Professional Documents
Culture Documents
Submitted By
2022-2023
Vidya Jyothi Institute of Technology
(An Autonomous Institution)
(Accredited by NAAC & NBA, Approved by AICTE New Delhi & Permanently Affiliated to JNTUH)
CERTIFICATE
This is to certify that the project report entitled RFID Attendance system using
Google Sheets is being submitted by Mr. P. VARSHUTH YADAV(19911A04A4)
of B.Tech IV- I semester of Electronics & Communication Engineering is a
record Bonafide work carried out by them. The results embodied in this report
have not been submitted to any other University for the award of any degree.
EXTERNAL EXAMINER
DECLARATION
This is to certify that the work reported in the present project entitled RFID
Attendance System using Google Sheets, is a record of work done by us in the
Department of Electronics and Communication Engineering, Vidya Jyothi Institute
of Technology, Jawaharlal Nehru Technological University, Hyderabad. The
reports are based on the project work done entirely by us and not copied from any
other source.
Project Associate:
We would like to express our sincere gratitude to our project internal guide Mr. S
Ritesh who has guided and supported us through every stage in the project.
We are really grateful to our HoD Dr. S. Thulasi Prasad for his time to time,
much needed valuable guidance throughout our study.
We express our hearted gratitude to our principal Dr. A.Padmaja for giving
us spontaneous encourage for completing the project.
We thank Dr. E .Sai Baba Reddy, Director of Vidya Jyothi Institute of
Technology for encouraging us in the completion of our project.
It is our privilege to express our gratitude and indebtedness to our Secretary&
Correspondent of Vidya Jyothi Institute of Technology Shri. P.Rajeshwar Reddy
for his moral support.
We express our heartful thanks to Staff of Electronics and Communication
Department, Vidya Jyothi Institute of Technology for helping us in carrying out
our project successfully.
Project Associate:
CHAPTER 6: RESULT 21
CHAPTER 7: CONCLUSION 22
CHAPTER 8: FUTURE SCOPE 23
REFERENCES 24
LIST OF FIGURES
LIST OF TABLES
Table no Table name Page no
Table 3.1 RC522 Pin Specifications 13
Table 4.1 Circuit Diagram Pin Configurations 19
i
ABSTRACT
Nowadays many organisations like education institutions and corporate houses have
adopted biometric attendance systems where attendance is recorded by placing finger
on a fingerprint sensor. These records are saved on cloud server to be monitored from
anywhere by the authorities . Here we are building an RFID Attendance System which
stores attendance records in google sheets .
ii
RFID Attendance system using Google sheets
CHAPTER 1: INTRODUCTION
GENERAL INTRODUCTION
Many of the organisations use a manual paper based attendance to note down the
attendance of students, which requires lot of time and efforts. This project is been
designed to record attendance and reduce manual efforts, thus it is more independent
and error free. To perform functions , A RFID reader is placed near the classroom board,
which detects the tag and record the details in google sheets in hours,minutes and
seconds. If an unidentified tag is scanned ,the buzzer doesn’t gives the beep sound.
This is in direct contrast to the personal computer in the family room. It too is
comprised of computer hardware and software and mechanical components (disk
drives, for example). However, a personal computer is not designed to perform a
specific function rather; it is able to do many different things. Many people use the term
general-purpose computer to make this distinction clear. As shipped, a general-purpose
computer is a blank slate; the manufacturer does not know what the customer will do
wish it. One customer may use it for a network file server another may use it exclusively
for playing games, and a third may use it to write the next great American novel.
Department of ECE,VJIT. 1
RFID Attendance system using Google sheets
If an embedded system is designed well, the existence of the processor and software
could be completely unnoticed by the user of the device. Such is the case for a
microwave oven, VCR, or alarm clock. In some cases, it would even be possible to
build an equivalent device that does not contain the processor and software. This could
be done by replacing the combination with a custom integrated circuit that performs the
same functions in hardware. However, a lot of flexibility is lost when a design is hard-
cooled in this way. It is mush easier, and cheaper, to change a few lines of software
than to redesign a piece of custom hardware.
Given the definition of embedded systems earlier is this chapter; the first such
systems could not possibly have appeared before 1971. That was the year Intel
introduced the world's first microprocessor.This chip, the 4004, was designed for use
in a line of business calculators produced by the Japanese Company Busicom. In 1969,
Busicom asked Intel to design a set of custom integrated circuits-one for each of their
new calculator models. The 4004 was Intel's response rather than design custom
hardware for each calculator, Intel proposed a general-purpose circuit that could be
used throughout the entire line of calculators. Intel's idea was that the software would
give each calculator its unique set of features.
The microcontroller was an overnight success, and its use increased steadily over
the next decade. Early embedded applications included unmanned space probes,
computerized traffic lights, and aircraft flight control systems. In the 1980s, embedded
systems quietly rode the waves of the microcomputer age and brought microprocessors
into every part of our kitchens (bread machines, food processors, and microwave
Department of ECE,VJIT. 2
RFID Attendance system using Google sheets
ovens), living rooms (televisions, stereos, and remote controls), and workplaces (fax
machines, pagers, laser printers, cash registers, and credit card readers).
It seems inevitable that the number of embedded systems will continue to increase
rapidly. Already there are promising new embedded devices that have enormous market
potential; light switches and thermostats that can be central computer, intelligent air-
bag systems that don't inflate when children or small adults are present, pal-sized
electronic organizers and personal digital assistants (PDAs), digital cameras, and
dashboard navigation systems. Clearly, individuals who possess the skills and desire to
design the next generation of embedded systems will be in demand for quite some time.
The issue of what if a deadline is missed is a crucial one. For example, if the realtime
system is part of an airplane's flight control system, it is possible for the lives of the
passengers and crew to be endangered by a single missed deadline. However, if instead
the system is involved in satellite communication, the damage could be limited to a
single corrupt data packet. The more severe the consequences, the more likely it will
be said that the deadline is "hard" and thus, the system is a hard real-time system. Real-
time systems at the other end of this discussion are said to have "soft" deadlines.
All of the topics and examples presented in this book are applicable to the designers
of real-time system who is more delight in his work. He must guarantee reliable
operation of the software and hardware under all the possible conditions and to the
degree that human lives depend upon three system's proper execution, engineering
calculations and descriptive paperwork.
Department of ECE,VJIT. 3
RFID Attendance system using Google sheets
Office automation: The office automation products using em embedded systems are
copying machine, fax machine, key telephone, modem, printer, scanner etc.
Industrial automation: Today a lot of industries use embedded systems for process
control. These include pharmaceutical, cement, sugar, oil exploration, nuclear energy,
electricity generation and transmission. The embedded systems for industrial use are
designed to carry out specific tasks such as monitoring the temperature, pressure,
humidity, voltage, current etc., and then take appropriate action based on the monitored
levels to control other devices or to send information to a centralized monitoring station.
In hazardous industrial environment, where human presence has to be avoided, robots
are used, which are programmed to do specific jobs. The robots are now becoming very
powerful and carry out many interesting and complicated tasks such as hardware
assembly.
Department of ECE,VJIT. 4
RFID Attendance system using Google sheets
two networks may be running different protocol stacks. The router’s function is to
obtain the data packets from incoming pores, analyze the packets and send them
towards the destination after doing necessary protocol conversion. Most networking
equipments, other than the end systems (desktop computers) we use to access the
networks, are embedded systems.
Wireless technologies: Advances in mobile communications are paving way for many
interesting applications using embedded systems. The mobile phone is one of the
marvels of the last decade of the 20’h century. It is a very powerful embedded system
that provides voice communication while we are on the move. The Personal Digital
Assistants and the palmtops can now be used to access multimedia services over the
Internet. Mobile communication infrastructure such as base station controllers, mobile
switching centers are also powerful embedded systems.
Security: Security of persons and information has always been a major issue. We need
to protect our homes and offices; and also the information we transmit and store.
Developing embedded systems for security applications is one of the most lucrative
businesses nowadays. Security devices at homes, offices, airports etc. for authentication
and verification are embedded systems. Encryption devices are nearly 99 per cent of
Department of ECE,VJIT. 5
RFID Attendance system using Google sheets
the processors that are manufactured end up in~ embedded systems. Embedded systems
find applications in. every industrial segment- consumer electronics, transportation,
avionics, biomedical engineering, manufacturing, process control and industrial
automation, data communication, telecommunication, defense, security etc. Used to
encrypt the data/voice being transmitted on communication links such as telephone
lines.Biometric systems using fingerprint and face recognition are now being
extensively used for user authentication in banking applications as well as for access
control in high security buildings.
Finance: Financial dealing through cash and cheques are now slowly paving way for
transactions using smart cards and ATM (Automatic Teller Machine, also expanded as
Any Time Money) machines. Smart card, of the size of a credit card, has a small
microcontroller and memory; and it interacts with the smart card reader! ATM machine
and acts as an electronic wallet. Smart card technology has the capability of ushering
in a cashless society. Well, the list goes on. It is no exaggeration to say that eyes
wherever you go, you can see, or at least feel, the work of an embedded system.
The operating system runs above the hardware, and the application software runs
above the operating system. The same architecture is applicable to any computer
including a desktop computer. However, there are significant differences. It is not
compulsory to have an operating system in every embedded system.
For small appliances such as remote control units, air conditioners, toys etc., there
is no need for an operating system and you can write only the software specific to that
application. For applications involving complex processing, it is advisable to have an
operating system. In such a case, you need to integrate the application software with
the operating system and then transfer the entire software on to the memory chip. Once
the software is transferred to the memory chip, the software will continue to run fora
long time you don’t need to reload new software.
Department of ECE,VJIT. 6
RFID Attendance system using Google sheets
Now, let us see the details of the various building blocks of the hardware of an
embedded system. As shown in Fig. the building blocks are:
• Input Devices
• Output devices
• Communication interfaces
• Application-specific circuitry
The Central Processing Unit (processor, in short) can be any of the following:
microcontroller, microprocessor or Digital Signal Processor (DSP). A micro-controller
is a low-cost processor. Its main attraction is that on the chip itself, there will be many
other components such as memory, serial communication interface, analog-to digital
converter etc. So, for small applications, a micro-controller is the best choice as the
number of external components required will be very less. On the other hand,
microprocessors are more powerful, but you need to use many external components
with them. D5P is used mainly for applications in which signal processing is involved
such as audio and video processing.
Department of ECE,VJIT. 7
RFID Attendance system using Google sheets
Memory:
The memory is categorized as Random Access 11emory (RAM) and Read Only
Memory (ROM). The contents of the RAM will be erased if power is switched off to
the chip, whereas ROM retains the contents even if the power is switched off. So, the
firmware is stored in the ROM. When power is switched on, the processor reads the
ROM; the program is program is executed.
Input devices:
Unlike the desktops, the input devices to an embedded system have very limited
capability. There will be no keyboard or a mouse, and hence interacting with the
embedded system is no easy task. Many embedded systems will have a small keypad-
you press one key to give a specific command. A keypad may be used to input only the
digits. Many embedded systems used in process control do not have any input device
foruser interaction; they take inputs fromsensors or transducers 1’fnd produce electrical
signals that are in turn fed to other systems.
Output devices:
The output devices of the embedded systems also have very limited capability. Some
embedded systems will have a few Light Emitting Diodes (LEDs) to indicate the health
status of the system modules, or for visual indication of alarms. A small Liquid Crystal
Display (LCD) may also be used to display some important parameters.
Communication interfaces:
The embedded systems may need to, interact with other embedded systems at they
may have to transmit data to a desktop. To facilitate this, the embedded systems are
provided with one or a few communication interfaces such as RS232, RS422, RS485,
Universal Serial Bus (USB), IEEE 1394, Ethernet etc.
Application-specific circuitry:
Sensors, transducers, special processing and control circuitry may be required fat an
embedded system, depending on its application. This circuitry interacts with the
processor to carry out the necessary work. The entire hardware has to be given power
supply either through the 230 volts main supply or through a battery. The hardware has
to design in such a way that the power consumption is minimized.
Department of ECE,VJIT. 8
RFID Attendance system using Google sheets
Department of ECE,VJIT. 9
RFID Attendance system using Google sheets
Software Requirement:
• Arduino IDE Software.
However, as a chip, the ESP8266 is also hard to access and use. You must solder
wires, with the appropriate analog voltage, to its pins for the simplest tasks such as
powering it on or sending a keystroke to the “computer” on the chip. You also have to
program it in low-level machine instructions that can be interpreted by the chip
hardware. This level of integration is not a problem using the ESP8266 as an embedded
controller chip in mass-produced electronics. It is a huge burden for hobbyists, hackers,
or students who want to experiment with it in their own IoT projects.
Department of ECE,VJIT. 10
RFID Attendance system using Google sheets
Department of ECE,VJIT. 11
RFID Attendance system using Google sheets
A reader consists of a radio frequency module and an antenna that generates a high
frequency electromagnetic field. Whereas the tag is usually a passive device (it does
not have a battery). It consists of a microchip that stores and processes information, and
an antenna for receiving and transmitting a signal.
The RC522 is a 13.56MHz RFID module that is based on the MFRC522 controller
from NXP semiconductors. The module can supports I2C, SPI and UART and
normally is shipped with a RFID card and key fob fob tag with 1KB of memory. And
the best part is that it can write a tag that means you can store any message in it. It is
commonly used in attendance systems and other person/object identification
applications.
Department of ECE,VJIT. 12
RFID Attendance system using Google sheets
3.3 5V Buzzer
An audio signaling device like a beeper or buzzer may be electromechanical
or piezoelectric or mechanical type. The main function of this is to convert the signal
from audio to sound. Generally, it is powered through DC voltage and used in timers,
Department of ECE,VJIT. 13
RFID Attendance system using Google sheets
alarm devices, printers, alarms, computers, etc. Based on the various designs, it can
generate different sounds like alarm, music, bell & siren.
The pin configuration of the buzzer is shown below. It includes two pins namely
positive and negative. The positive terminal of this is represented with the ‘+’ symbol
or a longer terminal. This terminal is powered through 6Volts whereas the negative
terminal is represented with the ‘-‘symbol or short terminal and it is connected to the
GND terminal.
There are two main types of RFID tags: battery-operated and passive. As the name
suggests, battery-operated RFID tags contain an onboard battery as a power supply,
whereas a passive RFID tag does not, instead working by using electromagnetic energy
transmitted from an RFID reader. Battery-operated RFID tags might also be called
active RFID tags.
Passive RFID tags use three main frequencies to transmit information: 125 – 134
KHz, also known as Low Frequency (LF), 13.56 MHz, also known as High Frequency
Department of ECE,VJIT. 14
RFID Attendance system using Google sheets
(HF) and Near-Field Communication (NFC), and 865 – 960 MHz, also known as Ultra
High Frequency (UHF). The frequency used affects the tag’s range. When a passive
RFID tag is scanned by a reader, the reader transmits energy to the tag which powers it
enough for the chip and antenna to relay information back to the reader. The reader then
transmits this information back to an RFID computer program for interpretation. There
are two main types of passive RFID tags: inlays and hard tags. Inlays are typically quite
thin and can be stuck on various materials, whereas hard tags are just as the name
suggests, made of a hard, durable material such as plastic or metal.
Arduino IDE - contains a text editor for writing code, a message area, a text console,
a toolbar with buttons for common functions and a series of menus. It connects to the
Arduino and Genuino hardware to upload programs and communicate with them.
Programs written using Arduino IDE are called sketches. These sketches are written
in the text editor and are saved with the file extension. The editor has features for
cutting/pasting and for searching/replacing text. The message area gives feedback while
saving and exporting and also displays errors. The console displays text output by the
Arduino Software (IDE), including complete error messages and other information. The
bottom righthand corner of the window displays the configured board and serial port.
Department of ECE,VJIT. 15
RFID Attendance system using Google sheets
The toolbar buttons allow you to verify and upload programs, create, open, and save
sketches, and open the serial monitor.
• Open - Presents a menu of all the sketches in your sketchbook. Clicking one will open
it within the current window overwriting its content.
• Upload - Compiles your code and uploads it to the configured board. See uploading
below for details.
We will study in depth, the Arduino program structure and we will learn more new
terminologies used in the Arduino world. The Arduino software is open-source. The
source code for the Java environment is released under the GPL and the C/C++
microcontroller libraries are under the LGPL.
Sketch: The first new terminology is the Arduino program called “sketch”.
Structure Arduino programs can be divided in three main parts: Structure, Values
(variables and constants), and Functions. In this tutorial, we will learn about the
Arduino software program, step by step, and how we can write the program without
any syntax or compilation error.
Let us start with the Structure. Software structure consist of two main functions:
Department of ECE,VJIT. 16
RFID Attendance system using Google sheets
PURPOSE of setup(): The setup() function is called when a sketch starts. Use it to
initialize the variables, pin modes, start using libraries, etc. The setup function will only
run once, after each power up or reset of the Arduino board.
PURPOSE of loop (): After creating a setup() function, which initializes and sets the
initial values, the loop() function does precisely what its name suggests, and loops
consecutively, allowing your program to change and respond. Use it to actively control
the Arduino.
Department of ECE,VJIT. 17
RFID Attendance system using Google sheets
The Rfid Card Module is a wireless device that scans an Rfid Tag which is kept in
the radio frequency range(30Hz to 300GHz) or almost approx. at a distance of 5 to
10cm. Then the data from chip(chip is placed in Rfid tags or keychain tags) is scanned
and sent to NodeMCU. ESP8266 is a microcontroller.It sends the data from the chip to
PC. The data sent to PC gets uploaded on google sheets.Then NodeMCU sends signal
to buzzer for beep sound.This indicates that the I-card has been scanned.
The connections made between all the components with Arduino uno including the
pin number are shown in the following figure below,
Department of ECE,VJIT. 18
RFID Attendance system using Google sheets
Department of ECE,VJIT. 19
RFID Attendance system using Google sheets
NodeMCU(ESP8266) is a microcontroller.It sends the data from the chip to PC. The
data sent to PC gets uploaded on google sheets in hours,minutes,seconds. Then
NodeMCU sends signal to buzzer for beep sound.This indicates that the I-card has
been scanned.
Department of ECE,VJIT. 20
RFID Attendance system using Google sheets
CHAPTER 6: RESULT
The project was perfomed successfully and below are the results related to them .
The Figure Below shows the updation of the excel sheet with different tag data and
their in-time
Department of ECE,VJIT. 21
RFID Attendance system using Google sheets
CHAPTER 7: CONCLUSION
Our goal is to develop a secure, portable and ready to deploy RFID-based attendance.
The system provides a practical and efficient solution for monitoring student attendance
on a large scale. The proposed attendance monitoring system uses the concept of IoT
to log and fetch data on the server/cloud and make it available for the user anytime and
anywhere. For future work, we would also like to give access to students about their
attendance, so they can log in and check their attendance remotely. We would integrate
the entire system with a mobile phone application so that all functionality is on the
mobile itself.
Department of ECE,VJIT. 22
RFID Attendance system using Google sheets
Department of ECE,VJIT. 23
RFID Attendance system using Google sheets
References:
[1] Sri Madhu BM, Kavya K, Devansh. IoT based automatic attendance management
system, IEEE International Conference on Current Trends in Computer, Electrical,
Electronics and Communication, September 2017.
[2] NodeMCU pin diagrams by www.electronicshub.org
[3] Qianwen M, Fu X, Haiping H, Lijuan S, Ruchan W. Smart Attitude Algorithm with
Parrite RFID Tags. IEEE Conference 2018.
[4] Hassan S, Ertan Z, Ghassan AH. New anti-collision protocol for RFID – Based
Student Attendance system. 2nd International Symposium on Multidisciplinary Studies
and Innovative Technologies (ISMSIT). October 2018.
[5] Nguyen HK, Chew MT. RFID – Based Attendance management System, 2nd
Workshop on Recent Trends in Telecommunications Research (RTTR) Palmerston
North, New Zealand. 2017.
Department of ECE,VJIT. 24