include RFID tags with unique identifiers, RFID readers to scan the tags, a microcontroller to interface with the readers and database, and a database to store book and user information. The system aims to streamline library processes by eliminating manual interactions and errors through automated scanning of RFID tags on books and user cards during check-out, check-in, and inventory operations.
This document describes a smart library management system using RFID technology. The system allows for automated book check-out and return processes using RFID tags attached to books and RFID readers connected to a database. Key components of the system include RFID tags with unique identifiers, RFID readers to scan the tags, a microcontroller to interface with the readers and database, and a database to store book and user information. The system aims to streamline library processes by eliminating manual interactions and errors through automated scanning of RFID tags on books and user cards during check-out, check-in, and inventory operations.
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...IAEME Publication
Conventionally, in schools and colleges, attendance is taken by the teacher by
calling students names or roll numbers, mark his or hers presence or absence in the
attendance register. Later attendance is fed into a computer and the attendance
percentage is calculated using software in offline mode. This method is time
consuming and also requires more man power. In this project, a portable Biometric
based Attendance Registration and Consolidation System (BARCS) using Raspberry
Pi3 and Amazon Web Server is developed. This handheld biometric attendance
registration device can be carried by the teacher to the classroom to register the
student’s attendance of a particular session through circulation among students. At
the end of a session, attendance data gets stored in a database in the Raspberry Pi
computer. Then, Pi computes the subject wise attendance percentage and sends it to
the Amazon web server for uploading on the developed webpage. The user can view
the subject wise attendance by accessing the webpage. Also an SMS is sent to the
students mobile when their attendance gets registered. The developed system is
intended for programmes wherein students have to meet the minimum attendance
requirements in each subject of the programme in a particular semester/year
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...Henry Chukwuemeka Paul
This paper aims at evaluating, compare the RFID and Biometric technology and report result based on the performances in terms of various parameters that is analyzed. Currently, most schools and institutions do have difficulties to monitor their students’ security and attendance system using either RFID Card or biometrics alone, where the procedures are inefficient in monitoring the students’ security and managing their attendance. The application of RFID Card system as a school monitoring system to improve class attendance procedure, automatically monitor the interest group movements and increases their security. Using RFID makes it easier and faster to detect students’ attendance in a lecture class. In this system, the fingerprint recognition is also adopted to enhance the procedure of identifying authentication of student more securely and reliable for facilities management, gateway access and facilities control, it will also help the school management to provide visibility of assets and effective user tracking.
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
This document describes a smart attendance management system using RFID technology. The system uses RFID cards distributed to students that are read by an RFID reader module connected to a microcontroller. When a student taps their card, the unique ID is sent to a server for verification and their attendance is recorded in a MySQL database. If a student is absent or late, an SMS is sent to their parents. Staff can access student attendance data from a dashboard website. The system aims to automate the attendance process and make it faster and more secure than conventional paper-based methods.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET Journal
This document proposes an automated system using RFID and face recognition to help students easily find their exam halls and seats and prevent impersonation. The system works by having students swipe their RFID cards at a reader, which will display their exam hall and seat number on an LCD screen. It also uses a camera and face recognition on an Arduino board to match students' faces to images in a database, marking them present if matched and triggering an alarm if not matched to prevent impersonation. The system aims to make the exam seating process more efficient than traditional manual methods and help students locate their exams without issues. It discusses the components, methodology, and concludes the concept could be expanded to integrate additional student data and services.
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...IRJET Journal
This document proposes a smart classroom system that uses various sensors and technologies to automate student attendance monitoring, information display, security monitoring, and energy conservation. The system uses RFID and fingerprint sensors to automatically record student attendance. An IR sensor counts the number of people in the classroom and a temperature sensor monitors the room climate. Based on occupancy and temperature, lights and fans are automatically controlled. A Raspberry Pi, camera, and GSM module provide security monitoring, information display on a smart board, and communication. The goal is to develop an integrated smart classroom system that saves time, effort and energy compared to separate existing devices.
The document describes a proposed smart library automation and monitoring system using RFID technology. The system uses RFID tags attached to books and student ID cards. An RFID scanner reads the tags to automate processes like tracking student entry and exit, book check-in/check-out, and inventory management. This allows transactions to occur without manual intervention. The system also includes an Android app for students to search books and check availability. The goals are to streamline library operations, prevent unauthorized access, and help locate misplaced books. Raspberry Pi hardware and a MySQL database are part of the proposed implementation.
This document proposes developing an active RFID-based automated attendance monitoring system for office management. Active RFID tags would be given to each employee and read by sensors at the office entrance to automatically record entry and exit times without manual sign-ins. The system could generate monthly reports on employee work hours, absences, and salaries to help with human resources planning and management. Key features include simultaneously reading multiple tags, and adjusting the reading range from a few meters to up to 50 meters depending on needs.
This document describes an IoT-based attendance monitoring system that uses RFID technology. The system uses RFID cards or tags tied to student identification cards to automatically record attendance when a student swipes their card by an RFID reader. This makes the attendance recording process more efficient, accurate and secure compared to a manual paper-based system. The recorded attendance is also time-stamped using an RTC module. The system is intended to be used in educational institutions, businesses, and government organizations to streamline the attendance monitoring process.
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
This document describes a proposed RFID-based student attendance system. The system uses RFID tags and readers to automatically track when students enter and exit classrooms. When a student's RFID tag is scanned at the door, the reader verifies their identity against a database and unlocks the door if valid. An IR sensor inside confirms entry or exit. This automated process aims to improve on manual attendance methods by eliminating errors and wasted time, while also providing administrators with real-time attendance data for grading and analysis. The proposed system architecture involves RFID tags, readers, a database, and IR sensors connected to a microcontroller. Several existing RFID attendance systems and their drawbacks are also reviewed.
Smart Student Monitoring System using RFIDIRJET Journal
The document proposes a smart student monitoring system using RFID technology to automate attendance tracking, manage student marks, provide notifications, and allow faculty to view timetables. The system uses RFID tags, a reader, Arduino, and Bluetooth to identify students and display their information on an app. Periodic snapshots would also be taken to monitor classes and ensure students are accounted for.
IoT Based Smart Attendance System Using RFID and Google SheetIRJET Journal
This document describes an IoT-based smart attendance system using RFID and Google Sheets. The proposed system uses RFID tags and readers to automatically record student attendance in real-time. It stores attendance data on a Google Sheet using a NodeMCU microcontroller connected to the RFID reader over WiFi. The system aims to make the attendance process more efficient, secure, and time-saving compared to traditional manual methods. It provides a prototype and discusses the hardware components, methodology, and potential applications of the smart attendance system.
This document summarizes a student tracking and management system using RFID technology. The system uses RFID readers and tags to identify students. Readers are connected to a monitoring computer via GSM modules to transmit identification data via SMS, GPRS, or email. The monitoring computer stores tracking data and can notify parents. Algorithms are provided for reading tags, checking a database, and transmitting data. The system provides a way to identify and track students both inside and outside of a facility.
1) The document describes a smart library management system that uses RFID technology to automate processes like book checking in and out.
2) RFID tags are attached to books and readers are used to scan the tags and update a database, allowing users to check books in and out without human intervention.
3) The system aims to streamline library management and reduce errors by automating manual tasks like tracking book loans and returns and calculating overdue fines.
Attendance management system using rfid or biomatricShitalinfotech
The document proposes an RFID-based attendance system to automate the process of taking attendance in schools. It describes how RFID tags given to each student would be read by a reader and the attendance data stored in a database when students enter the school premises or class. This would eliminate the need for manual attendance taking and allow for easy generation of attendance reports. The system would also track student locations in real-time within the school and on school buses equipped with GPS.
This document describes an RFID-based system to track students on school buses and notify parents. The system uses passive RFID tags issued to each student and RFID readers installed at the entry points of buses. When a student boards or exits a bus, their RFID tag is scanned by the reader which records the student ID and time. This data is sent to the school's database system via Zigbee. Parents receive email notifications when their child boards or exits the bus. The system aims to safely transport students and reduce parents' concerns by informing them of their child's movements between home and school.
The document describes the implementation of an RFID system at the Jayakar Library of the University of Pune in India. It discusses the components of RFID technology including tags, readers, and antennas. It also outlines some of the initial barriers faced during implementation, such as a lack of technology experts, user resistance to change, issues with technology-literate users removing tags, a lack of standards, problems with moisture affecting tags, and compatibility issues between the library software and RFID system. Overall, the library was able to overcome many of the initial problems and RFID has proved beneficial for improving security and efficiency.
A survey on various technologies available for Smart lab based on Internet of...IJSRD
This paper explores some approaches to harnessing the IoT in teaching field. The Internet of Things (IoT) is a fast emerging system of physical sensors and connected devices, enabling an advanced information gathering, interpretation and monitoring. Smart Lab is still in need of an efficient attendance system which takes attendance in real time. Various Research papers are summarized in this paper. This paper describes the concept of development of Smart Lab which takes attendance by using RFID technology. Then it improves the efficiency of attendance taking system by analyzing the reading range of RFID system. The Smart Lab concept also monitors and controls the temperature and humidity of the computer system.
IRJET- Smart Cart Using Arduino and RFIDIRJET Journal
This document summarizes a research paper on developing a smart shopping cart using Arduino and RFID technology. The smart cart is intended to improve on existing barcode-based shopping systems. It would allow customers to scan items themselves as they shop and see a running total, eliminating the need to wait in line to check out. The cart would use RFID tags on items rather than barcodes for more efficient scanning. The system is described as having an Arduino microcontroller, RFID reader, buttons and an LCD screen. It would store item information from RFID scans and allow customers to delete or view totals. When complete, a bill could be generated by connecting the cart to a billing system via USB. The researchers believe this smart
This document describes a smart library management system using RFID technology. The system allows for automated book check-out and return processes using RFID tags attached to books and RFID readers connected to a database. Key components of the system include RFID tags with unique identifiers, RFID readers to scan the tags, a microcontroller to interface with the readers and database, and a database to store book and user information. The system aims to streamline library processes by eliminating manual interactions and errors through automated scanning of RFID tags on books and user cards during check-out, check-in, and inventory operations.
This document describes a smart library management system using RFID technology. The system allows for automated book check-out and return processes using RFID tags attached to books and RFID readers connected to a database. Key components of the system include RFID tags with unique identifiers, RFID readers to scan the tags, a microcontroller to interface with the readers and database, and a database to store book and user information. The system aims to streamline library processes by eliminating manual interactions and errors through automated scanning of RFID tags on books and user cards during check-out, check-in, and inventory operations.
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...IAEME Publication
Conventionally, in schools and colleges, attendance is taken by the teacher by
calling students names or roll numbers, mark his or hers presence or absence in the
attendance register. Later attendance is fed into a computer and the attendance
percentage is calculated using software in offline mode. This method is time
consuming and also requires more man power. In this project, a portable Biometric
based Attendance Registration and Consolidation System (BARCS) using Raspberry
Pi3 and Amazon Web Server is developed. This handheld biometric attendance
registration device can be carried by the teacher to the classroom to register the
student’s attendance of a particular session through circulation among students. At
the end of a session, attendance data gets stored in a database in the Raspberry Pi
computer. Then, Pi computes the subject wise attendance percentage and sends it to
the Amazon web server for uploading on the developed webpage. The user can view
the subject wise attendance by accessing the webpage. Also an SMS is sent to the
students mobile when their attendance gets registered. The developed system is
intended for programmes wherein students have to meet the minimum attendance
requirements in each subject of the programme in a particular semester/year
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...Henry Chukwuemeka Paul
This paper aims at evaluating, compare the RFID and Biometric technology and report result based on the performances in terms of various parameters that is analyzed. Currently, most schools and institutions do have difficulties to monitor their students’ security and attendance system using either RFID Card or biometrics alone, where the procedures are inefficient in monitoring the students’ security and managing their attendance. The application of RFID Card system as a school monitoring system to improve class attendance procedure, automatically monitor the interest group movements and increases their security. Using RFID makes it easier and faster to detect students’ attendance in a lecture class. In this system, the fingerprint recognition is also adopted to enhance the procedure of identifying authentication of student more securely and reliable for facilities management, gateway access and facilities control, it will also help the school management to provide visibility of assets and effective user tracking.
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
This document describes a smart attendance management system using RFID technology. The system uses RFID cards distributed to students that are read by an RFID reader module connected to a microcontroller. When a student taps their card, the unique ID is sent to a server for verification and their attendance is recorded in a MySQL database. If a student is absent or late, an SMS is sent to their parents. Staff can access student attendance data from a dashboard website. The system aims to automate the attendance process and make it faster and more secure than conventional paper-based methods.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET Journal
This document proposes an automated system using RFID and face recognition to help students easily find their exam halls and seats and prevent impersonation. The system works by having students swipe their RFID cards at a reader, which will display their exam hall and seat number on an LCD screen. It also uses a camera and face recognition on an Arduino board to match students' faces to images in a database, marking them present if matched and triggering an alarm if not matched to prevent impersonation. The system aims to make the exam seating process more efficient than traditional manual methods and help students locate their exams without issues. It discusses the components, methodology, and concludes the concept could be expanded to integrate additional student data and services.
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...IRJET Journal
This document proposes a smart classroom system that uses various sensors and technologies to automate student attendance monitoring, information display, security monitoring, and energy conservation. The system uses RFID and fingerprint sensors to automatically record student attendance. An IR sensor counts the number of people in the classroom and a temperature sensor monitors the room climate. Based on occupancy and temperature, lights and fans are automatically controlled. A Raspberry Pi, camera, and GSM module provide security monitoring, information display on a smart board, and communication. The goal is to develop an integrated smart classroom system that saves time, effort and energy compared to separate existing devices.
The document describes a proposed smart library automation and monitoring system using RFID technology. The system uses RFID tags attached to books and student ID cards. An RFID scanner reads the tags to automate processes like tracking student entry and exit, book check-in/check-out, and inventory management. This allows transactions to occur without manual intervention. The system also includes an Android app for students to search books and check availability. The goals are to streamline library operations, prevent unauthorized access, and help locate misplaced books. Raspberry Pi hardware and a MySQL database are part of the proposed implementation.
This document proposes developing an active RFID-based automated attendance monitoring system for office management. Active RFID tags would be given to each employee and read by sensors at the office entrance to automatically record entry and exit times without manual sign-ins. The system could generate monthly reports on employee work hours, absences, and salaries to help with human resources planning and management. Key features include simultaneously reading multiple tags, and adjusting the reading range from a few meters to up to 50 meters depending on needs.
This document describes an IoT-based attendance monitoring system that uses RFID technology. The system uses RFID cards or tags tied to student identification cards to automatically record attendance when a student swipes their card by an RFID reader. This makes the attendance recording process more efficient, accurate and secure compared to a manual paper-based system. The recorded attendance is also time-stamped using an RTC module. The system is intended to be used in educational institutions, businesses, and government organizations to streamline the attendance monitoring process.
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
This document describes a proposed RFID-based student attendance system. The system uses RFID tags and readers to automatically track when students enter and exit classrooms. When a student's RFID tag is scanned at the door, the reader verifies their identity against a database and unlocks the door if valid. An IR sensor inside confirms entry or exit. This automated process aims to improve on manual attendance methods by eliminating errors and wasted time, while also providing administrators with real-time attendance data for grading and analysis. The proposed system architecture involves RFID tags, readers, a database, and IR sensors connected to a microcontroller. Several existing RFID attendance systems and their drawbacks are also reviewed.
Smart Student Monitoring System using RFIDIRJET Journal
The document proposes a smart student monitoring system using RFID technology to automate attendance tracking, manage student marks, provide notifications, and allow faculty to view timetables. The system uses RFID tags, a reader, Arduino, and Bluetooth to identify students and display their information on an app. Periodic snapshots would also be taken to monitor classes and ensure students are accounted for.
IoT Based Smart Attendance System Using RFID and Google SheetIRJET Journal
This document describes an IoT-based smart attendance system using RFID and Google Sheets. The proposed system uses RFID tags and readers to automatically record student attendance in real-time. It stores attendance data on a Google Sheet using a NodeMCU microcontroller connected to the RFID reader over WiFi. The system aims to make the attendance process more efficient, secure, and time-saving compared to traditional manual methods. It provides a prototype and discusses the hardware components, methodology, and potential applications of the smart attendance system.
This document describes a smart attendance system using RFID technology and IoT. The system uses RFID cards and readers to automatically track when students enter a classroom, providing a more accurate and secure alternative to manual attendance tracking. When a student's RFID card is detected, the reader sends the data to a server where it is processed and sent to an online attendance application. This allows teachers to easily monitor attendance from anywhere using an internet connection. The system aims to reduce manual work and improve visibility of student attendance information in real-time.
IRJET - Design of Student Security System using RFID MechanismIRJET Journal
This document describes a proposed student security system using RFID technology. The system aims to track student attendance using RFID tags attached to student IDs and RFID readers placed at school entrances and exits. When a student enters or leaves through the gates, their RFID tag will be scanned and their attendance details sent to a server. Parents will receive real-time SMS notifications when their child arrives at or leaves school. The system aims to automate attendance tracking and notify parents, improving on existing manual attendance methods.
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Attendance system development using RFIDsitimohamed4
This document discusses the development of an attendance system using radio frequency identification (RFID) technology. It provides an introduction to RFID and describes how RFID can be used to automatically record student attendance, as an improvement over conventional manual systems. The methodology section outlines the key RFID components used, including RFID reader/tags, microcontroller, and other hardware. Features of the RFID-based attendance system are also presented, such as real-time data storage and communication capabilities. Advantages include faster recording of attendance and ability to read data from a distance. Disadvantages and potential future enhancements are also reviewed.
The Design and Implementation of Intelligent Campus Security Tracking SystemIOSR Journals
This document describes the design and implementation of an intelligent campus security tracking system using RFID and ZigBee technology. The system uses RFID sensors to identify tags attached to valuables and people to prevent theft and track items on campus. It forms a wireless sensor network using ZigBee modules where RFID data is transmitted to a central computer. When a user's RFID tags are detected as mismatched, the system generates a warning. The system was tested and able to successfully identify valid and invalid RFID tags to control access and track valuables on a college campus.
RFID Technology: An Upgradation for SocietyIRJET Journal
This document discusses the potential uses and benefits of RFID (radio-frequency identification) technology in society. It begins by introducing RFID and its increasing integration with IoT devices. It then describes some limitations of existing barcode and QR code systems. The document outlines how RFID tags work and can be used with IoT to develop applications like automated toll collection systems, smart shopping, vehicle localization without GPS, and contactless payment systems. It argues that RFID systems can make various processes more efficient and improve quality of life by streamlining tasks like shopping, transportation, and access control. Overall, the document promotes RFID technology as a useful upgrade for modern society.
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...IRJET Journal
This document proposes an automated system using RFID and face recognition to help students easily find their exam halls and seats and prevent impersonation. The system works by having students swipe their RFID cards at a reader, which will display their exam hall and seat number on an LCD screen. It also uses a camera and face recognition on an Arduino board to match students' faces to images in a database, marking them present if matched and triggering an alarm if not matched to prevent impersonation. The system aims to make the exam seating process more efficient than traditional manual methods and help students locate their exams without delay.
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET Journal
This document describes a student tracking and monitoring system for colleges using RFID technology. The system uses RFID tags on student ID cards and RFID readers to automatically take student attendance, reducing issues with cheating. It stores student information like names and IDs in a database. When a student's card is scanned, their information is displayed and added to an attendance list. This allows lecturers to easily and automatically take attendance. The system aims to help colleges more efficiently monitor students and track their attendance and movements around campus infrastructure using RFID.
This document presents an RFID-based student attendance system. The system uses RFID tags on student ID cards and RFID readers to automatically record when students enter classrooms or school premises, providing a more efficient alternative to manual attendance sheets. It discusses the history and applications of RFID technology, describes the features of the proposed system, and outlines some advantages like reduced data loss and time savings compared to conventional methods. Potential improvements and future applications are also mentioned, along with references.
IRJET- Inventory Management System for WarehouseIRJET Journal
This document describes a proposed inventory management system for a warehouse using RFID technology. Key aspects of the system include:
1. Components in the warehouse will have RFID tags attached to track inventory levels in real-time as items are withdrawn or returned.
2. An RFID reader will continuously scan tags to monitor inventory levels and generate alerts if items are removed without being checked out properly.
3. Machine learning algorithms will be used to analyze usage data and provide recommendations on popular products.
4. Inventory data will be stored on the cloud to allow remote access from any device. This will help automate inventory management with minimal manual work.
A Survey on RFID Based Smart Shopping System and Automated BillingIRJET Journal
This document summarizes a survey on RFID-based smart shopping systems and automated billing. It discusses how RFID technology can be used to replace barcodes and allow multiple items to be scanned simultaneously, reducing checkout times. The objectives of the survey are to identify key technologies in RFID smart shopping/billing systems, review advantages/disadvantages, and analyze different strategies. Several studies that implemented RFID-based systems are summarized, demonstrating benefits like reduced queues, automated billing, and item tracking. However, some systems lacked payment flexibility or security measures. The survey aims to design an improved smart shopping cart system using RFID.
ARM 9 Based Intelligent System for Biometric Figure AuthenticationRadita Apriana
Now a day’s some universities in India are enforcing afiliated colleges to implement biometric
fingerprint attendance system to monitor student attendance. This sytem requiresbiometric fingerprint
scanner need to be installed in affiliated college where student studying and it is monitored by the
university online. As finger print scanner is placed at affiliated college which is far away from the university,
there is possibility of adding fake finger print into the scanner which can be used for proxy attendance of
student who is not attending the college. In this paper, the proposed system is designed in such a way
that, the acquired fingerprint of the student is initially stored in the database with complete student profile
and photograph. And, when the student places his fingerprint it compares with stored database. If
fingerprint matches it displays the student photo. The proposed intelligent system includes R305 fingerprint
sensor and ARM 9 processor. We used RS232 for interfacing with system and visual studio 2008 software
for designing the interface. This attendance system is verified practically with students and we obtained the
desired results accurately.
IRJET- RFID Based College Bus Management SystemIRJET Journal
This document describes a proposed RFID-based college bus management system. The system uses RFID, GSM, GPS, and a microcontroller to track who boards each bus, the time they board, and location. It consists of an in-bus module with an RFID reader and a base station module. When a person boards, their RFID card is scanned. If valid, their ID, boarding time and location are sent via GSM to the base station module and stored in a database. This allows monitoring boarding activity for each bus in real-time.
This document describes a proposed smart shopping cart system that uses RFID technology. The system aims to streamline the shopping and checkout process. RFID tags would be attached to all products in the store. As shoppers add items to their cart, an RFID reader in the cart would automatically detect and record the products. When the cart reaches the checkout area, the items and their details would be transmitted to the cash register via LIFI and the bill would be automatically generated for the customer. The document discusses the system components, including the microcontroller, RFID reader, LCD display, LIFI transmitter and receiver, and power supply. It also provides background on RFID technology and reviews several other existing smart shopping and RFID applications
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
Similar to Intelligent students tracking system in campus based on rfid and zigbee (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
verifying with the time table stored in the database and updates the report table appropriately if the
student is anywhere else other than classroom during class hours.
118
Here each and every student is assigned with different RFID tags with individual tags
numbers and the RFID reader are placed in campus at different locations which identifies the
students moving from place to place automatically by reading tag numbers of the students and
intimates to the central server about their status.
The proposed system would help to keep track of whether the students are regularly attending
the classes or not. The main aim of this paper is to keep track of student’s movement within the
campus and also to provide a warning / update report table if student is outside the classroom during
class hours as per the timetable stored in the database.
2. RELATED WORKS
Intelligent campus security tracking system (iCST) [1] was designed and implemented based
on RFID and ZigBee network. iCST reads the RFID tags data through RFID ZigBee node, and
then sends it to PC node. PC node gives corresponding warning. When the warning occurs, user can
logon the web system to get the real-time tracking for valuables (with embedded slave RFID); where
the thief arrives any one access control node, it would be blocked. User can also manage his own
valuables such as lending and recovery operation through the Web manager centre.
Traditional methods of monitoring production in enterprises by humans on site are unable to
meet the expectations for efficiency, accuracy and cost as product lifecycles are shortened
continuously. Setting up an RFID and ZigBee based manufacturing monitoring system [2] is a good
approach to improve monitoring efficiency so as to improve management efficiency in enterprises.
RFID technology has been used to provide a more efficient way to identify and track items at
the various stages throughout the supply chain [3] in large retail industry. Real time traceability using
RFID technology on Lego Robot simulation environment and LabVIEW interface was developed
that can be similarly implemented in small and medium scale (SMI) industry.
Provides an overview of different services deployed in intra-organizational RFID [4] systems
and analyzes system architectures implemented today. We also compare emerging standards
developed by the EPC global community that aim to standardize system interfaces and reader
protocols in RFID deployments.
RFID and ZigBee based system architecture at the network level for tracking the vehicle
information [5] which has been sent to the centralized server will be developed. The aim is to
provide a simple and easy solution to track the location of the moving vehicle. Compared to the old
systems, ZigBee based network architecture is able to provide information about the vehicle
accurately. The vehicle will be having a unique RFID tag (Radio Frequency Identification). The
RFID reader is placed in particular places. For the beneficial features of RFID, we integrate RFID
readers into the Vehicle tracking Information System.
An information protection system [6] (named PC-guard) using systems engineering and
RFID technology. The login verification code can be notified in advance by using the PC-guard
system because every PC user having their own Auto-tag will be checked with PC RFID reader. The
information in the PC will be protected with RFID and the vibration sensor as the PC be turned on
and be invaded.
A Digital Campus Security System (DCST) [7] has been designed and implemented base on
the RFID, ZigBee and GSM network. DCST reads the RFID tags and sends information to PC node
through ZigBee network and gives alerts through GSM network. If any invalid RFID (Thief)
information comes into PC, user will logon the web system to get the real-time tracking for
valuables.
RFID based attendance system [8] is one of the solution for reducing the student’s overall
academic performance since taking attendance by calling names or signing on paper is very time
3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
consuming and inefficient. This system can automatically capture student’s attendance by flashing
their card at RFID reader and save data in the PC.
119
In the proposed paper, the students will be continuously monitored for their presence in the
class room during the class hours. If he is in any other location other than class room during class
hours as per the time table stored in the database, a warning will be provided as well as the report
table will be updated for history purpose.
3. PROPOSED SYSTEM ARCHITECTURE
In the proposed system, following 4 different locations like “Class Room”, “Canteen”,
“Entrance” and “Rest Room” are considered where RFID readers are placed. Every student shall be
provided with an RFID tag, which he needs to keep with him all the time, while he is in the campus.
He will not be able to operate any doors (Entrance, Class Room, Rest Room, and Canteen) without
the RFID cards.
The front end HMI screen will be provided to manage the student database, Time table and
the report containing the information about presence of student in various places other than class
during class hours as per the time table.
The RFID readers placed at different locations, are connected to the serial ports of the
microcontroller. The microcontroller validates the data received by the RFID readers and sends the
RFID location through Zigbee wireless network to the PC.
The Application program in the PC validates the RFID student’s information with the time
table data stored. If student is present in any location other than “Class Room” during class hours as
per time table, the student’s information will be updated in to the report database.
The proposed system architecture diagram is as shown in below figure Fig.1
4. !
##
$
#
#
%
#
Figure 1: System Architecture Diagram
4. PROPOSED SYSTEM IMPLEMENTATION
The proposed system is implemented using following components:
(i) LPC 2148 ARM Controller
(ii) RFID Readers – NSK 125 Series
(iii) ZigBee Transreceivers – CC2500
(iv) PC Node
5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
120
4.1 LPC2148 ARM Controller
ARM7 LPC2148 [9] is ARM7TDMI-S core board microcontroller that uses 16/32-bit 64 pin
from Philips (NXP). All resources inside LPC2148 is quite perfect, so it is the most suitable to learn
and study. If user can learn and understand the applications of all resources inside MCU well, it
makes user development easier and can develop many excellent applications. The development
board is as shown in below figure Fig.2
4.1.1 Technical specifications:
Processor : LPC2148
Clock speed : 12MHz
Red LED : Power Indicator
Power : 7 – 15V AC / DC at 500mA
Voltage Regulator: 5V on board
Figure 2: LPC 2148 Development Board
4.2 RFID Readers – NSK125 Series
The NSK125 series RFID Proximity OEM Reader Module [10] has a built-in antenna in
minimized form factor. It is designed to work on the industry standard carrier frequency of 125 kHz.
The RF reader module with an internal or an external antenna facilitates communication with Read-
Only transponders—type UNIQUE or TK5530 via the air interface. The tag data is sent to the host
systems via the wired communication interface with a protocol selected from the module Both TTl
and Wiegend Protocol.
The RF module is best suited for applications in Access Control, Time and Attendance, Asset
Management, Handheld Readers, Immobilizers, and other RFID enabled applications. The RFID
reader is as shown in below figure Fig.3.
Figure 3: RFID Reader Module
6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
121
The RF module is best suited for applications in Access Control, Time and Attendance, Asset
Management, Handheld Readers, Immobilizers, and other RFID enabled applications. The RFID
reader is as shown in below figure Fig.3.
4.3 ZigBee Transreceivers – CC2500
CC2500 RF Module [11] is a transreceiver module which provides easy to use RF
communication at 2.4GHz. It can be used to transmit and receive data at 9600 baud rates from any
standard CMOS / TTL source. This module is a direct line in replacement for serial communication
and it requires no extra hardware and no extra coding works in Half Duplex mode i.e. it provides
communication in both directions, but only one direction at same time. The ZigBee module is as
shown in below figure Fig.4.
4.3.1 Features
Supports Multiple Baud Rates (9600)
Works on ISM band (2.4GHz)
No complex wireless connection software or internal knowledge of RF required to connect
serial devices
Designed to be as easy to use as cables
No external antenna required
Plug and play device
Works on 5V DC supply
4.3.2 Specifications
Input Voltage - 5V DC
Baud Rate - 9600
RS 232 Interface and TTL Interface
Range – Max 30m – Line of Sight
Figure 4: ZigBee Module
7. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
122
4.4 PC Node
PC node contains:
The PostgreSQL 8.4 database to store the student’s information, Timetable information and
report information.
The NetBeans IDE is used to develop the application in Java.
Keil μVision is used to develop firmware for LPC 2148 controller
Provides power supply to ZigBee module through USB port
The ZigBee is connected to PC through USB to Serial converter module
4.5 Sequence of operation
The sequential flow of system operations are described in following steps
When student swipes his RFID card in any location, the RFID reads sends the RFID
information to the microcontroller
Microcontroller then validates the RFID information, adds up the location ID and sends it to
PC through ZigBee wireless network
The application in PC receives the RFID location information, retrieves the time table to
verify the class timings
If student is present in any location other than class room during class hours as retrieved from
the time table, then the corresponding information will be updated to reports database.
5. RESULTS
HMI screens to manage student’s data is as shown in below figures Fig.5 Fig.6. Fig.5 is used
to add new student’s data while Fig. 6 is used to edit / update the existing student’s data.
Figure 5: Add Student Data
8. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
123
Figure 6: Edit Student data
HMI screen to enter the time table data is shown in below figure Fig.7. The weekly timetable
is updated in to the database using this screen.
Figure 7: Time Table
The time table data entered during testing is as shown in below figure Fig.8. The data is
entered using the HMI screen shown above in figure Fig.7.
9. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
124
Figure 8: Time Table
When the student is present in any location other than class room during class hours as per time
table is presented as a warning as well as will be updated in the report table as shown in below
figures Fig.9 Fig.10.
Figure 9: Warning message Pop-up
Figure 10: Report Database
10. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
125
6. CONCLUSION
As seen from the results, with the intelligent Campus Student Tracking System, we can track
and maintain a history of the student’s movement in various locations within the campus, during
class hours. This in-turn helps in improves the attendance of students in class room during class
hours.
Also History of the student’s absenteeism can be maintained in the report table over a period
of time (may be for a semester). If the student is not attending the classes, then from the data stored
in report database, parents can be updated with their ward’s history. Also an absenteeism report can
be sent to parents at regular intervals.
Implementation of this application is easier in the new upcoming institutions. The RFID
readers can be placed at suitable locations near the entrance of class rooms, library, rest room etc.
Even in the existing institutions also this can be implemented with additional work / cost.
Future Scope
Limitation of this project is that the student may skip showing of RFID cards at the RFID
reader location. A group of student may enter together, once one RFID is presented to the RFID
reader and the door opens. To avoid this in future, a camera can be installed at the entrance. The
student’s photo would also be captured in the database along with RFID tag. If a student enters any
location with-out swiping the RFID tag, then the camera can capture his photo, carry out image
processing and compare with the photo stored in database. Get their corresponding RFID tag and
present location. If a mismatch is found with respect to present location obtained from database and
the current location from RFID reader and camera, a warning message can be sent to the student as
well as any suitable actions can be taken.
Also with ZigBee, maximum distance for wireless communication is around 100 mtrs. If the
distance needs to be increased then networked ZigBee topology should be employed. This
Networked ZigBee topology affects the response time.
7. REFERENCES
Journal Papers
[1] Ying Chen; Yuntao Wang; Xiaokang Li; Li Gao, The design and implementation of
intelligent campus security tracking system based on RFID and ZigBee, Mechanic
Automation and Control Engineering (MACE), 2011 Second International Conference on,
vol., no., pp.1749,1752, 15-17 July 2011.
[2] QiangRuan; Wensheng Xu; Gaoxiang Wang, RFID and ZigBee based manufacturing
monitoring system, Electric Information and Control Engineering (ICEICE), 2011
International Conference on, vol., no., pp.1672, 1675, 15-17 April 2011.
[3] Elshayeb, S.A., Bin Hasnan, K., Chua Yik Yen, RFID technology and ZigBee networking in
improving supply chain traceability Instrumentation, Communications, Information
Technology, and Biomedical Engineering (ICICI-BME), 2009 IEEE International Conference
[4] Floerkemeier C., Sarma S., An Overview of RFID System Interfaces and Reader Protocols,
RFID, 2008 IEEE International Conference.
[5] Anuradha, P.; Sendhilkumar, R., Design and implementation of zigbee-RFID based vehicle
tracking, Sustainable Energy and Intelligent Systems (SEISCON 2011), International
Conference on , vol., no., pp.689,694, 20-22 July 2011.
[6] Kuan, J. H.; Chang, J.; Ho, J., A development of information protection system using system
engineering and RFID technology, System Science and Engineering (ICSSE), 2010
International Conference on, vol., no., pp.427,432, 1-3 July 2010.
11. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014
17 – 19, July 2014, Mysore, Karnataka, India
126
[7] Anil BabuPurella, “Implementation of Digital Campus Security System based on RFID,
ZigBee and GSM” ISSN: 2230-7109 (Online) ISSN: 2230-9543 (Print), IJECT Vol. 3, Issue 4,
Oct – Dec 2012.
[8] Ankita Agrawal, Ashish Bansal, “Online Attendance Management System using RFID with
Object Counter” ISSN 0974-2239, Vol. 3, No. 3 (2013), pp. 131-138.
Data sheets
[9] Data sheets and the user manuals of LPC2148.
[10] Data sheets for RFID Readers NSK125 series.
[11] Data sheets for CC2500 ZigBee Module.