Professional Documents
Culture Documents
RFiding
RFiding
EMBEDDED SYSTEM
#1 V.Sruthi, Student, Pre final Year, ECE department, K. Ramakrishnan College of Engineering, Contact: 9787479874 1shwethavardhan@gmail.com
Abstract
Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags. This RF tags can also be done using face recognition for knowing whether the exact target is present or not.
I. INTRODUCTION
In the prevailing scenario there is no time to take attendance. Hence we started using RF tags which has bar codes to take automatic attendance by reading those barcodes. But the disadvantage here was that the readers read only the barcode but not identifies the person hence proxy attendance can be given. To overcome this demerit here we use face recognition along with these tags to find out whether the face and barcode matches with each other. This avoids the mishaps of the earlier technology.
and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal.
DIAGRAM
OF
This device is fixed and do not move. i.e. Only the tag should go near it so as to read it. In other words, they do not generate Radio frequency waves within the region but only in the reader it is present.
This device is mobile and move. i.e. they generate waves within the specified range.
V. FACE RECOGNITION
The identification of a person by their facial image can be done in a number of different ways such as by capturing an image of the face in the visible spectrum using an
optical camera or by using the infrared patterns of facial heat emission. Facial recognition in visible light typically model key features from the central portion of a facial image. Using a wide assortment of cameras, the visible light systems extract features from the captured image(s) that do not change over time while avoiding superficial features such as facial expressions or hair. Major benefits of facial recognition are that it is nonintrusive, hands-free, continuous and accepted by most users. Facial recognition uses distinctive facial features, including upper outlines of eye sockets, areas around cheekbones, the sides of the mouth and the location of the nose and eyes. Most technologies avoid areas of the face near the hairline so that hairstyle changes won't affect recognition.
DIAGRAM
OF
FACE
Here there is a sensor to detect the presence of the person. Then there is a pre-processor in which the face and corresponding barcodes are already present.
This device is used to recognize the face and send report to the server end for comparing with the barcode read already.
Face recognition is thus done and compared with the authenticated person for confirmation.
Far Field: Far field uses method similar to radar, backscatter reflection by coupling
The distinction between the RFID systems with far fields to the near fields is that the near fields use LF (lower frequency) and HF (higher frequency) bands [4,5]. While RFID systems with far fields usually use longer read range UHF and microwave [4].
IX. RESULTS
Here we are saying that instead of we can use face recognition along with rf id to avoid proxy attendance in business institutes.
X. FUTURE ENHANCEMENTS
We can introduce automatic attendance system by entering into the area itself instead of reading the barcode separately. It will save time.
XI. CONCLUSION
Hence by using this rf tag with face recognition we can avoid the proxy attendance and hence we can have the proof whether the person is present or not since it is stored in the data base.
XII. REFERENCES
1. J. Bohn, Prototypical implementation of location-aware services based on a middleware architecture for superdistributed RFID tag infrastructures, Pers Ubiquit omputing, (2008) Journal 12:155166. 2. J. Schwieren1, G. Vossen, A Design and Development Methodology for Mobile RFID Applications based on the ID-Services Middleware Architecture, IEEE Computer Society, (2009), Tenth International
Conference on Mobile Data Management: Systems, Service and Middleware. 3. Application Notes, Introduction to RFID Technology CAENRFID: The Art of Identification (2008). 4. Y. Meiller & S. Bureau, Logistics Projects: How to Assess the Right System? The Case of RFID Solutions in Healthcare, Americas Conference on Information Systems (AMCIS) 2009 Proceedings, Association for Information Systems Year 2009. 5. R. Parks, W. Yao & C. H. Chu, RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector, Americas Conference on Information Systems (AMCIS) 2009 Proceedings, Association for Information Systems Year 2009.
XIII. WEBSITES
1. www.biometrics.gov/Documents/fac