Professional Documents
Culture Documents
RFID Presence Monitoring System As An Input To Measure The Workload of Employee
RFID Presence Monitoring System As An Input To Measure The Workload of Employee
RFID Presence Monitoring System As An Input To Measure The Workload of Employee
Abstract—In performing an assignment, every employee is In 2011, Pu et al did research on the use of RSSI in
expected to complete the work to some level. However, the misuse applying indoor localization technique. The used method on
of working hours happens regularly in their working the research can be implemented in various types of Wireless
environment, which mean they shorten their workload and Sensor Network. The research stated that to increase the
working hour. This problem led to the need to build a system as
accuracy of the built system, required further research on
an alternative in monitoring the presence of the employee in their
working environment. The type of the work that requires environmental characterization and the use of RSSI [3].
monitoring due to its presence in the location are customer Mahiddin et al. in 2012 used trilateration method to determine
service, call center, cashier, etc. Monitoring the presence of the one location in a room. The research uses Wi-Fi signal
employee can be done using tools such as RFID. Trilateration strength with IEEE 802.11g Networking standardization. The
method was used to determine object location using signal value research was done by way of user using Wi-Fi Analyzer
received of an object from multiple transmitters. The signal value application on smartphone to obtain the percentage of signal
can be then converted to a distance value between the object and strength then convert it to distance value between user with
the transmitters also can be formed three circles with the radius each access point. User location can be determined using
of each circle is the distance value between the object with the
trilateration method. The research is only an early stage to be
transmitters. The result from our system is the employee’s
location on building virtual maps. System will determine whether further developed by considering a transmission barrier such
the employee location is in their working environment or not then as a wall [6]. Firaldi in 2014 used trilateration method and
it will produce daily reports on the employee working hours. In assisted by fuzzy technique to analyze student attendance
the end, system will sum up the workload obtained from the patterns at informatics engineering department of Maritime
results of its employee presence monitoring. University of Raja Ali Haji. The research used distance
determination method proposed in 2012 by Mahiddin et al.
Keywords— Employee Workload, Presence Monitoring Then the research determines the pattern of student attendance
System, RFID, Trilateration. using fuzzy technique to see if cheating absenteeism to the
student is existed. The result of the research showed that the
I. INTRODUCTION system can recognize the pattern of student attendance in a
In performing a task, employee is expected to complete class [7].
the work to some level. If the individual limitation impedes
the expected results of the work, then there has been a gap Monitoring on employee presence is very important since
between the level of individual ability expected with the level it has impacts on company performance [2] [9-10]. However,
of capacity possessed. The gap can lead to performance failure the misuse of work hours is often occurred. Therefore, we
[1][2]. In general, workload measurement can be done need to develop a method as an alternative to monitor
manually and requires on-field supervisor [8]. In the area of employee location as an input to calculate the workload that
wireless sensor network, there are two basic methods, they are will be useful for the organization.
passive and active transmission [3-5]. RFID can be used to
identify a person or an object using radio transmission II. METHODOLOGY
frequency. RFID uses radio frequency to read information
from a small device called tag or transponder (Transmitter + In order to know the employee position and their
Responder). RFID is place on an object or a person so that it activities, the employee have to have an active RFID tag
can be identified, tracked and arranged automatically. The registered in the system. Admin will have the responsibility to
advantages of RFID can be explored by using it to monitor the give the tag and to monitor every employee registered in the
presence of employee due to its job location such as customer system. After receiving the tag, employee will do their
service, call center and cashier. assigned work. The employee tags will send signal to the
nearest reader. After receiving the signal, each reader will
send the data of signal strength, timestamp and ID tag values
to the server. Afterwards, server will check whether the • After all the parameters are met then can be measured
number of readers that send the data is not less than three for distance value using Log-distance path loss. Log-
each tag. If the reader is less than three, then we can indicate distance path loss [6] can be obtained using equation
that the employee is not working or is not available in their (3).
work space.
After the server checks, then it will estimate the location (3)
of the employee from the available data using trilateration
algorithm. After the x and y values of tag were obtained, Where Xσ is the value of fade margin. The values of fade
server will determine whether the tag position is within the margin differ in each environment and must be calculated
workspace coverage area of the tag recorded in database. empirically for each environment. In business district, the
Server will have processed the data to be displayed in 2D value of fade margin is around 10 dBm [6].
Virtual Maps, this data is regarding employee’s position. The
information about employee activities will be presented in
table form. After working hour ends, server will create report
on employee activities throughout business hours and save it
in the database for further evaluation done by user. General
architecture that describes the proposed method for the
research is shown in Fig 1.
(8)
• After equation (5) solved then obtained point p (x, y).
Where,
C. Summary of the Working Hour
At this stage, a report will be made based on the N’ = Monitoring values to be done
performance of employees and the workload of every S = Desired accuracy level, Using 5%
employee will also be estimated for one week. The steps in p = Percentage of productive time
this stage are as follows: k = Trust level
• The system will calculate the level of employee Trust level 68% has value of k = 1
productivity gained within one business day. The Trust level 95% has value of k = 2
calculation of productivity level can be done using Trust level 99% has value of k = 3
equation (6).
• Once all parameters are met, the system will calculate
(6) the employee workload. Workload is said to be normal
and there is no need for adjustment if the workload
value is in the range of 70% -100%. Workload
• System will test whether the collected data has nothing calculation can be done using equation (9).
differences and is akin. The data said to be akin is data
derived from the same system (located between the (9)
control limits) and those that dissimilar derived beyond
control limits. Extreme data is data which too large or Where,
too small and far from the average trends. Extreme data RF = Rating Factor
isn’t included in the next calculation. Testing data can ALL = Allowance
be performed using equation (7).