SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Implementation of Low Cost RF Based Attendance Management
System Using PSOC 5 and GSM Module
Sk. Khamuruddeen1, S.V.Devika2, T. Satya Prasad3, S. Phani Kumar4, M. Sri
Naga Manikantha5
1

( Assistant Professor, Department of ECE, HITAM, Hyderabad)
( Associate Professor, Department of ECE, HITAM, Hyderabad)
3
( IV B.Tech, Department of ECE, HITAM, Hyderabad)
4
( B.Tech, Department of ECE, HITAM, Hyderabad)
5
( B.Tech, Department of ECE, TRR, Hyderabad)
2

ABSTRACT
An Attendance Management System (AMS) based on TCP/IP protocol is designed and realized. This paper
expounds the principle of the RFID reader device in AMS, its hardware and software design. The reader device
takes ARM LM3S9B90 as the core and Philips’s MFRC531 as the transceiver chip of RFID reader. In
application, the system works stable and has good real-time performance.
Keywords- TCP/IP protocol; ARM; Attendance Management System (AMS)

I.

Introduction

The main objective of our project is to
manage the student’s attendance by using RF ID
cards and updating it to the student or parent through
sms by using GSM module.
Another most interesting aspect of our
project is that whenever a period is completed the
details of the students who have entered into the
classroom are entered and updated to an ip address
by communicating it through GPRS. Taking this
advantage, we design and implement an efficient and
reliable
Attendance
Management
System
(AMS).AMS is a smart staff management system
which includes Reading or writing non-contact smart
IC card, remote automatic control, network
communication, and intelligent analysis and
calculation. The managerial function of AMS
includes the collection and storage of staff personal
information, statistics and analysis of attendance
information. With real-time calculating and accurate
attendance recording, AMS can generate the
analytical information, such as the working hours,
working overtime, the staff whether be late or not
and so on, which offers significant improvement for
staff management in the aspect of software. In the
hardware aspect, AMS based on TCP/IP protocols
achieve remote automatic control through the
Internet, which is convenient to configure and control
the device remotely.

II.

reader is the device that can read or extract
information stored inside tags which are the smart IC
cards in AMS. This part is deployed in the different
departments where the staff attendance needs to be
recorded.
The information database is designed to
store the staff personal information and attendance
records; The PC manager is a set of software running
in a computer, whose function is to operate the
information database and control the RFID reader. It
sends commands to the RFID reader, and receives
feedback data, then processes the data and stores
them into the database.
By considering the security of the data
transmission, AMS encrypts the data before
transmission. At the same time, the information
database and the PC manager are placed in the same
intranet to get better real-time performance. The
architecture of AMS is shown in Fig. 1.

SYSTMEN DESIGN

According to the function and the deploying
place of system module, AMS can logically be
divided into three parts: RFID reader, information
database and PC manager. They can be connected
with each other through the Internet .The RFID
www.ijera.com

15 | P a g e
S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20

www.ijera.com

0.100” pin spacing for easy prototyping and
integration.
The Parallax RFID Reader Module works
exclusively with the EM Microelectronics-Marin SA
EM4100-familyof passive read-only transponder
tags.
A variety of different tag types and styles
exist with the most popular made available from
Parallax.
Each transponder tag contains a unique
identifier (one of 240, or1,099,511,627,776, possible
combinations) that is read by the RFID Reader
Module and transmitted to the host via a simple serial
connecting the Parallax RFID Reader module to the
basic stamp microcontroller interface.
The Parallax RFID Reader Module can be
integrated into any design using only four
connections (VCC,/ENABLE, SOUT, GND). Use the
following circuit for
iii.

Figure:1- Block diagram
Firstly our project deals with the
management of a class attendance and it is done with
the help of a PSOC 5 microcontroller, GSM module
and it is updated with a TCP connection. When a
student swipes his RF ID card the door automatically
opens and when he passes through the IR counters
and presses the button the count of the students get
increased by one.
At the end of the period all the details of the
students and the total count of the students in the
classroom are displayed so that any mismatch of the
students and the cards are calculated.
At the end of every period the details of the
students are automated in the server which we give
an unique IP address. If any student wants to know
his attendance a message including his RF ID
number has to be sent and his attendance will be sent
in reply.

III.

HARDWARE DESIGN

RFID reader is the major hardware that
needs to be designed and fabricated in AMS. The
RFID reader consists of the circuit unit and the
antenna.
A.
RFID READER MODULE
Reader Module is the first low-cost solution
to read passive RFID transponder tags up to 1¾” - 3”
inches away depending on the tag (see list below).
The RFID Reader Module can be used in a wide
variety of hobbyist and commercial applications,
including access control, automatic identification,
robotics navigation, inventory tracking, payment
systems, and car immobilization. Fully-integrated,
low-cost method of reading passive RFID
transponder tags
i.
Single-wire, 2400 baud Serial TTL interface
to PC, BASIC Stamp® and other processors
requires single +5VDC supply
ii.
Bi-colour LED for visual indication of
activity
www.ijera.com

Table 1. Electrical Connections
Implementation and usage of the RFID
Reader Module is straightforward. BASIC Stamp 1,
2, and SX28AC/DP code examples (SX/B) are
included at the end of this documentation. The RFID
Reader Module is controlled with a single TTL-level
active-low /ENABLE pin. When the /ENABLE pin is
pulled LOW, the module will enter its active state
and enable the antenna to interrogate for tags. The
current consumption of the module will increase
dramatically when the module is active.
A visual indication of the state of the RFID
Reader Module is given with the on-board LED.
When the module is successfully powered-up and is
in an idle state, the LED will be GREEN. When the
module is in an active state and the antenna is
transmitting, the LED will be RED. The face of the
RFID tag should be held parallel to the front or back
face of the antenna (where the majority of RF energy
is focused).
If the tag is held sideways (perpendicular to
the antenna) you'll either get no reading or a poor
reading. Only one transponder tag should be held up
to the antenna at anytime. The use of multiple tags at
one time will cause tag collisions and confuse the
reader. The two tags available in the Parallax store
have a read distance of approximately 3 inches.
Actual distance may vary slightly depending on the
size of the transponder tag and environmental
conditions of the application.
16 | P a g e
S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20
When a valid RFID transponder tag is
placed within range of the activated reader, the
unique ID will be transmitted as a 12-byte ASCII
string via the TTL-level SOUT (Serial Output) pin in
the following format.

Table 2. Communication Protocol
The start byte and stop byte are used to
easily identify that a correct string has been received
from the reader (they correspond to a line feed and
carriage return characters, respectively). The middle
ten bytes are the actual tag's unique ID.
All communication is 8 data bits, no parity,
1 stop bit, non-inverted, least significant bit first
(8N1). The baud rate is configured for 2400bps, a
standard communications speed supported by most
any microprocessor or PC, and cannot be changed.
The Parallax RFID Reader Module initiates all
communication. The Parallax RFID Reader Module
can connect directly to any TTL-compatible UART
or to an RS232-compatible interface by using an
external level shifter.
Radio Frequency Identification (RFID) is a
generic term for non-contacting technologies that use
radio waves to automatically identify people or
objects. There are several methods of identification,
but the most common is to store a unique serial
number that identifies a person or object on a
microchip that is attached to an antenna. The
combined antenna and microchip are called an
"RFID transponder" or "RFID tag" and work in
combination with an "RFID reader" (sometimes
called an "RFID interrogator").
An RFID system consists of a reader and
one or more tags. The reader's antenna is used to
transmit radio frequency (RF) energy. Depending on
the tag type, the energy is "harvested" by the tag's
antenna and used to power up the internal circuitry of
the tag. The tag will then modulate the
electromagnetic waves generated by the reader in
order to transmit its data back to the reader.
The reader receives the modulated waves
and converts them into digital data. In the case of the
Parallax RFID Reader Module, correctly received
digital data is sent serially through the SOUT pin.
There are two major types of tag technologies.
"Passive tags" are tags that do not contain their own
power source or transmitter.
When radio waves from the reader reach the
chip’s antenna, the energy is converted by the
antenna into electricity that can power up the
microchip in the tag (known as "parasitic power").
The tag is then able to send back any information

www.ijera.com

www.ijera.com

stored on the tag by reflecting the electromagnetic
waves as described above.
"Active tags" have their own power source
and transmitter. The power source, usually a battery,
is used to run the microchip's circuitry and to
broadcast a signal to reader. Due to the fact that
passive tags do not have their own transmitter and
must reflect their signal to the reader, the reading
distance is much shorter than with active tags.
However, active tags are typically larger,
more expensive, and require occasional service. The
RFID Reader Module is designed specifically for
low-frequency (125 kHz) passive tags. Frequency
refers to the size of the radio waves used to
communicate between the RFID system components.
Just as you tune your radio to different
frequencies in order to hear different radio station,
RFID tags and readers have to be tuned to the same
frequency in order to communicate effectively.
RFID systems typically use one of the
following frequency ranges: low frequency (or LF,
around 125 kHz), high frequency (or HF, around
13.56 MHz), ultra-high frequency (or UHF, around
868 and 928 MHz), or microwave (around 2.45 and
5.8 GHz). It is generally safe to assume that a higher
frequency equates to a faster data transfer rate and
longer read ranges, but also more sensitivity to
environmental factors such as liquid and metal that
can interfere with radio waves.
There really is no such thing as a "typical"
RFID tag. The read range of a tag ultimately depends
on many factors: the frequency of RFID system
operation, the power of the reader, and interference
from other RF devices. Balancing a number of
engineering trade-offs (antenna size v. reading
distance v. power v. manufacturing cost), the
Parallax RFID Reader Module's antenna was
designed with a specific inductance and "Q" factor
for 125 kHz RFID operation at a tag read distance of
up to 1¾” - 3” inches.

17 | P a g e
S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20

B.

IR SENSOR
This device emits and/or detects infrared
radiation to sense a particular phase in the
environment. Generally, thermal radiation is emitted
by all the objects in the infrared spectrum.
The infrared sensor detects this type of radiation
which is not visible to human eye.

Figure: IR Sensor
The basic idea is to make use of IR LEDs to
send the infrared waves to the object. Another IR
diode of the same type is to be used to detect the
reflected wave from the object. The diagram is
shown below.

www.ijera.com

production. Apart from this, custom developed host
programmers such as FGPA or external
microcontroller can be used to perform in-system
programming for PSoC 5 device either for complete
programming or partial firmware upgrade.
The host programmer programs the PSoC 5device
with the program image contained inthe
<Project_Name>.hex file, Which is generated by
PSoC Creator Software.
See the general PSoC Programming web
page for complete information on PSoC 5
Programming related documents, software, and a list
of supported third party programmers.
PROCEDURE:
1. Now open the PSoC Programmer 3.17 in the
start button from the taskbar.

2. In the window, open the .hex file. select the device
family and the device from the drop-down list as
shown below

Figure: 3 Working of IR sensor
When IR receiver is subjected to infrared
light, a voltage difference is produced across the
leads. Less voltage which is produced can be hardly
detected and hence operational amplifiers (Op-amps)
are used to detect the low voltages accurately.
Measuring the distance of the object from
the receiver sensor the electrical property of IR
sensor components can be used to measure the
distance of an object. The fact when IR receiver is
subjected to light, a potential difference is produced
across the leads.

IV.

3) Now Connect the device to the system and then
program the device as shown

Software implementation of project:
PSOC PROGRAMMER:

The host programmer can be the MiniProg3
Programmer Supplied by Cypress, a third party
programmer or a hardware device such as a
microcontroller or FGPA. MiniProg3 programmer is
used in the prototype stage of application
development for programming and debugging PSoC
5 in large numbers.
They are used when the design is finalized
and the application needs to go in for mass
www.ijera.com

18 | P a g e
S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20
4.Now the code is successfully programmed.
5.By these two ways we can program PSoC devices.
6. The IR count and card count get tally.

www.ijera.com

By interfacing it with an external mini printer
the attendance can be obtained in a printed format.
By accessing it with a gsm server and using TCP we
can update the attendance directly to the websites
required. By using photo scanners and counters we
can avoid duplications and we can use it for pure
security applications and database management
systems for colleges especially.

REFERENCES
[1]

[2]

[3]
7. SERVER UPDATION
[4]

[5]

[6]

[7]
[8]

V.

CONCLUSION

Hence by our project we can conclude that
the tedious job of automation can be reduced by
using this project. Update can be sent easily to the
parents by gsm server. Automatic updation can be
done using TCP and gprs. This forms a simple
method for calculating the attendance and storing the
details of the students. The PSOC microcontroller is
a low power controller; hence it can be applied under
low power conditions also.
By interfacing it with an external memory
access we can implement it for higher levels of
attendances and calculations of various parameters.
This can be further extended for marks, news
and validation purpose. We can use bio-metric and
image processing techniques for further up
gradations. By interfacing external memory to the
controller this can be used for classrooms with more
strength.

www.ijera.com

[9]

[10]
[11]

Sedra and Smith, Microelectronic Circuits,
fourth edition, Oxford University Press,
1998.
R.S. Sedha, 2002. A Text Book of Applied
Electronics, S. Chand and Company Ltd.,
New Delhi
Theodore
S.
Rappaport,
Wireless
Communications, second edition, PHI. New
Delhi,Draft EN (GSM 03.40) v6.0.0
Ali M. F. M., Younis M. I., Zamli K. Z.,
Ismail W. (2010) Development of Java
based RFID application programmable
interface for heterogeneous RFID system.
The Journal of Systems and Software
83(11): 2322–2331
Anagnostopoulos
A.,
Soldatos
J.,
Michalakos S. G. (2009) REFiLL: A
lightweight programmable middleware
platform for cost effective RFID application
development. Pervasive and Mobile
Computing 5(1): 49–63
Balitanas M. O., Kim T. (2010) Review:
Security threats for RFID-sensor network
anti-collision protocol. International Journal
of Smart Home 4(1): 23–36
Bondi, A. B. (2000). Characteristics of
scalability and their impact on performance.
Bubak M., Albada G. D. V., Sloot P. M. A.,
Dongarra J. J., Abawajy J. H. (2004)
Dynamic parallel job scheduling in multicluster computing systems. LNCS 3036:
27–34
Chen M., Gonzalez S., Zhang Q., Li M.,
Leung V. (2010) A 2G-RFID based Ehealthcare
system.
IEEE
Wireless
Communications Magazine 17(1): 37–43
SEEED
RFID
Reader
Manual,
www.seeedstudio.com
Smart License May Cut Car Theft
,http://www.rfidjournal.com/article/view/89.

AUTHORS

Mr.SK. Khamuruddeen working as an
Assistant Professor in Hyderabad Institute of
Technology & Management, His area of interest is
VLSI & System Design. He can be reached at
19 | P a g e
S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20

www.ijera.com

Mrs. S. V. Devika Working as an Associate
Professor in Hyderabad Institute of Technology &
Management, her area of interest is communications,
VLSI & Antenna theory. She can be reached at

SATYA PRASAD. TADAVARTHY he is
good student of ECE, HITAM College, Hyderabad.
He is the Chairperson of IEEE HITAM STUDENT
BRANCH (2013-2014) and also Active member in
sahaya which helps poor people in knowledge. .He is
active members, in technical education along the
student related motivation activities. Lot of interest in
research areas related to embedded system, image
processing etc.

SAMUDRALA PHANI KUMAR he
completed his B-tech (2009-2013) ECE in HITAM
College, Hyderabad. He is one the GOLD member of
IEEE and also Active member in sahaya which helps
poor people in knowledge. His area of interest in
research areas related to embedded system,
communications etc.

Modugula.Sri Naga ManiKantha he is a
good student of ECE, TRR Engineering College,
Hyderabad and Member in NSS . He is an active
member in technical education along the student
related motivation activities, his area of interest is
embedded system, image processing etc.

www.ijera.com

20 | P a g e

Contenu connexe

Tendances

RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMSuvendu Kumar Dash
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontrollerrajkanakaraj007
 
Access control presentation
Access control presentationAccess control presentation
Access control presentationSaqib Raza
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfSudipto Krishna Dutta
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance SystemAtiq Shaikh
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakornn7046
 
Parking Lot Security System using RFID Technology
Parking Lot Security System using RFID TechnologyParking Lot Security System using RFID Technology
Parking Lot Security System using RFID Technologyijtsrd
 
RFID based design for vehicle location system
RFID based design for vehicle location systemRFID based design for vehicle location system
RFID based design for vehicle location systemmsc84
 
Rfid and gsm based cas
Rfid and gsm based casRfid and gsm based cas
Rfid and gsm based casNarsa Ram
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance systemafserfec56
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 

Tendances (20)

RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Access control presentation
Access control presentationAccess control presentation
Access control presentation
 
Co4301524529
Co4301524529Co4301524529
Co4301524529
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access System
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdf
 
IRJET- Examination Room Guidance System using RFID and Arduino
IRJET-  	  Examination Room Guidance System using RFID and ArduinoIRJET-  	  Examination Room Guidance System using RFID and Arduino
IRJET- Examination Room Guidance System using RFID and Arduino
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.
 
RFID and IR Based Attendance System
RFID and IR Based Attendance SystemRFID and IR Based Attendance System
RFID and IR Based Attendance System
 
Nimesh thakor
Nimesh thakorNimesh thakor
Nimesh thakor
 
Parking Lot Security System using RFID Technology
Parking Lot Security System using RFID TechnologyParking Lot Security System using RFID Technology
Parking Lot Security System using RFID Technology
 
RFID based design for vehicle location system
RFID based design for vehicle location systemRFID based design for vehicle location system
RFID based design for vehicle location system
 
Rfid and gsm based cas
Rfid and gsm based casRfid and gsm based cas
Rfid and gsm based cas
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 

En vedette

How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startupLoic Le Meur
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakShelly Sanchez Terrell
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

En vedette (6)

Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startup
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similaire à C361520

Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMijiert bestjournal
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Soumen Santra
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFIDBharath Chapala
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READERbharath405
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security SystemNataraj Patil
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll taxangel300692
 

Similaire à C361520 (20)

Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
RFID Electromagnetic project (rfid)
 RFID Electromagnetic project (rfid) RFID Electromagnetic project (rfid)
RFID Electromagnetic project (rfid)
 
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEMRFID AND GSM BASED CAMPUS SECURITY SYSTEM
RFID AND GSM BASED CAMPUS SECURITY SYSTEM
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Electronic voting machine using RFID
Electronic voting machine using RFIDElectronic voting machine using RFID
Electronic voting machine using RFID
 
wireless technology (RFID)
wireless technology (RFID)wireless technology (RFID)
wireless technology (RFID)
 
RFID BASED SMART CARD READER
RFID BASED SMART CARD READERRFID BASED SMART CARD READER
RFID BASED SMART CARD READER
 
RFID
RFIDRFID
RFID
 
RFID based Attandance cum Security System
RFID based Attandance cum Security SystemRFID based Attandance cum Security System
RFID based Attandance cum Security System
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Sdfgh
SdfghSdfgh
Sdfgh
 
Rfid report
Rfid reportRfid report
Rfid report
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
 

Dernier

Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 

Dernier (20)

Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 

C361520

  • 1. S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Implementation of Low Cost RF Based Attendance Management System Using PSOC 5 and GSM Module Sk. Khamuruddeen1, S.V.Devika2, T. Satya Prasad3, S. Phani Kumar4, M. Sri Naga Manikantha5 1 ( Assistant Professor, Department of ECE, HITAM, Hyderabad) ( Associate Professor, Department of ECE, HITAM, Hyderabad) 3 ( IV B.Tech, Department of ECE, HITAM, Hyderabad) 4 ( B.Tech, Department of ECE, HITAM, Hyderabad) 5 ( B.Tech, Department of ECE, TRR, Hyderabad) 2 ABSTRACT An Attendance Management System (AMS) based on TCP/IP protocol is designed and realized. This paper expounds the principle of the RFID reader device in AMS, its hardware and software design. The reader device takes ARM LM3S9B90 as the core and Philips’s MFRC531 as the transceiver chip of RFID reader. In application, the system works stable and has good real-time performance. Keywords- TCP/IP protocol; ARM; Attendance Management System (AMS) I. Introduction The main objective of our project is to manage the student’s attendance by using RF ID cards and updating it to the student or parent through sms by using GSM module. Another most interesting aspect of our project is that whenever a period is completed the details of the students who have entered into the classroom are entered and updated to an ip address by communicating it through GPRS. Taking this advantage, we design and implement an efficient and reliable Attendance Management System (AMS).AMS is a smart staff management system which includes Reading or writing non-contact smart IC card, remote automatic control, network communication, and intelligent analysis and calculation. The managerial function of AMS includes the collection and storage of staff personal information, statistics and analysis of attendance information. With real-time calculating and accurate attendance recording, AMS can generate the analytical information, such as the working hours, working overtime, the staff whether be late or not and so on, which offers significant improvement for staff management in the aspect of software. In the hardware aspect, AMS based on TCP/IP protocols achieve remote automatic control through the Internet, which is convenient to configure and control the device remotely. II. reader is the device that can read or extract information stored inside tags which are the smart IC cards in AMS. This part is deployed in the different departments where the staff attendance needs to be recorded. The information database is designed to store the staff personal information and attendance records; The PC manager is a set of software running in a computer, whose function is to operate the information database and control the RFID reader. It sends commands to the RFID reader, and receives feedback data, then processes the data and stores them into the database. By considering the security of the data transmission, AMS encrypts the data before transmission. At the same time, the information database and the PC manager are placed in the same intranet to get better real-time performance. The architecture of AMS is shown in Fig. 1. SYSTMEN DESIGN According to the function and the deploying place of system module, AMS can logically be divided into three parts: RFID reader, information database and PC manager. They can be connected with each other through the Internet .The RFID www.ijera.com 15 | P a g e
  • 2. S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20 www.ijera.com 0.100” pin spacing for easy prototyping and integration. The Parallax RFID Reader Module works exclusively with the EM Microelectronics-Marin SA EM4100-familyof passive read-only transponder tags. A variety of different tag types and styles exist with the most popular made available from Parallax. Each transponder tag contains a unique identifier (one of 240, or1,099,511,627,776, possible combinations) that is read by the RFID Reader Module and transmitted to the host via a simple serial connecting the Parallax RFID Reader module to the basic stamp microcontroller interface. The Parallax RFID Reader Module can be integrated into any design using only four connections (VCC,/ENABLE, SOUT, GND). Use the following circuit for iii. Figure:1- Block diagram Firstly our project deals with the management of a class attendance and it is done with the help of a PSOC 5 microcontroller, GSM module and it is updated with a TCP connection. When a student swipes his RF ID card the door automatically opens and when he passes through the IR counters and presses the button the count of the students get increased by one. At the end of the period all the details of the students and the total count of the students in the classroom are displayed so that any mismatch of the students and the cards are calculated. At the end of every period the details of the students are automated in the server which we give an unique IP address. If any student wants to know his attendance a message including his RF ID number has to be sent and his attendance will be sent in reply. III. HARDWARE DESIGN RFID reader is the major hardware that needs to be designed and fabricated in AMS. The RFID reader consists of the circuit unit and the antenna. A. RFID READER MODULE Reader Module is the first low-cost solution to read passive RFID transponder tags up to 1¾” - 3” inches away depending on the tag (see list below). The RFID Reader Module can be used in a wide variety of hobbyist and commercial applications, including access control, automatic identification, robotics navigation, inventory tracking, payment systems, and car immobilization. Fully-integrated, low-cost method of reading passive RFID transponder tags i. Single-wire, 2400 baud Serial TTL interface to PC, BASIC Stamp® and other processors requires single +5VDC supply ii. Bi-colour LED for visual indication of activity www.ijera.com Table 1. Electrical Connections Implementation and usage of the RFID Reader Module is straightforward. BASIC Stamp 1, 2, and SX28AC/DP code examples (SX/B) are included at the end of this documentation. The RFID Reader Module is controlled with a single TTL-level active-low /ENABLE pin. When the /ENABLE pin is pulled LOW, the module will enter its active state and enable the antenna to interrogate for tags. The current consumption of the module will increase dramatically when the module is active. A visual indication of the state of the RFID Reader Module is given with the on-board LED. When the module is successfully powered-up and is in an idle state, the LED will be GREEN. When the module is in an active state and the antenna is transmitting, the LED will be RED. The face of the RFID tag should be held parallel to the front or back face of the antenna (where the majority of RF energy is focused). If the tag is held sideways (perpendicular to the antenna) you'll either get no reading or a poor reading. Only one transponder tag should be held up to the antenna at anytime. The use of multiple tags at one time will cause tag collisions and confuse the reader. The two tags available in the Parallax store have a read distance of approximately 3 inches. Actual distance may vary slightly depending on the size of the transponder tag and environmental conditions of the application. 16 | P a g e
  • 3. S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20 When a valid RFID transponder tag is placed within range of the activated reader, the unique ID will be transmitted as a 12-byte ASCII string via the TTL-level SOUT (Serial Output) pin in the following format. Table 2. Communication Protocol The start byte and stop byte are used to easily identify that a correct string has been received from the reader (they correspond to a line feed and carriage return characters, respectively). The middle ten bytes are the actual tag's unique ID. All communication is 8 data bits, no parity, 1 stop bit, non-inverted, least significant bit first (8N1). The baud rate is configured for 2400bps, a standard communications speed supported by most any microprocessor or PC, and cannot be changed. The Parallax RFID Reader Module initiates all communication. The Parallax RFID Reader Module can connect directly to any TTL-compatible UART or to an RS232-compatible interface by using an external level shifter. Radio Frequency Identification (RFID) is a generic term for non-contacting technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a unique serial number that identifies a person or object on a microchip that is attached to an antenna. The combined antenna and microchip are called an "RFID transponder" or "RFID tag" and work in combination with an "RFID reader" (sometimes called an "RFID interrogator"). An RFID system consists of a reader and one or more tags. The reader's antenna is used to transmit radio frequency (RF) energy. Depending on the tag type, the energy is "harvested" by the tag's antenna and used to power up the internal circuitry of the tag. The tag will then modulate the electromagnetic waves generated by the reader in order to transmit its data back to the reader. The reader receives the modulated waves and converts them into digital data. In the case of the Parallax RFID Reader Module, correctly received digital data is sent serially through the SOUT pin. There are two major types of tag technologies. "Passive tags" are tags that do not contain their own power source or transmitter. When radio waves from the reader reach the chip’s antenna, the energy is converted by the antenna into electricity that can power up the microchip in the tag (known as "parasitic power"). The tag is then able to send back any information www.ijera.com www.ijera.com stored on the tag by reflecting the electromagnetic waves as described above. "Active tags" have their own power source and transmitter. The power source, usually a battery, is used to run the microchip's circuitry and to broadcast a signal to reader. Due to the fact that passive tags do not have their own transmitter and must reflect their signal to the reader, the reading distance is much shorter than with active tags. However, active tags are typically larger, more expensive, and require occasional service. The RFID Reader Module is designed specifically for low-frequency (125 kHz) passive tags. Frequency refers to the size of the radio waves used to communicate between the RFID system components. Just as you tune your radio to different frequencies in order to hear different radio station, RFID tags and readers have to be tuned to the same frequency in order to communicate effectively. RFID systems typically use one of the following frequency ranges: low frequency (or LF, around 125 kHz), high frequency (or HF, around 13.56 MHz), ultra-high frequency (or UHF, around 868 and 928 MHz), or microwave (around 2.45 and 5.8 GHz). It is generally safe to assume that a higher frequency equates to a faster data transfer rate and longer read ranges, but also more sensitivity to environmental factors such as liquid and metal that can interfere with radio waves. There really is no such thing as a "typical" RFID tag. The read range of a tag ultimately depends on many factors: the frequency of RFID system operation, the power of the reader, and interference from other RF devices. Balancing a number of engineering trade-offs (antenna size v. reading distance v. power v. manufacturing cost), the Parallax RFID Reader Module's antenna was designed with a specific inductance and "Q" factor for 125 kHz RFID operation at a tag read distance of up to 1¾” - 3” inches. 17 | P a g e
  • 4. S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20 B. IR SENSOR This device emits and/or detects infrared radiation to sense a particular phase in the environment. Generally, thermal radiation is emitted by all the objects in the infrared spectrum. The infrared sensor detects this type of radiation which is not visible to human eye. Figure: IR Sensor The basic idea is to make use of IR LEDs to send the infrared waves to the object. Another IR diode of the same type is to be used to detect the reflected wave from the object. The diagram is shown below. www.ijera.com production. Apart from this, custom developed host programmers such as FGPA or external microcontroller can be used to perform in-system programming for PSoC 5 device either for complete programming or partial firmware upgrade. The host programmer programs the PSoC 5device with the program image contained inthe <Project_Name>.hex file, Which is generated by PSoC Creator Software. See the general PSoC Programming web page for complete information on PSoC 5 Programming related documents, software, and a list of supported third party programmers. PROCEDURE: 1. Now open the PSoC Programmer 3.17 in the start button from the taskbar. 2. In the window, open the .hex file. select the device family and the device from the drop-down list as shown below Figure: 3 Working of IR sensor When IR receiver is subjected to infrared light, a voltage difference is produced across the leads. Less voltage which is produced can be hardly detected and hence operational amplifiers (Op-amps) are used to detect the low voltages accurately. Measuring the distance of the object from the receiver sensor the electrical property of IR sensor components can be used to measure the distance of an object. The fact when IR receiver is subjected to light, a potential difference is produced across the leads. IV. 3) Now Connect the device to the system and then program the device as shown Software implementation of project: PSOC PROGRAMMER: The host programmer can be the MiniProg3 Programmer Supplied by Cypress, a third party programmer or a hardware device such as a microcontroller or FGPA. MiniProg3 programmer is used in the prototype stage of application development for programming and debugging PSoC 5 in large numbers. They are used when the design is finalized and the application needs to go in for mass www.ijera.com 18 | P a g e
  • 5. S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20 4.Now the code is successfully programmed. 5.By these two ways we can program PSoC devices. 6. The IR count and card count get tally. www.ijera.com By interfacing it with an external mini printer the attendance can be obtained in a printed format. By accessing it with a gsm server and using TCP we can update the attendance directly to the websites required. By using photo scanners and counters we can avoid duplications and we can use it for pure security applications and database management systems for colleges especially. REFERENCES [1] [2] [3] 7. SERVER UPDATION [4] [5] [6] [7] [8] V. CONCLUSION Hence by our project we can conclude that the tedious job of automation can be reduced by using this project. Update can be sent easily to the parents by gsm server. Automatic updation can be done using TCP and gprs. This forms a simple method for calculating the attendance and storing the details of the students. The PSOC microcontroller is a low power controller; hence it can be applied under low power conditions also. By interfacing it with an external memory access we can implement it for higher levels of attendances and calculations of various parameters. This can be further extended for marks, news and validation purpose. We can use bio-metric and image processing techniques for further up gradations. By interfacing external memory to the controller this can be used for classrooms with more strength. www.ijera.com [9] [10] [11] Sedra and Smith, Microelectronic Circuits, fourth edition, Oxford University Press, 1998. R.S. Sedha, 2002. A Text Book of Applied Electronics, S. Chand and Company Ltd., New Delhi Theodore S. Rappaport, Wireless Communications, second edition, PHI. New Delhi,Draft EN (GSM 03.40) v6.0.0 Ali M. F. M., Younis M. I., Zamli K. Z., Ismail W. (2010) Development of Java based RFID application programmable interface for heterogeneous RFID system. The Journal of Systems and Software 83(11): 2322–2331 Anagnostopoulos A., Soldatos J., Michalakos S. G. (2009) REFiLL: A lightweight programmable middleware platform for cost effective RFID application development. Pervasive and Mobile Computing 5(1): 49–63 Balitanas M. O., Kim T. (2010) Review: Security threats for RFID-sensor network anti-collision protocol. International Journal of Smart Home 4(1): 23–36 Bondi, A. B. (2000). Characteristics of scalability and their impact on performance. Bubak M., Albada G. D. V., Sloot P. M. A., Dongarra J. J., Abawajy J. H. (2004) Dynamic parallel job scheduling in multicluster computing systems. LNCS 3036: 27–34 Chen M., Gonzalez S., Zhang Q., Li M., Leung V. (2010) A 2G-RFID based Ehealthcare system. IEEE Wireless Communications Magazine 17(1): 37–43 SEEED RFID Reader Manual, www.seeedstudio.com Smart License May Cut Car Theft ,http://www.rfidjournal.com/article/view/89. AUTHORS Mr.SK. Khamuruddeen working as an Assistant Professor in Hyderabad Institute of Technology & Management, His area of interest is VLSI & System Design. He can be reached at 19 | P a g e
  • 6. S. K. Khamuruddeen et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.15-20 www.ijera.com Mrs. S. V. Devika Working as an Associate Professor in Hyderabad Institute of Technology & Management, her area of interest is communications, VLSI & Antenna theory. She can be reached at SATYA PRASAD. TADAVARTHY he is good student of ECE, HITAM College, Hyderabad. He is the Chairperson of IEEE HITAM STUDENT BRANCH (2013-2014) and also Active member in sahaya which helps poor people in knowledge. .He is active members, in technical education along the student related motivation activities. Lot of interest in research areas related to embedded system, image processing etc. SAMUDRALA PHANI KUMAR he completed his B-tech (2009-2013) ECE in HITAM College, Hyderabad. He is one the GOLD member of IEEE and also Active member in sahaya which helps poor people in knowledge. His area of interest in research areas related to embedded system, communications etc. Modugula.Sri Naga ManiKantha he is a good student of ECE, TRR Engineering College, Hyderabad and Member in NSS . He is an active member in technical education along the student related motivation activities, his area of interest is embedded system, image processing etc. www.ijera.com 20 | P a g e