Professional Documents
Culture Documents
A research project presented to the faculty of the College of Engineering and Technology Our Lady of the Pillar College Cauayan City, Isabela
____________________________
In partial fulfilment on the requirements of the degree Bachelor of Science in Computer Engineering
____________________________
Alfonso Jose M. Dalupang Mark Jay S. Caoili Roldan Soriano Ernest Jan P. Lucas
S.Y. 2013-2014
Chapter 1 THE PROBLEM AND ITS BACKGROUND Introduction RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose
as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. RFID technology has been available for more than fifty
years. It has only been recently that the ability to manufacture the RFID devices has fallen to the point where they can be used as a "throwaway" inventory or control device. Alien Technologies recently sold 500 million RFID tags to Gillette at a cost of about ten cents per tag. One reason that it has taken so long for RFID to come into common use is the lack of standards in the industry. Most
companies invested in RFID technology only use the tags to track items within their control; many of the benefits of RFID come
when items are tracked from company to company or from country to country.
Figure 1.0 describes the difference in a visual and factual way. The existing system is represented by simply the actions we take today, to obtain information. The existing This the method also requires the authority taken by to the verify entity. of the
requires
actions
authority
evaluates
the
permissions
Taking
school
for
example,
security
personnel
are
required to visibility see proof of identification. This proof is given to the personnel by the student. Once obtained, this information is being evaluated on positive or negative results. With the proposed system, the authority obtains the
information directly. There is no evaluation or action on the entitys part required. In schools, the security personnel gets information from a monitor and acts accordingly.
Authority
Output
RIM Software
RF Antenna
Fig. 2.0: Conceptual depiction of the proposed system Figure 2.0 shows the concept of the proposed system on a high level explosion. The RFID tags pass information to the RF antenna, which is processed by the proposed system. The result
of the processing will be displayed on an output device. Through it the user is given a summary of processed data. The proponents goal with this systems implementation is to improve the speed in gathering data. The system uses newest technology to achieve this. The existing method of obtaining information is time consuming and tiring, factors which the
proposed system will eliminate. The effectiveness of implementing RFID system in olpcc
depends upon the school what progress, change and benefit it can bring to the education of the school, by knowing the perception of students and faculty of olpcc about it. Paradigm
INPUT
PROCESS
OUTPUT
Students Profile based on: a. Sex b. Age c. Civil status d. Course e. Field of specialization /course Analysis of data/information in the questionnaires and interview techniques Summary of the response of students on the proposed RFID monitoring system.
Feedback
The researchers were guided by the paradigm in this study. On the input box are the students/respondents profiles. On the process box are the analysis and tabulation of data/information in the questionnaires and interview techniques and finally on the output box is the summary of the response of students on the proposed RFID monitoring system. Statement of the Problem This study aimed to make an assessment of the
implementation of the Radio Frequency Identification in Our Lady of the Pillar College Cauayan. More problems: 1. What was the profile of the respondents with respect to the following variables: a. Sex b. Age c. civil status d. Course e. field of specialization/course 2. What problems were met in the implementation of the RFID? specifically, it attempted to answer the following
3.
What
suggestions
were
given
by
the
respondents
to
improve the implementation of the RFID system? Assumption The researchers aim to know if RFID is the best solution to what we call absentness in our society especially in schools. To meet the aim of the researchers, they assume that the RFID
system will help every parent that worries about their children if they are attending classes during school hours. With the RFID system, parents will be confident that their children will learn more because they will know if their children go to school or not. Scope and Delimitation Scope. The proposed system will allow administrators to
monitor entities within the premises. Monitoring and locating entities Automated Data gathering and authorization verification. The overall design of the system, RF antenna and lag
connection as well as the program structure and compatibility need to be designed very well. Delimitation. The system is just designed for monitoring purposes. It does not give detailed information about the entity in range or pinpoint its 100 percent accurate location. It
serves
merely
as
an
indicator
of
the
entitys
approximate
position and identification. Significance of the Study The significance and of the study of the deals with the careful of
formulation
presentation
possible
application
knowledge that denotes why developing the proposed device is important and worthwhile. This piece gives further explanations of the possible latent and manifest applications of the study. The proponent believes that the proposed system will
enhance security and make the processing of information easier. Social Significance. The study the proponents conduct is for great value. Since its main purpose is monitoring. It
automatically provides better overall security. It raises the awareness of monitoring methods like RFID. Educational Significance. The study showcases the use of the relatively new RFID technology, which might inspire other researches to explore newer technologies as well. Technological Significance. Since the system base is the RFID technology, which is not yet common in citizens, it
introduces a new and more efficient way to use this technology for everyday tasks.
Economic Significance. The production price is relatively low which as a result can generate.
terms were defined operationally. RFID It is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data
from a tag attached to an object, for the purposes of automatic identification and tracking. Tags - It contains identifying information or may just be a key into a database. An RFID system may replace or supplement bar codes and may offer another method of inventory management and self-service device, checkout taking by the patrons. place of It can also act as a
security
the
more
traditional
electromagnetic security strip. System It is a number of things adjusted as a connected whole. Radio waves - It is an electromagnetic radiation at radio frequencies. Antenna - It is for receiving and transmitting signal.
Integrated
circuits
These
are
complex
circuits
etched
onto tiny chips of semiconductor (silicon). Electromagnetic field external number magnetic field by a to It is a coil that modulates an a coded This identification small type is
transfer
when
queried
reader
device.
Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIES The following literature and studies were incorporated due to their relevance to the present study and quality of
information that these content. Related Literature Related literature is the summary of all the former
writings showing what is already known and still unknown about the proposed topic. Some related literature made a huge impact with respect to in the study especially the device in and determining its the
requirements
developing
accompanying
software. During the length of the search for related literature and studies the proponents found out that the topic is the first of its kind and ideas close to the project has never been put in mound. The researchers gathered the following related
literatures to add on their familiarity the study. RFID tags have been around since the late 70s originally developed for Russian spies. How exactly RFID chips work can be found on HowStuffWorks.com Long checkout lines at the grocery store are one of the biggest complaints about the shopping experience. Soon, these lines could disappear when the ubiquitous Universal Product Code
(UPC) bar code is replaced by smart labels, also called radio frequency identification (RFID) tags. RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart. Imagine going to the grocery store, filling up your cart and walking right out the door. No longer will you have to wait as someone rings up each item in your cart one at a time. Instead, these RFID tags will communicate with an electronic reader that will detect every item in the cart and ring each up almost network instantly. that will The send reader will be on connected your to a large to the
information
products
reader and product manufacturers. You bank will then be notified and the amount of the bill will be deducted from your accounts. No line, no waiting. RFID tags, a technology once limited to tracking cattle, are tracking consumer products worldwide. Many manufacturers use the tags to track the location they make of each product they make from the time its made until its pulled off the shelf and tossed in shopping cart. Outside the realm of retail merchandise, RFID tags are
trucking vehicles, airline passengers. Alzheimers patients and pets. Soon, they may even track your preferences for chunky or creamy peanut butter. Some critics say RFID technology is
becoming too much a part of our lives that is, if were even aware of all the [arts of our lives that it affects. In this article, youll learn about the types of RFID tags and how these tags can be tracked through the entire supply chain. Well also look at the non-commercial uses of RFID tags and how the Department of State and Homeland Security are using them. Lastly, well examine what some critics consider an
Orwellian application of RFID tags in animals, humans and our society. The use of RFID tags is highly polarizing and
controversial, the strongest argument being the total control over every individuals personal information, similar as in
George Orwells 1984. George Orwells 1984, tells the story of a society in which all citizens are patrolled by the Thought police, who ensure that no one has any independent or rebellious thoughts that arent sanctioned by the Party. In this society, everyone answers to Big Brother the ultimate authority on education, government and recreation. When critics of RFID call the
technology Orwellian, they mean that the technology is too invasive and that of businesses private and government just are made too
our
actions,
like
Big
Brother
Conservative Christian critics even claim that RFID and its possible use is a sign for the end of times. According to
Revelation 13: 16-17 the Antichrist will place the mark of the beast on the right hand or on the forehead of humans which they need for commerce. And causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.
- Revelation 13: 16-17 The use RFID chips however is undeniably various. A list of possible application can be found in an article of the Seattle Times Website, although with a negative connection. Microchips Everywhere: a Future Vision By TODD LEWAN AP National Water Heres a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually
everything you buy, wear, drive and read, allowing retailers and
law
enforcement
to
track
consumer
items
and,
by
extension,
consumers wherever they go, from a distance. A seamless, global network of electronic sniffers will scan radio tags in myriad public setting, identifying people and their tastes instantly so that customized ads, live spam, may be beamed at them. In Smart will Homes, sensors built into walls, floors and
appliances
inventory
possessions,
record
eating
habits,
monitor medicine cabinets all the while, silently reporting data to marketing eager for a peek into the occupants private lives. Science fiction? In truth, much of the radio frequency identification
technology that enables objects and people to be tagged and tracked wirelessly already exists and new and potentially
intrusive uses of it are being patented, perfected and deployed. Some of the worlds largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about
sales and buyers to company databases. Already, microchips are turning up in some computer
printers, car keys and tires, on shampoo bottles and department store clothing tags. Theyre also in library books and
contactless payment cards (such as American Express Blue and ExxonMobils Speed test.)
Related Studies Since RFID arguably the hottest and the most controversial piece of technology currently around, a lot of studies have been conducted. The German Federal Institute for Information Security published a study of RFID, its capabilities and vulnerable,
entitled Security Aspects and Prospective Applications of RFID System. Here a passage of the study regarding types of attacks on RFID tags. 7. Threat situation and invention of common security measures 7.1 Overview Once of the goals of the present study is to investigate the future threat situation resulting from the application of RFID systems (within a time frame of three to five years), as well as to assess the effectiveness security measures. The
present chapter describes the results of this phase of the work. Sections 7.2 to 7.7 provide an overview of possible attacks and countermeasure. Section 7.8 contains an evaluation of the threat situation, especially with regard to the practically and coat of the
attacks and countermeasures. A list of the experts who were consulted regarding these matters can be found at the beginning of the study in the Section Authors and Experts Section 7.9
contains
brief
description
of
the
current
availability
of
security measures.
One
application
was
explored
in
an
eBook
containing
collections of sample case studies by Abhisam software, 2007. The following passage is taken the section titled Anti-Theft System The RFID Solution Each item to be protected is tagged with an RFID anti-theft tag. The tag can be re-used in many cases. The tag is typically attached by a strong string or a plastic band or other means (similar to a price tag, sometimes it is the price tag), to the item (say for example an umbrella). Now once a shoplifter takes this umbrella and walks to the exit, large RFID door antennas placed near the exit detect the presence of the tag and sound an alarm. In case of a genuine shopper, if he takes the umbrella to the checkout counter, the clerk, after receiving payment for the item, cuts the plastic band and removes the tag. The umbrella can now be carried by the shopper outside passing by the door antennas, without triggering any alarm. The store staff will then typically attach the same tag to a new umbrella that would be now kept on the store shelf. Alternatively, in case of
disposable tag, the checkout clerk will hold the item nears a
tag
killer
machine,
which
kills
(destroy)
the
tag
by
subjecting it to strong electromagnetic radiation. The tag, then though physically present on the item, will not trigger the alarm while passing through the door antenna field. As one can see, there are various fields of application for RFID tags already available. The components think it is time to make the next step and incorporating it in schools.
Chapter 3 METHODS OF RESEARCH AND DESIGN Research methods are very vital in gathering data about the proposed proponents system device. to The methods apply of are research of great that help the in
decided
use
and
determining how and where they can find the data and information needed in order to produce a possible solution to problems of the existing systems. This chapter contains information regarding the methods of research used, the data gathering instruments used, the
analytical tools, as well as methods used in developing the devices and its software. This chapter also contains the methods used for product evaluation, technical, operational and economic feasibility of the proposed system. Methods of Research Used Statistics are requires and are of significance in the
development of the proposed system. The proponents made use of different approaches or methods of research for this study in order to process all the accumulated data, produce reliable
information and build the proposed system. Descriptive Method. This method was used by the proponents to further understand the existing system. It is a fact-finding
with proper interpretation of the data gathered which were used to analyse how the existing system. Through this method the
researchers were able to examine and construe the information that they have gathered, hoping that it will lead them to the achievement of this study. Internet Research Method Data gathering for this study
started over Internet. Since the data and information available over the Internet is unlimited in relation to the study to find more adequate data for the proposed device. The history and topics regarding existing devices. Door lock systems were mostly found in the web. Creative Research Method. Creativity means being able to use ones imagination in to an develop artistic to new and original This the ideas or was and
things, employed
especially by the
context.
method layout
researches
conceptualize
design of the proposed system. The proponents realized that it is not always possible to find all needed materials in any study or research, but by means of creativity, the proponents hope that they will be able to come up with a system that will meet the needs of their target user. With this, this determines the proponents unique imagination that would help them in making the impossible possible.
Prognostic
Research
Method.
Prognosis
is
an
act
of
pretending hoe a given situation will develop or turn out in the future. Prognostic Research method refers to any scientific
investigation in which the main and stated purpose is to predict the future operation of factors. This method will be used in the form of scientific observation prognosis on how the system will perform in the future in terms of effectiveness and reliability. Evaluation forms and Market Analysis were also considered in order to determine if the proposed system is technically,
operationally and economically feasible. Historical Research Method. This method interprets past
trends of attitude, events and facts. From one point of view, history deals with unique phenomena, collected and reported
without ordered reflective thoughts. The proponents made use of this method to fully understand the development history of
peripheral hardware devices in existence today. And these were used as strong information for the development of the proposed devices. Data Gathering Instruments The data are are gathering instruments to be used and in by the
evaluation gathering
Observation.
This
method
is
the
taking
notice
of
the
current systems/devices, describing and identifying the problems encountered. It serves as an additional judgment in order to improve the existing system/devices. It is also used to agree or contradict the data gathered from interviews, questionnaires and other research methods. With this, the proponents in general carefully and critically used observation with respect to the parts and parcels concerning the assistive and adaptive proposed device with its accompanying software. Questionnaire. A questionnaire, basically, is a set of
carefully organized and logically ordered questions. This is a tool to investigate on the interest and knowledge of the people on the existing and proposed system. This helped the proponents anticipate the probability of effectiveness of the proposed
system. In the case of the study, the questionnaire prepared by the proponents would help the proponents themselves on how to develop and further enhance the proposed device with respect to the data results of the questionnaires respondents. Evaluation Form. This tool aided the researchers in
determining the distinction between the existing and proposed system. It basically determines the operational feasibility of the proposed device and its software. The criteria used as bases in the evaluation form are Efficiency, Reliability,
Accessibility,
User-friendliness,
Ergonomic,
Compatibility,
Assistive and Adaptability. Statistical tools used Based on the need of the study, the researchers employed simple applications of statistics. These are frequency count, percentage count, and mean and t-test analysis to provide a clearer view and deeper interpretation and meaning of the
belonging to a certain classification like male and female. Percentage. It is used to determine the relative magnitude of certain cases. * 100 Where: P = percentage f = frequency n = number of respondents 100 = constant multiplier
Slovins sample or
Formula.
This
was that
used will
to
determine
the
number
of of
respondents
represents
the
consumers
Analytical Tools These tools serve as illustration of the systems structure and essentially a diagram of how the system flows. Since the
proposed study is a device, the proponents used the following Analytical tools: the Context Flow Diagram (CFD), visual table of Contents (VTOC), Input Process output (IPO) and Program
graphically illustrate the highest level in a data flow diagram and contains one process, representing the entire system. The
modelling tool will provide the proponents to have a concept of systems environment. Data Flow Diagram is also regarded as
bubble chart and bubble diagram. Visual Table of Contents (VToC). It presents a tree-
structured diagram which illustrates the program flow. It is a stylized structure chart, moving from general to specific,
graphically, describing the system. Furthermore, it illustrates the hierarchical process in the level of detail, increase from the top to bottom and as said, from general to specific. Input Process Output (IPO. It is a chart which gives
processing sequence and detailed information about the input, process activities and output for any given unit in the Visual Table of Contents. Program Flowchart. It is graphical representation of the logic and data flow of the entire program. A block diagram used in the designing of of the software, on it the puts into view the It
succession
steps
performed
computer
program.
provided the proponents a representation of the algorithm in amore visual form. It is an overview of the programs major processes and other actions inside the program.
Methods Used In Developing the System This part of the study is concerned with the actual
development and procedures on implementing the proposed system. The traditional software engineering models do not deal
with the risks involved in the projects. Many projects have failed because the risks involved were not taken into account at all. Barry Boehm tried to fix this by incorporating the
strengths of other models namely the Waterfall model and coming up with the spiral model, and changing the management emphasis to risk analysis. This model development combines the features of the prototyping model and the waterfall model. The spiral model is favoured for large and complicated projects.
Planning. This phase is where the objectives, alternative, and constraints are determined. Requirements are gathered during the planning phase. A prototype is produced at the end of the risk analysis phase. Risk Analysis. In the risk analysis phase, a process is undertaken to identify risk and alternate solutions. A prototype is produced at the end of the risk analysis phase. . What
happens here is that alternative solutions and constraints are defined, and risks are identified and analyzed. If risk analysis indicates uncertainly in the requirements, the prototyping model might be used to assist the situation. Engineering. Software is a product in the engineering
phase, along with testing at the end of the phase. Here the costumer decides when the next phase of planning and risk
analysis occurs. If it is determined that the risks are too high, the project can be terminated. Evaluation. The evaluation phase allows the costumer to
evaluate the project to date before the project continues to the next spiral. In this phase, the customer will assess the
Justification of Method Used Out of many methods, the proponents have chosen Barry
Boehms Spiral model. Since the proponents are going to enhance existing peripheral system, the development and creation of the proposed system must be carefully taken into account. It is in a way complex and complicated for the proposed system is something new among the line. In view of the fact that the spiral life cycle model is the combination of the classic waterfall model and an element called risk analysis. This model is very appropriate for the proposed system have higher risk than those of simpler projects. This is the reason why risk analysis is very essential in creation and development of the system, and for the record, only the Spiral model offer risk analysis. Moreover, the strengths of the spiral model include the direct consideration of risks of all levels greatly reduces problems. It is also good for large complex projects. This models evaluation allows for any changed deemed necessary, or would allow for new technological advances to be used. Lastly, it allows the user or customer and the developer to determine and to react to risk each evolutionary level.
Methods Used for Product Evaluation The evaluation of the proposed system is based on its
performance and feasibility. To prove the effectiveness of the proposed system, the proponents tested its technical, economic and operational feasibility. Technical Feasibility. This evaluation method will determine if the software and hardware specifications of the needed in the is
development
and
implementation
proposed
system
currently available. Moreover, this is also a way to find out if the current technical resources can be upgrade or added to in a manner that fulfils the request under consideration. Operational Feasibility. This method refers to the significant difference between the existing system and proposed system. The proposed system will be evaluated according to the following criteria: Efficiency The ability of the system to generate results with effectiveness and productivity. Reliability The dependability of the system to perform
required functions. User-friendliness The trouble-free interaction of a user with the system.
Ergonomic The ability of the device in which it maximizes productivity by minimizing operator fatigue and discomfort. Compatibility The condition in which it has an efficient
integration and operation with the user and the system. The criteria ranges from 1 to 5, where 5 excellent, 4 very good, 3 good, 2 fair, and 1 poor. Evaluation Formula
t-Computed =
WMP WME
Let: t = test value N = total number of correspondents WMP = weighted mean of the proposed system WME = weighted mean of the existing system. WMP = summation of the WMP WME = summation of the WME
researchers n = total number of respondents Weighted mean = f(x1 + x2+ + xn) n where: f(x1 + x2+ + xn)/n = represents the sum of all means of each criteria n = total number of criteria Economic Feasibility. This is used in order to determine if the proposed system is more profitable or cost efficient than the existing system. Through the software development cost, the researchers can easily determine which is more expensive, the existing or the proposed system. All of these expenses are shown in the market analysis. The following formula will be used for the market analysis.
Formula for the Computation) A. Computation for the Salvage Value of the Hardware Salvage Value = ((Hardware Acquisition Cost/Life
expectancy)* Devt period)/ 12 B. Computation for The Annual Depreciation Cost of Hardware Annual Depreciation Cost = (Hardware Acquisition Cost
C. Computation for Monthly Depreciation Cost of Hardware Monthly Depreciation Cost = Annual Depreciation Cost/ 12 D. Computation for Hardware Development Hardware Development Cost= Monthly Depreciation Cost*Devt period) E. Computation for Salvage value of Software Salvage Period/12 F. Computation for the Annual Depreciation Cost of Software Annual Depreciation Cost = Software Acquisition Cost Value = (Software Cost/Life Expectancy)*Devt
Software Value / Life expectancy G. Computation for the Monthly Depreciation Cost of Software Monthly Depreciation Cost = Annual Depreciation cost / 12 H. Computation for the Software Development Cost Software Development Cost = Monthly Depreciation Cost *
Devt period I. Computation for the Labor Cost Labor cost = Development fee * Devt Period J. Computation for the Kwh Use of Computer Kwh Used of Computer = No.of watts * No. of hours a month *qty / 1000w K. Computation for software Cost Software Cost = Total Devt Cost/ No. of copies L. Computation for Selling Price
Selling Price = (software cost * mark-up) + software cost + CD + packaging M. Computation for the profit for the First Year Profit for the First Year = Total Annual Benefit Total devt Cost N. Computation for the playback Period Playback Period = (Total Devt Cost / Total annual Benefit) * 12 O. Computation for the Investment Return Return of Investment = ( Total Annual Benefit / Total Devt Cost) * 100%