Automatic Identification System Based on RFID

0 downloads 0 Views 2MB Size Report
Nov 28, 2011 - security of students, so we discussed a system in this project for making the attendance activity done automatically using the RFID reader, virtual server ... send a report or copy of that table to the lecturer about who's attendant and who's not. ...... (up to 20 feet under good conditions) and faster data transfer.
Republic of Iraq Ministry of Higher Education And Scientific Research University of Technology Computer Engineering

Automatic Identification System Based on RFID Technology

A project submitted to the department of Computer Engineering in partial fulfillment of requirement for the degree of B.Sc.

By

Afrah Salman Dawood & Noor Kadhim Hadi

Supervised by

Assistant professor Dr. Mohammed Najm Abdullah

2015

Acknowledgement By the help of the God, who gave us the life, mind and the ability to learn and think; we would like to take this opportunity to express our sincere and heartfelt gratitude to our supervisor Assistant professor Dr. Mohammed Najm Abdullah for suggesting this important problem, useful discussions, and facilities throughout the progress of the work. Also we would like to provide a special gratitude to Shenzhen Sanray Technology Co. for their support and helping to buy the suitable tools.

Noor K. Hadi & Afrah S. Dawood 2015

I

Supervisor certificate I certify that the preparation of this project entitled “Automatic Identification System Based on RFID Technology” was prepared by

(Noor K. Hadi & Afrah S. Dawood) made under my supervision at the Computer Engineering Department / University of Technology in partial fulfillment of the requirements needed for the award of the B.Sc. Degree in “Computer Engineering”.

Signature: Name: Assistant Professor Dr. Mohammed Najim Abdullah Title: Assistant Professor Position: Supervisor Date:

/

/ 2015

II

ABSTRACT The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure. It is vital issue to both parents and school staff that how to enhance management and personal security of students, so we discussed a system in this project for making the attendance activity done automatically using the RFID reader, virtual server and a database system. The basic working of the system in this project was as follows: The students belonging to a specific class had their personal data (student name, student number, etc.) entered to the database at the registration time. The students’ cards containing serial numbers, with reference to the data contained in the database table, was given to the students after the registration. When the lecture starts, the RFID reader reads the serial numbers that are contained on each student’s card and sends information about all the attendant students in the classroom to the database, which in turn will store all information in an electronic table; similar to the table of the conventional attendance; in the virtual server, then the system would send a report or copy of that table to the lecturer about who’s attendant and who’s not.

III

Contents Chapter One: Introduction 1.1 Background ....................................................................Error! Bookmark not defined. 1.2 Automatic Identification System ..................................Error! Bookmark not defined. 1.2.1 Barcode Technology ............................................. Error! Bookmark not defined. 1.2.2 Radio Frequency Identification Technology .......... Error! Bookmark not defined. 1.2.3 Optical Character Recognition Technology............ Error! Bookmark not defined. 1.2.4 Biometric and Voice Recognition Technologies ..... Error! Bookmark not defined. 1.3 Research Objectives .....................................................Error! Bookmark not defined. 1.4 literature Survey ............................................................Error! Bookmark not defined.

Chapter Two: RFID Technology 2.1 Introduction ............................................................................................................... 12 2.2 RFID Module................................................................Error! Bookmark not defined.3 2.2.1 History of RFID.................................................................................................. 13 2.2.2 RFID Reader ...................................................................................................... 15 2.2.3 RFID Tag........................................................................................................ 15 2.2.4 Physics and Features behind RFID…………………………………………………………………17 2.2.4.1 Basic features behind RFID ...................................................................... 17 2.2.4.2 Basic physics of RFID ............................................................................... 18 2.3 RFID Operation ........................................................................................................ 21 2.3.1 Communication modes in RFID ...................................................................... 21 2.3.2 Types of modulation used in RFID ................................................................. 24 2.3.3 Coupling mechanisms in RFID ............................. Error! Bookmark not defined.4 2.3.4 Collision and anti-collision procedures in RFID .... Error! Bookmark not defined.5 2.3.4.1 Reader anti-collision algorithm .................... Error! Bookmark not defined.6 2.3.4.2 Tag anti-collision algorithm .......................... Error! Bookmark not defined.7 2.4 Database ........................................................................Error! Bookmark not defined.7 2.4.1 Database Management ...................................... Error! Bookmark not defined.7

IV

Contents Chapter Three: System Architecture 3.1 Introduction ..................................................................Error! Bookmark not defined.0 3.2 Proposed System Architecture................................................................................. 30 3.3 System Hardware ...................................................................................................... 33 3.3.1 System stages ................................................................................................ 33 3.3.2 RFID reader (SR-3411) Specifications .............................................................. 34 3.3 System Software ........................................................................................................ 36 3.4 System Function ........................................................................................................ 42 3.4.1 Information management module................................................................. 42 3.4.2 Attendance management module ................................................................. 44

Chapter Four: Results 4.1 Introduction ............................................................................................................... 46 4.2 Output Screens .......................................................................................................... 46 4.2.1 Admin output screen..................................................................................... 46 4.2.2 Lecturer window ........................................................................................... 54 4.2.3 Help window ....................................................................................................... 57 4.3 System Code .............................................................................................................. 57

Chapter Five: Conclusion and Future work 5.1 Conclusion ................................................................................................................. 58 5.2 Future Work .............................................................................................................. 58 References ........................................................................................................................ 59 Appendix .......................................................................................................................... 60

V

Table of figures Figure no.

Figure title

Page no.

Figure (2.1)

An overall of system view

12

Figure (2.2)

Outlook of the RFID Reader history

14

Figure (2.3)

Different types and sizes of RFID readers

16

and tags Figure (2.4)

19

Figure (2.5)

Current (I) flowing through a straight conductor creating a magnetic field with strength (H) Reader range for different tag positions

Figure (2.6)

Full duplex system

22

Figure (2.7)

Half duplex operation

23

Figure (2.8)

Sequential mode of communication

24

Figure (2.9)

Multi-access procedures in RFID systems

26

Figure (2.10)

Microsoft SQL server 2008 interface

28

Figure (2.11)

Start page of the Microsoft Visual

29

21

Studio2010 Figure (3.1)

Automatic attendance system architecture

32

Figure (3.2)

Automatic attendance system components

34

Figure (3.3)

RFID reader specification

35

Figure (3.4)

3-Tier system architecture

37

Figure(3.5)

Admin Log in flowchart

38

Figure (3.6)

Lecturer Log in flowchart

39

VI

Table of figures

Figure no.

Figure Title

Page no.

Figure (3.7)

Admin class Entity Relationship Diagram

40

Figure (3.8)

Lecturer Entity Relationship Diagram

41

Figure (3.9)

Information management module

43

Figure (3.10)

Attendance management module

45

Figure (4.1)

Log in windows (a)admin (a) lecturer

48

Figure (4.2)

Admin timely attendance screen

49

Figure (4.3)

Admin monthly attendance Screen

50

Figure (4.4)

Display button

52

Figure (4.5)

Add student button

53

Figure (4.6)

Delete student button

54

Figure (4.7)

Start and End lecture buttons screen

55

Figure (4.8)

Lecturer monthly attendance screen

56

Figure (4.9)

Help window

57

VII

‫أﻹﻫﺪاء‬ ‫اﻟﻰ ﻛﻞ ﻣﻦ أﺿﺎءَ ﺑﻌﻠﻤﻪِ ﻋﻘﻞَ ﻏﻴﺮهِ او ﻫﺪى ﺑﺎﻟﺠﻮابِ اﻟﺼﺤﻴﺢِ ﺣﻴﺮةَ ﺳﺎﺋﻠﻴﻪِ‬ ‫ﻓﺄَﻇﻬَﺮَ ﺑﺴَﻤﺎﺣﺘﻪِ ﺗﻮاﺿُﻊَ اﻟﻌﻠﻤﺎءِ وﺑﺮﺣﺎﺑﺘﻪِ ﺳﻤﺎﺣﺔَ اﻟﻌﺎﻣﻠﻴﻦ ‪....‬‬ ‫ﺑَﻌﺪ اﻻﺗﻜﺎلِ ﻋﻠﻰ ﷲ اﻟﻘﺪﻳﺮِ ﻻ ﺑُﺪَّ ﻟﻲ أنْ أﺿَﻊَ ﺧُﻼﺻﺔَ ﺟُﻬﺪيَ اﻟﻤﺘﻮاﺿﻊ ﺑﺎﺧﺘﻴﺎري‬ ‫ﻫﺬا اﻟﻌﻤﻞ وﻃﺎﻟﻤﺎ ﺗﻤﻨﻴﺖُ أنْ ﻳﺠﺪَ اﻟﻘﺒﻮلَ واﻹﺳﺘﺤﺴﺎن ﺑَﺪءﴽ ﻣﻦ ﻗِﺒﻞِ اﺳﺘﺎذي‬ ‫وﻣُﺮﺷﺪي اﻟﺬي أﻛﻦُ ﻟﻪُ ﻛﻞَ اﻹﺣﺘﺮامِ واﻟﺘﻘﺪﻳﺮ واﻟﺬي اﻧﺎرَ ﻃﺮﻳﻘﻲ ‪ ,‬ﻛﺎنَ وﻻزالَ‬ ‫وﺳَﻴﺒﻘﻰ ﺑﻌﻮنِ ﷲ ﻛﺎﻟﺒﺎﺳﻘﺎتِ ﺑﻌﻄﺎﺋﻪِ ‪....‬‬ ‫اﻟﻰ واﻟﺪي اﻟﺬي ﻏَﻤَﺮﻧﻲ ﺑﺎﻷﻣﻞِ واﻟﺘﻌﺎونِ واﻟﺘﻔﺎؤل ‪....‬‬ ‫اﻟﻰ واﻟﺪﺗﻲ اﻟﺘﻲ اﻏﺮﻗﺘﻨﻲْ ﺑﺎﻟﺤﺐِّ واﻟﺤﻨﺎنِ وﻋﻠﻤﺘﻨﻲْ اﻟﺼﺒﺮَ ﻓﻜﺎﻧﺖ اﻟﻴﻨﺒﻮعَ اﻟﺬي ﺗﺘﻔﺠﺮُ‬ ‫ﻣﻨﻪ ﺟﻤﻴﻊ ﻋﻮاﻃﻒِ اﻟﺨﻴﺮِ واﻹﺣﺴﺎنِ ﻓﻲ اﻻرضِ ‪....‬‬ ‫اﻟﻰ ﺟﻤﻴﻊِ أﺻﺪﻗﺎﺋﻲ وﻣﻌﺎرﻓﻲ‪.....‬‬ ‫ﻫﻨﻴﺌﴼ ﻟﻠﺰارﻋﻴﻦَ ﻓﻲ ﻧﻔﻮﺳﻬﻢ وﻓﻲ ﻧﻔﻮسِ اﻷﺧﺮﻳﻦَ ﺳﻨﺎﺑُﻞَ اﻟﺤﺐِ واﻟﺨﻴﺮِ واﻟﻌﻄﺎء ‪....‬‬ ‫ﻟﺘﻜﻦْ أﻋﻤﺎﻟُﻨﺎ ﻋﻠﻰ ﻛﻞِ اﻟﺸﻔﺎهِ ﻗﺼﻴﺪةً ﺟﻤﻴﻠﺔً ﻳﺸﺪوﻫﺎ اﻟﺰﻣﻦ ‪.....‬‬ ‫"وﻣﻦ ﷲ اﻟﺘﻮﻓﻴﻖ"‬

1.1 Background In the pathway of the human history, three ages can be distinguished: the agricultural age, which lasted throughout the 1800s, the industrial age, which began after 1750 and lasted until the 1960s, and the information age which is the trademarked by the evolution and all-encompassing use of the information technology. In the information age, the use of computers for different purposes began to expand widely, so different types of computers with different processing capabilities have been invented. First of all, computers were large in size and consume high energy; furthermore they were used by professional people for specific purposes and in limited places such as ministries and major companies. Interaction in these machines was very complicated, so ordinary people, non-skilled and non-professionals couldn’t use these large machines. As time passed and new techniques have been evaluated, computer sizes’ became smaller and therefore available to the hands of individuals, and the interaction became easier by using mouse, keyboard, and touch screens, so almost everyone now can use computers. Computers, though can be defined as devices used to process data to provide useful information, information can be further processed to produce knowledge which describes how to use these data and/or information, more processing provides the wisdom which is the highest level of processing where it describes when to use them. People make use of the processed data and/or information, so we must explain the interaction between computers and people; this interaction is called Human Computer Interaction (HCI). Different computer applications (programs) use different styles of interactions, even for the same operations. In these days, the concepts of the 1

HCI started to be used carefully; since too many application programs began to be used even by non-skilled people, from this point we can list the following types of HCI: · Command Line: The user types in commands for the program, usually one at a time. The program executes the commands and returns feedback, if necessary. MS-DOS and UNIX use this style. · Question and Answer: The application asks questions and when the user provides, by answers, all necessary data, the application gives the results. Sometimes these are called “walkthrough and use” applications. · Menus: Possible user actions are listed on the screen and the user can select one of them. For example most MS Windows applications include menus. · Form Filling: The user type the data in specific fields, similar to the fields on a paper fill-in form. Many office and database applications use this style. · Function Keys: The interaction is done by a set of special keys or key combinations for different operations. Typical examples are computerized ticket machines, computer games, etc. · Graphical direct manipulation: The objects used in application are graphically represented on the screen and the user can manipulate them directly by pointing, clicking, dragging, typing, etc. Most windowing systems or GUI’s (Graphical User Interface) are based on graphical direct manipulation. The evolution in technology is not limited to computers and interface to those computers only; it also includes the evolution in the ideas and 2

inventing new ways to facilitate the handling requirements of the modern way of living. One of the brand-new technologies is the automatic identification systems technology, which is used in different ways and for different applications such as automatic attendance system that can be implemented in different techniques such as barcode or RFID technologies. In recent years, there have been two major problems faced by organizations such as government departments, colleges, and schools which are time consuming manual attendance and wastage of electrical power. These problems not only related to the future of the country and vital interests of organizations individuals (employees or students), but also affect to establish a harmonious society. Therefore, we need to do everything possible to solve such problems. For campus security (as an example), the foremost is to make sure the personal attendance of the students. It is not effective way for checking personal attendance by traditional method of using papers and calling names. New times calls for new technology, Radio frequency identification is a most promising and growing technology nowadays for personnel management, time attendance, locating objects and so on. NFC Company, (National Finance Center; it is a federal government agency that provides human resources, financial and administrative services for agencies of the United States federal government.), offers active RFID technology for students’ safety and personnel access control at school, college, or company. From the above we can see the role of the information technology (denoted as IT) in developing the organizational work by automating the functions to make it done faster and easier.

3

1.2 Automatic Identification System In recent years automatic identification procedures (Auto-ID) have become very popular in many service industries, purchasing and distribution logistics, manufacturing companies and material flow systems. Automatic identification procedures exist to provide information about people, animals, goods and products in transit. Automatic identification systems (from now on denoted as AIS) are a broad class of devices that are used primarily in commercial settings for security authorization and inventory/logistics control. Although different devices may employ radically different technologies, they are united in the common purpose of collecting and tracking data about people or objects. Familiar

examples

of

automatic

identification

systems

are

bar

codes, magnetic stripes and RFID readers. The companies and trade groups responsible for developing and implementing such devices are often known collectively as the automatic identification and data capture (AIDC) industry. AISs afford many advantages to businesses. They offer a much faster alternative to manual data entry and verification, and a well-designed system is much more accurate as well. Perhaps the simplest example is at the supermarket checkout counter. If product manufacturers and supermarkets didn't use bar codes, cashiers would have to manually read a code from each item or a list, and key the code into the register. If the cashier misread or mistyped, he would have to try again. This is, of course, what was done before bar code systems were implemented, and it is easy to recognize the efficiencies gained by automating that process.

4

Beyond efficient data collection, AISs perform tasks that would be much more difficult to be accomplished manually. Magnetic ink character recognition (MICR), for instance, allows merchants to detect whether a customer is attempting to pass a counterfeit check. In addition, many applications of automatic identification are more sophisticated and create greater efficiencies than simple bar coding on consumer products. These include quality control in manufacturing, freight tracking and biometric and voice recognition for security purposes. In this section we’ll explain some of most important kinds of the AISs. 1.2.1 Barcode Technology Bar coding is the most widely used automatic identification technology. Barcodes began to enjoy popularity in the early 1970s. The barcode is a binary code comprising a field of bars and gaps arranged in a parallel configuration (it is a combination of printed bars and spaces representing letters or numbers). They are arranged according to a predetermined pattern and represent data elements that refer to an associated symbol. The sequence, made up of wide and narrow bars and gaps, can be interpreted numerically and alphanumerically. It is read by optical laser scanning, i.e. by the different reflection of a laser beam from the black bars and white gaps. Barcodes may be extremely cheap, but their stumbling block is their low storage capacity and the fact that they cannot be reprogrammed. The technically optimal solution would be the storage of data in a silicon chip.

5

1.2.2 Radio Frequency Identification Technology It is a method of identifying unique items using radio waves. Typically, a reader (also called an interrogator) communicates with a transponder (RFID tag), which holds digital information in a microchip. But there are chip less forms of RFID tags that use material to reflect back a portion of the radio waves beamed at them. The RFID technology which is an emerging technology provides tracking information without requiring direct contact with the object being tracked. This is an important feature for applications like shoplifting deterrence, vehicle identification, and person or animal monitoring. The RFID technology will be explained in detail in the second chapter. 1.2.3 Optical Character Recognition Technology Optical character recognition (OCR) was first used in the 1960s. Special fonts were developed for this application that simplified characters so that they could be read both in the normal way by people and automatically by machines. The most important advantage of OCR systems is the high density of information and the possibility of reading data visually in an emergency (or simply for checking). Today, OCR is used in production, service and administrative fields, and also in banks for the registration of cheques (personal data, such as name and account number, which is printed on the bottom line of the cheque). However, OCR systems have failed to become universally applicable because of their high price and the complicated readers that they require in comparison with other ID procedures.

6

1.2.4 Biometric and Voice Recognition Technologies Many security applications use biometrics or voice recognition as a mean to positively identify individuals. The most common of these is the fingerprinting. While most fingerprints are still processed through the traditional manual ink method, automated fingerprint storage and identification is being used more frequently in law enforcement and other security operations, such as restricting building access and identifying account holders at banks. Biometrics encompasses a variety of other personal identification methods, all used mostly for security. Retinal and iris scanning techniques involve identifying unique patterns in each human eye. The data describing eye features can be stored using a relatively small amount of memory, and this method may be more definitive than even fingerprinting. Another advantage is that eye scanning systems don't require direct contact with the individual, since the eyes can be scanned by a camera in a specific place, and thus don't require any effort or cooperation from the human. Another biometric method is hand geometry identification. This method scans the shape of the back and side of a person's hand, and compares the scanned image to stored shapes in the database. This is an older technology that is still used to control access to buildings or other privileges. Finally, voice recognition can be used for personal identification or for general data capturing. Voice-based security systems store a record of speech traits and patterns, which are difficult to counterfeit. A fastergrowing use is word recognition for data entry. At its most basic, word recognition is used to identify discrete words, letters, or numbers, such as in an automated telephone menu system that allows users to say the option 7

number of the menu item they wish to choose. More powerful software actually processes continuous speech and turns it into electronic data. This capability is now appearing in much consumer software.

1.3 Research Objectives The main objective of this research is the automating of the student attendance activity using RFID technology. The research guides the reader through the step-by-step procedure that was used to arrive at a cost-effective solution to automate the student attendance activity.

1.4 literature Survey Too many theses talk about the Automatic Attendance System and its concepts, in this section we list some of the previous studies and projects about

the

automatic

students

attendance

system

concepts

and

implementation. In May, 2008, Mohd Firdaus Bin Mahyidin introduced a thesis called: Student Attendance Using RFID System. She tried to solve the problems of the paper based attendance system by making the project system that was running by get the code of card student to compare with the database in Access. She also used the Graphical User Interface (GUI) that was developed using Visual Basic 6.0 to make the database easier to access.

In March 2010, Rengith Baby Kuriakose designed a system that is called, Automatic Student Attendance Registration Using Radio Frequency Identification (RFID); the main aim of this research was to automate student attendance registration, thereby reducing human involvement in the whole process. This system was made by using RFID technology. 8

In 25 November 2010, Hanisah Binti Hamid, made a theses named RFID Based Systematic Student’s Attendance Management System. This project can provide much convenient method to take attendance, but some prerequisites has to be done before start using the program, web-based applications such as JSP, MySQL and Apache to cater the recording and reporting of the students’ attendances. NetBeans IDE 6.1 is used for developing the overall system, MySQL as the database and Java act as the scripting programming language.

In June 2011, Andrew W. Wright produced a thesis named RFID Classroom Management System. The focus of this paper is to discover the most effective system that can be implemented as a classroom management instrument, so he used the RFID technology as a tool to aid professors in the classroom.

In June 2011, Tord Hjalmar Lien made a thesis called: Automatic Identification Technology: Tracking Weapons and Ammunition for the Norwegian Armed Forces. He discussed recommend technology and solutions that improve the accountability and accuracy of small arms and ammunition inventories in the Norwegian Armed Forces (NAF) by using RFID and Item Unique Identification (IUID).

In May 2012, Ononiwu G. C, Okorafor G. N, Onojo J. introduced a thesis under the name: Attendance System Based on Automatic Door Unit Radio Frequency Identification (RFID). The Time-Attendance System GUI was developed using visual basic.Net, it provides the functionalities of the 9

overall system such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. This interface was installed in the host computer.

In May 2012, Nurbek Saparkhojayev and Selim Guvercin made a research called: Attendance Control System Based on RFID-Technology. Authors of the research paper decided implemented a system for making the students’ attendance easier in Suleyman Demirel University, Kazakhstan. The system is based on RFID technology, and the keywords were: Radio Frequency Identification; RFID-tag; RFID- reader; attendance control system.

In February 2013, Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M. introduced a these called: RFID-Based Students’ Attendance Management System. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology.

In August 2014, Dr. Swaminarayan Piya and Unnati A. Patel present Development of a Student Attendance System Using RFID and Face Recognition. Authors of the research decided to create a system that makes easier to check students’ attendance automatically. The system is based on RFID technology, and it can be easily accessed by the lecturers via the web and most importantly, the reports can be generated in real-time processing, thus, provide valuable information about the students’ to the lecturer.

10

Ching Hisang, in the Dept. of Health Care Administration in Chang Jung Christian University, Tainan, Taiwan also provided a thesis about the Smart Classroom Roll Caller System with IOT Architecture. In this paper, the author propose an efficient mechanism by IOT architecture, namely, the Smart Classroom Roll Caller System (SCRCS) that installed at every classrooms of university and read the student’s ID card accumulatively to present the total number of the actual attendance on the LED display of SCRCS at the beginning of every class and let the all ID cards be visible on the multiple slots of SCRCS to avoid the student agent’s activities.

11

2.1 Introduction Student Attendance Using RFID System is automatic record of students’ attendance developed especially for universities. This system consists of two modules which are RFID module and Microsoft Visual Studio 2010 module. Both modules will be combined together in order for this system fully functioning. Each module carries own function and special features which will be discussed in detail in this chapter. Figure (2.1) shows overall block diagram of the system.

Figure (2.1) An overall system view

12

2.2 RFID Module 2.2.1 History of RFID It’s generally said that the roots of radio frequency identification technology can be traced back to World War II. The Germans, Japanese, Americans and British were all using radar which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson-Watt to warn of approaching planes while they were still miles away. The problem was there was no way to identify which planes belonged to the enemy and which were a country’s own pilots returning from a mission. Radio Frequency Identification (RFID) is commonly used to transmit and receive information without wires. RFID readers and tags communicate through a distance using radio waves. There are a lot of advantages in RFID system, included their price, size, memory capacity and their capability. The pure memory-based RFID chip without a co-processor is cheap, and its footprint is small and usually used in car immobilizer applications where the IC has to fit in a tiny glass tube buried in the key. RFID fast processing speed is also essential. Advances in radar and RF communications systems can be shown in figure (2.2), were it is now could be used to identify objects remotely, and we can find the RFID reader in many important applications. Later, companies developed a low-frequency (125 kHz) system, featuring smaller transponders. Over time, companies moved up the radio spectrum to high frequency (13.56 MHz), which was unregulated and unused in most parts of the world. High frequency offered greater range and faster data transfer rates. Today, 13.56 MHz RFID systems are used for access control, payment systems (Mobile Speed pass) and contactless smart cards. They’re also used as an anti-theft device in cars. 13

Ultra-High Frequency (UHF) RFID systems offered longer read range (up to 20 feet under good conditions) and faster data transfer. RFID systems have been installed in numerous different applications, from warehouse tracking to farming, but the technology was expensive at the time due to the low volume of sales and the lack of open, international standards.

Figure (2.2) Outlook of the RFID Reader history

14

2.2.2 RFID Reader RFID reader sends a pulse of radio energy to the tag and listens for the tag’s response. The tag detects this energy and sends back a response that contains the tag’s serial number and possibly other information as well (i.e. password). RFID readers come in many size, as well as tags, as shown in figure (2.3a). Because of the major application used in worldwide, many systems require the simultaneous use of more than one operating frequency. Most systems available on the world market at present operate at one of the following frequencies or frequency ranges: below 135 kHz (125 kHz, 134.2kHz for example), 13.56MHz, UHF (860/960 MHz), 2.45GHz and 5.8GHz. The operating and control characteristics are different for each of these frequencies, and therefore each of them is more appropriate for certain types of application or certain countries.

2.2.3 RFID Tag The tag, also known as the transponder (derived from the terms transmitter and responder), shown in figure (2.3b), holds the data that is transmitted to the reader when the tag is interrogated by the reader. It contains an internal antenna and a microchip. The microchip stores the data which define and distinguish each tag. There are three types of tags in use: active tags, passive tags and semi-passive tags. Active tags incorporate a battery along with the antenna and the microchip. The battery affects the cost and size of active tags. As a result active tags are not very commonly used. Passive tags do not have a built-in battery. The power requirements of a passive tag are generated from the electric or magnetic fields generated by 15

the RFID reader. Passive tags are very cheap and smaller than active tags. As a result they are used in the project on attendance registration. Semi-passive tags have an onboard power source and may have onboard sensors. The onboard power source provides a continuous power source for the sensors. This enables the semi-passive tags to transfer data even in the absence of an RFID reader. The semi-passive also has an increased read range. The cost of semi-passive tags lies between the costs of active and passive tags.

(a) RFID readers

(b) RFID tags Figure (2.3) Different types and sizes of RFID readers and tags

16

2.2.4 Physics and Features behind RFID As we are using the RFID reader and its tags, so we must talk about its features and physics. This section describes briefly the main and the most important features and physics behind the RFID readers. 2.2.4.1 Basic Features behind RFID One of the most important characteristics of RFID systems is the operating frequency and the resulting range of the system. The operating frequency of an RFID system is the frequency at which the reader transmits. The transmission frequency of the transponder is disregarded. In most cases it is the same as the transmission frequency of the reader. However, the transponder’s transmitting power may be set several powers of ten lower than that of the reader. The different transmission frequencies are classified into the three basic ranges: 1) LF (low frequency, 30–300 kHz) 2) HF (high frequency)/RF radio frequency (3–30MHz) 3) UHF ( ultra-high frequency, 300MHz–3 GHz)/microwave (>3 GHz) A further subdivision of RFID systems according to range allows us to differentiate between close-coupling (0–1 cm), remote-coupling (0–1 m), and long-range (>1m) systems. The different procedures for sending data from the transponder back to the reader can be classified into three groups:

17

i) The use of reflection or backscatter (the frequency of the reflected wave corresponds with the transmission frequency of the reader → frequency ratio 1:1) ii) Load modulation (the reader’s field is influenced by the transponder → frequency ratio 1:1) iii) The use of sub harmonics (1/n fold) and the generation of harmonic waves (n-fold) in the transponder.

2.2.4.2 Basic Physics of RFID In the previous sections we discussed the basic concepts of the RFID technology. Now we must highlight the basics of the physics behind various RFID components, especially RFID readers and tags. Radio waves are the main component used in the functioning of an RFID system. Data transfer in RFID is done mainly through magnetic principles. 1) Magnetic Field Strength When a current passes through a circuit, a magnetic field is created. The magnitude of the magnetic field created is denoted by H as shown in following equation:

∑ I = ∮H.ds

………. (1)

I= Current through the circuit (ampere). H= Magnetic field strength (ampere/meter). The closed integral of the magnetic field strength along a closed curve is equal to the sum of current strengths with the curve.

18

Figure (2.4) Current (I) flowing through a straight conductor creating a magnetic field with strength H

The radius of the magnetic field is r. Then the magnetic field strength H is equal to:

𝐻𝐻 =

1

…………... (2)

2𝛱𝛱𝛱𝛱

2) Magnetic Flux Magnetic flux is denoted by 𝛷𝛷, and it is defined as the total number

of magnetic field lines passing through a current-carrying coil. It can be written mathematically as:

𝛷𝛷 = B.A

……………… (3) 19

Where: B= magnetic flux density, which is the magnetic flux per unit area of the section perpendicular to the direction of flux.

3) Interrogation Zone of Readers The interrogation zone of an RFID reader refers to the area in which the reader has the ability to pick up the signals of an RFID tag. Up to this section all the calculations were made on assumption that the tag is parallel to the antenna of the reader. This section shows the effects of titling the angle of the transponder antenna with respect to the central axis of the coil. Consider that VO is the voltage induced on the coil and is perpendicular to the magnetic field. Then the voltage when the coil is at an angle 𝜽𝜽 will be VO𝜽𝜽, which is given by:

VO𝜽𝜽 = VO .cos (𝜽𝜽)

…………. (4)

Where: 𝜽𝜽=90o, cos 90o=0 and therefore VO𝜽𝜽=0.

The antenna radiation patterns with the angle of the tag at

𝜽𝜽=0 and 𝜽𝜽=90o is shown in figure (2.5).

20

Figure (2.5) Reader range for different tag positions

2.3 RFID Operation This section investigates the modes of communication between a tag and the reader, the types of modulation used in RFID data transfer, the types of encoding, and the different ways of sending and receiving information.

2.3.1 Communication modes in RFID There are mainly three ways in which a tag reader can communicate. These are the full duplex, half duplex and sequential modes of communication.

21

Full duplex communication: In this mode data transfer between the reader and the tag occurs at virtually the same time. The RFID reader provides an uninterrupted power supply to the tag. The data transfer from the tag to the reader can either be sub-harmonic or enharmonic. Sub-harmonic data transmission occurs when the tag transfers data at a fraction of the frequency of the reader frequency. See figure (2.6).

Figure (2.6) Full duplex system Half duplex communication: In this mode either the reader or the tag transfers data at a given time. The power supply from the reader is uninterrupted as in the case of full duplex systems. The transmission is such that the reader transmits a packet of data first, and then during the interval between the end of the first packet of data and the start of the second packet of data, the tag responds to the first packet of data.

22

Figure (2.7) Half duplex operation. (Note the data transmission interval between the tag and the reader)

Sequential mode of communication: This is a mode of communication in which the power supply from the reader to the tag is pulsed or interrupted. The reader transmits data to the tag at the same time as power is transmitted to the tag. The tag has circuitry with a capacitor, which retains the power from the reader and uses it for data transmission once the reader has transmitted its data.

23

Figure (2.8) Sequential mode of communication

2.3.2 Types of modulation used in RFID The antenna in an RFID system radiates energy into the surrounding area in the form of radio waves. A data signal can be modulated by influencing the amplitude, frequency or phase of the data signal. Three types of modulation are used in RFID systems, which are: Amplitude shift keying (ASK), Phase shift keying (PSK), and Frequency shift keying (FSK).

2.3.3 Coupling mechanisms in RFID The coupling mechanism used by an RFID tag determines the way a circuit on the tag and the RFID reader influence each other to send and 24

receive information. Based on the read range created between the reader and the tag, there are three types of coupling: 1) Close coupling: the read range between the tag and the reader is within 10 mm. Examples are capacitive and magnetic coupling. 2) Vicinity coupling: the read range is between 10 mm and 1000 mm. This type is also called remote coupling. Inductive coupling is an example of vicinity coupling. 3) Long-range coupling: offers the highest range of all the coupling methods. The range exceeds 1000 mm. Backscatter coupling is an example on this type of coupling.

2.3.4 Collision and anti-collision procedures in RFID This section can be explained best by an example of possible scenario in an RFID application used in this project; which is the automatic students’ attendance system. Suppose a reader is placed in a classroom to register attendance of students entering a class. If a group of students pass the reader with their student cards (tags) at the same time, the RFID reader may be confused as to which card to read first. It would be even worse if one of the tags were not read. This undesirable situation is referred to as collision in RFID. The seriousness of this problem is such that anti-collision procedures have been put in place to counter and thereby reduce collision. This section examines some of these procedures and explains how collision is minimized in an RFID system. There are two types of anti-collision procedures in use: ·

Reader anti-collision algorithm

·

Tag anti-collision algorithm. 25

2.3.4.1 Reader anti-collision algorithm To counter collision, the reader has to communicate with all tags that come within the read range within a short space of time. This type of communication

is

referred

to

as

multi-access.

Multi-access

is

diagrammatically represented in Figure (2.9). Space Division Multiple Access (SDMA), Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) are some multi-access procedures that are used in RFID systems.

Figure (2.9) Multi-access procedures in RFID systems

26

2.3.4.2 Tag anti-collision algorithm Tag, like the reader, also has anti-collision algorithms which prevent collisions with other tags and allow effective communication with the reader. There are many variations of tag anti-collision procedures are in use, such as ALOHA procedure and Tree linking procedure.

2.4 Database This section describes the different kinds of software used in this research, and the usefulness behind using these kinds. All the kinds are important and necessary to provide a fully integrated work.

2.4.1 Database Management Management of the database is one of the most important requirements in the research because there are tags where the reader receives the information from, and the users who want a suitable and understandable form of database, we want to store special information about those users and tags, and hence monitoring and management is very essential matter. There are many types of database systems such as: Ø SQL (works with C# and ASP.net) Ø MySQL (works with PHP)

a) Microsoft SQL Server 2008 Microsoft

SQL

Server is

a relational

database

management

system developed by Microsoft. As a database, it is a software product whose primary function is to store and retrieve data as requested by other software applications, those on the same computer or those running on another computer across a network (including the Internet). There are at 27

least a dozen different editions of Microsoft SQL Server aimed at different audiences and for workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users. In our project, the SQL server will help us to make the suitable tables for the automatic attendance process and is useful for the programmer because of its understandable interface as shown in figure (2.10).

Figure (2.10) Microsoft SQL server 2008 interface b) Microsoft Visual Studio 2010 Microsoft Visual Studio is an integrated development programs for Microsoft windows, as well as web sites, web applications and web services. Visual studio uses Microsoft software development platforms such as Windows API, Windows Forms, Windows Presentations Foundation, Windows Store and Windows Silverlight. 28

Microsoft visual studio will make use of the tables created by the SQL server, i.e. it will be the interface between the SQL server and the user; it can also provide wide range of tools that make easy and understandable interface to the user. Figure (2.11) provides an outlook on the start page of the Microsoft visual studio 2010.

Figure (2.11) Start page of the Microsoft Visual Studio 2010

29

3.1 Introduction In this chapter we will discuss all considerations of our project such as system architecture, system software and hardware, and the most important modules of the system will also be explained in this chapter, such as necessary tables and ER diagrams for managing and controlling students’ presence or absence, collecting data and passing them to server, etc.

3.2 Proposed System Architecture System structure consists of the following parts (see figure (3.1)): · RFID reader, tag and desktop reader(issuing card) · System server(PC) · Message system software · Mobile for receiving message

· Laptop for receiving attendance reports. We mentioned earlier that the reader consists of antenna, and the tag consists of microchip (store information related to student such as student’s ID) and embedded antenna that allows tag to communicate with reader, while the computer system is connected directly to the reader by using specific wires or cables, all PCs in the system are connected to one server which contains mainly the database (SQL server 2008) that contains all information about the system sorted in tables form. Lecturer can access to the system by using GUI (designed by using Microsoft Visual studio 2010), so it makes access to the database easier, besides, it makes the system more flexible and makes the interaction between the user and the computer system more efficient.

30

When accessing system the lecturer should fill all the necessary information such as name and password to access the system (this makes the system more secure because it will not allow non-authorized people to enter the system). At this time reader is running, and begins to broadcast waves (Radio Waves), so the antenna in tags will receive these waves and responds to the reader by sending the information (ID) to the reader and then the reader will process these information by converting them to digital signals, and then resend them to the computer system. Here lecturer will see the displayed tables of students, and then the system will send these data to the database where the admin can access.

31

Figure (3.1) Automatic attendance system architecture

32

3.3 System Hardware 3.3.1 System stages There are several stages should be followed in all systems, which are described below; and all of them represent” automatic student attendance system “stages. I)

Input: the input stage is represented by the RFID reader device that is accessed by the GUI (Graphical User Interface), when the reader is on, it reads data from the students’ tags, and retransmits these data to the computer (lecturer PC).

II) Processing: this point is the second stage in the system; here, all data (that the computer received from reader) are processed and stored in the database. Processing is represented in terms of computing the overall daily attendance or computing the presence or absence of all students in the course, processing also includes admin’s access to the database to add, remove, or update students or lecturers in the database. III) Output: In this stage, the information is displayed on the lecturer’s computer by using GUI; lecturer can get processed data from the server such as daily or monthly attendance. The general stages of the system are shown in figure (3.2).

33

Figure (3.2) Automatic attendance system components.

3.3.2 RFID reader (SR-3411) Specifications SR-3411 is one of 2.45GHz RFID series, with features such as contactless, free from environment impact, long reading distance, excellent anti-collision etc., it includes RF Module, Central control unit, Input/output ports, Ethernet module, Serial communication interface, Non-volatile memory modules and working status indication module etc., FRID reader specifications are shown in figure (3.3).

34

Figure (3.3) RFID reader specification

35

3.3 System Software System software acts as the core of the system, because user or admin can communicate with the system by using forms and database. Communications with the user have been implemented by using Microsoft visual studio 2010 (C# programming language), and the database “which stores all the information and attendance “has been designed with SQL server Management studio”. The system architecture is a 3-tier system as explained in figure (3.4), which is the most widely used architecture because modifications are easier than 1-tier or 2-tiers system architectures, this architecture includes:

· Database (Data) tier: at this tier, only database resides. Database along with its query processing languages sits in layer 3of 3-tier architecture, it also contains all relations and their constraints, here the tables have been created such as monthly table, user table, etc.

· Application (Middle) tier: at this tier the application server and the program, which access database, reside. For user, this tier works as abstracter view of database. Here users are unaware of any existence of database. The user of this tier is actually the user of the database.

· User (Presentation) tier: lecturer and admin will sit on this tier here; they don’t know anything about the database or how it has been created. They can deal with the overall system by GUI such as buttons or tabs. By these GUIs components, the user can add, delete, update and display all the information about the students.

36

Figure (3.4) 3-Tier system architecture

From system software view, our system consists of three mainly classes Log in Class, Admin class and the Lecturer Class. From login class admin and lecturer have the right to enter the system and display tables or set the control of the system, log in flowchart (for admin and lecturer) explained in figures (3.5 and 3.6).

37

Figure (3.5) Admin Log in flowchart 38

Figure (3.6) Lecturer Log in flowchart 39

From the admin form, admin can manage the entire system through adding, deleting and updating students’ or lecturers’ information, as we will explain it in section (3.4). Admin class explained in figure (3.7), which represents the relationship among tables in this form.

Figure (3.7) Admin class Entity Relationship Diagram 40

While the lecturer can enter to the system and display daily attendance table for knowing who is absent and who is present in the lecture, he also can display the monthly attendance table because he has the right to know the attendance of the previous lectures of his students. The lecturer class has been shown in figure (3.8).

Figure (3.8) Lecturer Entity Relationship Diagram

41

3.4 System Function System function mainly states attendance management module, which is the core function of school automation system attendance, so the system function

include information

management

module

and attendance

management module which is managed by system’s admin. 3.4.1 Information management module In the school, RFID tags will be issued to every student for the implementation of “one person, one card system”. Student’s tag ID can be bound to student information via database. It includes three parts: 1) Adding information: Issuing new RFID tag for newly enrolled students or the students who lost their card. Authorizing the tag and forming the information of tag corresponding to their RFID tag. 2) Deleting information: It needs to scrap and delete relevant tag information, in the case of graduation and student transition to a new school etc. 3) Modifying information: It needs to re-manage and modify corresponding student’s information, in the case of class mobilization and enter higher grade. See figure (3.9).

42

Figure (3.9) Information management module 43

3.4.2 Attendance management module This part detect whether student are in the class or not, by reading student’s tag or not; also when student absence cross the determined threshold it sent message to his/her parent. So, it includes three parts: 1) ID acquiring: Collect student tag ID automatically by RFID reader, so as to obtain the time of attending and leaving in real-time. 2) Data transmission and processing: Upload tag ID information to system server. By comparing database and identifying students’ information, college staff can know information of students’ name, corresponding class, parents’ name; telephone number etc. 3) Message Sending: Both teachers and parents are not aware of specific situation in the real-time, which will bring great difficulties for student safety management and child education, therefore, school authority and parents need to know the following information: · Student attendance status (whether students have timely arrived or left lecture, whether arrived late or left early the lecture, etc.) · Student’s performance at school (learning attitude, behavior in class etc.) · Student safety status (whether students have safely arrived or left the school etc.) So all these difficulties will be solved by sending the message to student’s parent; as a result, our system has two types of messages; first type will be send automatically from the system to student’s parent when his/her absence crosses the threshold determined by school or college, to alert them about this. The other type is in the “optional request” tab at admin form, this message will be sent to student’s parent for other things such as if 44

their child doesn’t come to collage or for accident cases etc., this module is explained in figure (3.10).

Figure (3.10) Attendance management module

45

4.1 Introduction In the first section of this chapter, we shall discuss results and output screens that will be displayed to users (admin or lecturers) when they use the available event and options in output screens. In the second section of this chapter, it’s including system code that we wrote to build our system software. We shall discuss future work and conclusion that are related to automatic attendance system using RFID technology in chapter five.

4.2 Output Screens When the system is fully connected and turned on, both admin and lecturer can login to the system by entering their usernames and passwords (see figure 4.1). Admin will be able to see the timely attendance of the last lecture monthly tables for each subject, and control students and users (lecturers) in the system. Lecturer will use the system to take the automated attendance of the students in the lecture by using the specified buttons in the form. In the following sub-sections we shall discuss the buttons exist in each form (Login, Admin, and Lecturer). 4.2.1 Admin Output Screen I. Timely Attendance: It is the first tab control in the admin output screen, used to display the daily attendance of each lecture to the admin, as shown in figure (4.2). In monthly attendance tab control of the screen we will see the following buttons: · Show Table: This button is used to display the daily table for each lecture according the selected subject. ·

Print Table: This button is used to save the displayed daily table on any specific location on the computer as a text file.

46

(a)

47

(b) Figure (4.1) Login windows: (a) admin (b) lecturer.

48

Figure (4.2) Admin timely attendance Screen II.

Monthly Attendance: It is the second tab control in the admin output screen, used to display the monthly attendance of the entire course (15 lectures in the course) to the admin, as shown in figure (4.3). In monthly attendance tab control of the screen we will see the following buttons: · Show table: This button is used to display the monthly table for each lecture according the selected subject.

49

· Print Table: This button is used to save the displayed monthly table on any specific location on the computer as a text file. ·

New course: When starting new course, this button allows the system to add attendance to new 15 lectures.

Figure (4.3) Admin monthly attendance Screen

50

III.

Optional request By optional request tab control, admin has the right to control and

manage the entire system by displaying, adding, deleting, and updating information in tables or send optional messages; all these operations are done by the following buttons: 1) Display: This button is used for displaying tables, as shown in figure (4.4). 2) Add: This button is used for adding students or lecturers to the database tables, admin should enter name, ID and tag in the special textboxes and then press the “add button”. See figure (4.5). 3) Delete: This button is used for removing students or lecturers from database tables, just select the checkbox of the desired row then press the “delete” button. See figure (4.6). 4) Send message: This button is used for sending messages to students’ parents; all the admin needs to do is to write the message in the message textbox and select the checkbox of the student from displayed table and push “send button”.

51

Figure (4.4) Display button

52

Figure (4.5) Add student button

53

Figure (4.6) Delete student button

4.2.2 Lecturer window In this form, the lecturer has the right only for displaying tables to take the attendance of the students. There is timely and monthly tables displayed to lecturer on demand. This form has the following buttons: I.

Start lecture and End lecture: These two buttons are used sequentially at the start and end of the lecture to complete the attendance process. Figure (4.7) shows an example for this process.

II.

Monthly attendance: This button displays the monthly table just like the one displayed for the admin.

54

III.

Print Data: This button is used to save the displayed lecture attendance table on any specific location on the computer as a text file.

IV.

Exit: To exit from the entire program, lecturer can use this button.

Figure (4.7) Start and End lecture buttons screen

55

Figure (4.8) Lecturer monthly attendance screen

56

4.2.3 Help window This form is heuristic form, which helps the user who uses the system for the first time on how to use it. This form explains in figure (4.9).

Figure (4.9) Help window

4.3 System Code As we mentioned earily, we wrote the code and indstructions of the project by using microsoft visual stodio 2010. The entier code of system explained in the appendix A.

57

5.1 Conclusion At the end of our work, we came with the final output of the automatic system that makes sure of taking the full attendance of the students in the classroom (with the help of RFID reader), and saves this attendance to the database where it can be visible to the person who is responsible to the attendance process in the department. We also make sure that the system is secure from unauthorized access by setting different passwords to every user (lecturer).

5.2 Future Work • Our system has been designed only for one classroom, but in future it could be expanded to be included in a LAN (local Area Network) by putting a copy of the whole system in every classroom and connect them to the server; this can be done by using the IP address of every RFID reader. • We can connect the system to a specific server; where a copy of timely and monthly attendance tables will be sent to the server, which contains a storage space for the database of the “Registration Division”. • Dynamic control will make the entire system run in a smooth and flexible manner.

58

References 1. AIS and Data Capture Technology. 2011/11/28. 2. ATTENDANCE SYSTEM BASED ON AUTOMATIC DOOR UNIT RADIO FREQUENCY IDENTIFICATION (RFID). s.l. : International Journal of Management, IT and Engineering, 2012. 3. Face recognition Technology. 9/3/2012. 4. Global Information Technology . 2008. 5. Butle, Jeremy G. A Histoy of Infomation Technology and Systems. university of Aizona : s.n., 2/8/2012. 6. Ching Hisang, Chang. Smart Classroom Roll Caller System with IOT Architecture. Tainan, Taiwan : s.n., 2011. 7. Craig, Oberfild. Barcode Technology . US Patental : s.n., 25/2/2014. 8. Finkenzeller, Klaus. HandBook, Second Edition. 2006. 9. Frank, kevin and Robines. Information Technology. 1986. 10. Kuriakose, Rengith Baby. AUTOMATIC STUDENT ATTENDANCE REGISTRATION. Central University of Technology, Free State : s.n., 09-03-2010. 11. Optical Character recognition, how it ork. Nicomsoft.com. [Online] 6 16, 2013. 12. O. Shoewu, Ph.D.1,2* and O.A. Idowu, B.Sc. 1. Development of Attendance Management System using Biometrics. 1Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria. : s.n., 2012.

59

Appendix (A) Log in Code

Admin Form Code

A

B

C

D

#endregion

E

F

G

Lecturer Form Code

H

I

J

K

L

‫اﻟﺨﻼﺻﺔ اﻟﻌﺮﺑﯿﺔ‬ ‫ﻧﻈﺎم اﻟﺘﻌﺮف اﻻﻟﻲ ﺑﺎﺳﺘﺨﺪام ﺗﻘﻨﯿﮫ اﻟﺘﻤﯿﯿﺰ ﺑﻤﻮﺟﺎت اﻟﺮادﯾﻮ‬

‫اﻟﻄﺮﯾﻘﺔ اﻟﺘﻘﻠﯿﺪﯾﺔ ﻟﺘﺴﺠﯿﻞ اﻟﺤﻀﻮر ﺑﺎﻟﻤﻨﺎداة ﺑﺎﻷﺳﻤﺎء أو وﺿﻊ ﻋﻼﻣﮫ أو ﺗﻮﻗﯿﻊ ھﻲ ﻋﻤﻠﯿﺔ‬ ‫ﺑﻄﯿﺌﺔ ﺟﺪا وﻏﯿﺮ آﻣﻨﺔ‪ .‬ﺗﺤﺴﯿﻦ اﻹدارة وأﻣﻦ اﻟﻄﻼب وﻛﺬﻟﻚ اﻟﺘﺄﻛﺪ ﻣﻦ وﺟﻮدھﻢ داﺧﻞ اﻟﻘﺎﻋﺎت‬ ‫اﻟﺪراﺳﯿﺔ ھﻲ ﻣﺴﺄﻟﮫ ﻣﮭﻤﺔ ﺑﺎﻟﻨﺴﺒﮫ ﻟﻶﺑﺎء واﻟﻤﻌﻠﻤﯿﻦ واﻟﻤﺪرﺳﯿﻦ‪ ,‬ﻟﺬﻟﻚ ﻧﺎﻗﺸﻨﺎ ﻓﻲ ھﺬا اﻟﻤﺸﺮوع ﻧﻈﺎم‬ ‫ﻟﺠﻌﻞ ﻋﻤﻠﯿﺔ ﺗﺴﺠﯿﻞ اﻟﺤﻀﻮر ﺗﺘﻢ إﻟﻜﺘﺮوﻧﯿﺎ ﺑﺈﺳﺘﺨﺪام ﻗﺎرئ ‪ ,RFID‬اﻟﺨﺎدم اﻹﻓﺘﺮاﺿﻲ‪ ,‬وﻧﻈﺎم ﻗﺎﻋﺪة‬ ‫اﻟﺒﯿﺎﻧﺎت‪.‬‬ ‫ﻛﺎن اﻟﻌﻤﻞ اﻷﺳﺎﺳﻲ ﻟﻠﻨﻈﺎم ﻓﻲ ھﺬا اﻟﻤﺸﺮوع ﻋﻠﻰ اﻟﻨﺤﻮ اﻟﺘﺎﻟﻲ‪ :‬اﻟﻄﻼب اﻟﺬﯾﻦ ﯾﻨﺘﻤﻮن إﻟﻰ‬ ‫ﺻﻒ ﻣﻌﯿﻦ ﯾﻤﺘﻠﻜﻮن ﺑﯿﺎﻧﺎﺗﮭﻢ اﻟﺸﺨﺼﯿﺔ )إﺳﻢ اﻟﻄﺎﻟﺐ‪ ,‬رﻗﻢ اﻟﻄﺎﻟﺐ‪ ,‬وﻏﯿﺮھﺎ(‪ ,‬ﯾﺘﻢ إدﺧﺎﻟﮭﺎ إﻟﻰ ﻗﺎﻋﺪة‬ ‫اﻟﺒﯿﺎﻧﺎت ﺑﻮﻗﺖ اﻟﺘﺴﺠﯿﻞ‪ .‬ﺑﻄﺎﻗﺎت اﻟﻄﻼب اﻟﺘﻲ ﺗﺤﺘﻮي ﻋﻠﻰ اﻟﺮﻗﻢ اﻟﺘﺴﻠﺴﻠﻲ‪ ،‬ﻣﻊ اﻹﺷﺎرة إﻟﻰ اﻟﺒﯿﺎﻧﺎت‬ ‫اﻟﻮاردة ﻓﻲ ﺟﺪول ﻗﺎﻋﺪة اﻟﺒﯿﺎﻧﺎت‪ ،‬ﯾﺘﻢ إﻋﻄﺎﺋﮭﺎ ﻟﻠﻄﻼب ﺑﻌﺪ اﻟﺘﺴﺠﯿﻞ‪.‬ﻋﻨﺪﻣﺎ ﺗﺒﺪأ اﻟﻤﺤﺎﺿﺮة‪،‬‬ ‫ﻓﺈن ﻗﺎرئ ‪ RFID‬ﺳﯿﻘﻮم ﺑﻘﺮاءة اﻷرﻗﺎم اﻟﺘﺴﻠﺴﻠﯿﮫ اﻟﻤﻮﺟﻮده ﻋﻠﻰ ﺑﻄﺎﻗﺔ ﻛﻞ طﺎﻟﺐ وﯾﺮﺳﻞ ﻣﻌﻠﻮﻣﺎت‬ ‫ﻋﻦ ﻛﻞ اﻟﻄﻼب اﻟﻤﻮﺟﻮدﯾﻦ داﺧﻞ اﻟﻘﺎﻋﮫ اﻟﺪراﺳﯿﮫ إﻟﻰ ﻗﺎﻋﺪة اﻟﺒﯿﺎﻧﺎت‪ ,‬واﻟﺘﻲ ﺑﺪورھﺎ ﺳﺘﻘﻮم ﺑﺨﺰن‬ ‫ھﺬه اﻟﻤﻌﻠﻮﻣﺎت؛ ﺑﺠﺪول إﻟﻜﺘﺮوﻧﻲ ﻣﺸﺎﺑﮫ ﻟﺠﺪول ﺗﺴﺠﯿﻞ اﻟﺤﻀﻮر اﻟﺘﻘﻠﯿﺪي؛ ﺑﺎﻟﺨﺎدم اﻷﻓﺘﺮاﺿﻲ‪,‬‬ ‫ﻋﻨﺪھﺎ ﺳﯿﻘﻮم اﻟﻨﻈﺎم ﺑﺈرﺳﺎل ﺗﻘﺮﯾﺮ أو ﻧﺴﺨﺔ ﻣﻦ ھﺬا اﻟﺠﺪول إﻟﻰ اﻟﻤﺤﺎﺿﺮ ﻟﯿﻌﺮف ﻣﻦ اﻟﺤﺎﺿﺮ وﻣﻦ‬ ‫اﻟﻐﺎﺋﺐ‪.‬‬

‫ﺟﻤﮭﻮرﯾﺔ اﻟﻌﺮاق‬ ‫وزارة اﻟﺘﻌﻠﯿﻢ اﻟﻌﺎﻟﻲ واﻟﺒﺤﺚ اﻟﻌﻠﻤﻲ‬ ‫اﻟﺠﺎﻣﻌﮫ اﻟﺘﻜﻨﻮﻟﻮﺟﯿﮫ‬ ‫ھﻨﺪﺳﺔ اﻟﺤﺎﺳﻮب‬

‫ﻧﻈﺎم اﻟﺘﻌﺮف اﻻﻟﻲ ﺑﺎﺳﺘﺨﺪام ﺗﻘﻨﯿﮫ اﻟﺘﻤﯿﯿﺰ ﺑﻤﻮﺟﺎت اﻟﺮادﯾﻮ‬ ‫ﻣﺸﺮوع‬ ‫ﻣﻘﺪم إﻟﻰ ﻗﺴﻢ ھﻨﺪﺳﺔ اﻟﺤﺎﺳﻮب ﻓﻲ اﻟﺠﺎﻣﻌﮫ اﻟﺘﻜﻨﻮﻟﻮﺟﯿﮫ ﻛﺠﺰء ﻣﻦ ﻣﺘﻄﻠﺒﺎت‬ ‫ﻧﯿﻞ درﺟﺔ اﻟﺒﻜﺎﻟﻮرﯾﻮس ﻓﻲ ﻋﻠﻮم ھﻨﺪﺳﺔ اﻟﺤﺎﺳﻮب‬

‫ﻣﻦ ﻗﺒﻞ‬ ‫أﻓﺮاح ﺳﻠﻤﺎن داود و ﻧﻮر ﻛﺎظﻢ ھﺎدي‬

‫ﺑﺈﺷﺮاف‬ ‫أ‪.‬م‪.‬د ﻣﺤﻤﺪ ﻧﺠﻢ ﻋﺒﺪﷲ‬

‫‪2015‬‬