International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012

ADVANCED STUDENT TRACKING SYSTEM
First Author Name: V.Mareeswari
. Associate Professor, Department of Information Technology ,Sri Manakula Vinayagar Engineering College,Pondicherry E-mail ID: amudha.prasanna@gmail.com

Second Authors Name: B.Dhinesh Kumar, K.G.Surendar, R.Vimal
Student, Department of Information Technology ,Sri Manakula Vinayagar Engineering College,Pondicherry E-mail ID:dinesh101591@gmail.com,mail2surendar@india.com,rvimal2010@gmail.com

ABSTRACT The embedded technology is now in its peak and its uses are mind blowing. Embedded technology plays a vital role in integrating various functions and thus it reduces man power, saves time and operates efficiently without human intervention. RFID is a new technology and takes a major role in the embedded system. This project describes about design and Implementation of Advanced Student Tracking System. It is designed to track the movement of the students within the college campus as well as automatic Attendance monitoring without human intervention using RFID technology. The proposed system has hardware and software components. The hardware architecture consists of an RFID active tag, RFID transceiver, systems interconnected and database server. The transceiver is distributed around the open area within specific limits. The tags which are given to students consist of unique id on it which cannot be duplicated. The PC can be connected to the transceiver to read the tag id .Software architecture COMM program, an Application Programming Interface (API) that handles and analyses the data, a friendly GUI and a database that saves as well as retrieves all the student information. General Terms Active tags, Passive tags, RF Readers, Local server, Backend system (Master) Keywords Radio Frequency Identification, Authentication, Tracking system, Graphical User Interface. INTRODUCTION Our project Domain is Wireless Network and we are working on connecting a Wireless Network to a Centralized Server via RFID. RFID is abbreviated as Radio Frequency Identification. It is a wireless technology. It is a technology that uses communication through the use of radio waves to transfer data between a reader and an electronic tag attached to an object for the purpose of identification and tracking. Radio Frequency Identification can be in the form tags or chips. Based on it Radio Frequency Identification is generally of three types:    Active Passive Semi-Passive

Active - An active has its own transmitter and a power source to power the microchip’s circuitry and broadcast signals to an RFID reader. The power source is either connected to a powered infrastructure or uses energy stored in an on-board battery. Active tags are usually very costly.

ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology

Fig:1 active tag in the form of wrist-band ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology . This system is designed to track a moving child in a limited area. configuration and function of the readers. such as a park or mall. READERS . depend on the application.Tags are otherwise called as labels. It are attached to the objects. 12 & 13 April. also called interrogators. and to run the circuitry on the chip.International Conference on Computing and Control Engineering (ICCCE 2012).A semi-passive is an RFID tag that has a battery but communicates with a reader using back scatter. which can differ quite considerably. The battery is usually used to power a sensor. The existing system present for the purpose of human tracking is Mobile RFID Tracking System. Semi-passive tags have longer read range than ordinary passive tags. It gets the request from the client and then sends the electromagnetic waves to the reader. A passive tag also has an indefinite operational life and relies on reflecting back the electromagnetic (EM) field generated by the reader and modulating the reader’s EM incident on the antenna to send information back. the reader then sends the electromagnetic waves to the tags.The complexity. like a passive tag without a battery. Thus the tag which has the information about the object sends the information about the requested objected to the reader and the reader in turn sends the info to the backend systems. in general. When a tag passes through an electromagnetic field generated by a reader. the reader’s function is to generate an electromagnetic (EM) field to power tags and facilitate communication with tags. BACKEND SYSTEMS .A passive do not have its own power source and scavenges power from the electromagnetic fields generated by readers. However.This EPC is a unique identification code for identifying the objects.The Backend Systems is used as a Centralized Server. 2012 Passive . using RFID technology. the tag communicates back to the reader the identifying information. RFID readers communicate with tags using a radio frequency interface. The data stored in the tag is usually referred to an Electronic Product Code (EPC).The antenna communicates with the tags via the radio waves. EXISTING SYSTEM We made a survey on various tracking systems that are being employed for the purpose of tracking the goods and tracking the children within a specific limit. Semi-Passive . The external construction of RFID tracking system has the following three main components:    Tags Readers Backend system TAGS . It consists of Integrated chip(IC) which are used to store the information about the objects to which the tags are attached as an electronic code .

Park . Traceability is nothing but to track the current position of the object and by doing so we can trace the past history about the movement of object and also we can predict the future movements of the object.This system’s software architecture concentrates on both in the establishment of the network and to produce the output which shows the location of the individual through GUI and the information about the individual is also been published. Communication between the tag reader and the web server done via wireless LANs. 2012 tag readers are distributed around the open area. Here our system is generally designed for the purpose of tracking the students within the institution . Shopping Mall .International Conference on Computing and Control Engineering (ICCCE 2012). e.g.. Fig:3 active RFID tag used in our system ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology . The tags are programmed with kid’s profiles and are worn by the kids.g.etc. The Fig:2 simple demonstration of Mobile RFID Tracking System PROBLEMS IN EXISTING SYSTEM The major problems in the Mobile RFID Tracking System are as follows:     The system is designed only for the children with specific age limits In this system single rfid tag is used by many users frequently and hence there will not be any type of privacy constrains involved here This system is exists only for limited area This system will be employed only to spot and to trace the movements of the users within a specific limits e. The main motto of using RFID in our project is Tracking or Traceability. SOLUTION Our proposed system deals with the construction of wireless network and connecting it to a centralized server for the purpose of effective human via wireless LAN. 12 & 13 April. park.

This system has high data rate and long range of transmission since the RADAR is been used in the system instead of transceiver. Fig:4 internal type of RFID chip APPLICATIONS This system can be employed in various fields like:      Education Human Resource Banking Food Processing Forensic ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology . 12 & 13 April. CONCLUSION Since our system uses the external type of RFID it lacks in some part of authentication and hence we have found the system which uses an internal type of RFID called the RFID666 which provides cent percent authentication. The special feature of this system is    The chip here used is an internal rfid chip It will of small in size say 11mm and can be easily embedded into the internal part of the human body without causing harmful effect and hence no way of malfunctions can be done. 2012 The following are the major advantages of our proposed system:  This system has higher performance rate than the existing system  Since each individual will have their own rfid tags data privacy will be maintained.International Conference on Computing and Control Engineering (ICCCE 2012).  These system also consist of the application like automated smart attendance system and also the system which is used to spot the students who leaving the college campus during the college hours.

Aji. Sheng · Sherali Zeadally · Jian Yu. Computer Engineering Department.International Conference on Computing and Control Engineering (ICCCE 2012). Nada R. “An Overview of RFID Technology. Aloul. Pg. Al-Zarouni. Application. LLC 2009 [9] Michael Mehta." RFIDAP project. Sangheon Pack. Book edited by: Cristina Turcu.2010 [2] A. Amin A. 2012 REFERENCE PAPERS [1] Kideok Cho. “IP-based RFID Location System”.2. MICHAEL Journal.Pg -1. Radio Frequency Identification Fundamentals and Applications. Springer Science + Business Media. LLC 2011 [5] Phuoc Nguyen Tran and Nadia Boukhatem.2004 ISBN 978-1-4675-2248-9 © 2012 Published by Coimbatore Institute of Information Technology . ISBN 978-953-7619-73-2. Divya. [6] Chia‐hung Huang. “Mobile RFID Tracking System”. Fakhro.Spring 2009.701–710. " New Directions in RFID Security. Al-Ali. pp.R. “LANDMARC: Indoor Location Sensing Using Active RFID” . February 2010.SESU-009 [11] Ann Cavoukian. 278.“ RFID enabled traceability networks: a survey”. [7] Ms. “Secure and private search protocols for RFID systems”. Bringing Research to Practice. [3] LIONEL M. Ranasinghe · Quan Z. C."Global Control through the RFID Chip ". American University of Sharjah. [10] Erik-Oliver Blass and Refik Molva. Ted ‘Taekyoung’ Kwon and Yanghee Choi1 “An extensible and ubiquitous RFID management framework over next-generation network”.. 12 & 13 April. [8] Yanjun Zuo.“Privacy Implications Information of and RadioFrequencyIdentification(RFID)TechnologyInformation” PrivacyCommissioner/Ontario. Nassar H. Fadi A. NI and YUNHAO LIU. grant reference ANR-07. and Security/Privacy Threats and Solutions"Scholary Paper. “A Study on Comparing the Performance of Low Cost RFID Authentication Protocols”. 2004 [4] YanboWu · Damith C. Wireless Networks 10.UAE . 2010 IEEE International Conference on Computational Intelligence and Computing Research.International Journal Of Communication Systems. Springer Science+Business Media.

Sign up to vote on this title
UsefulNot useful