Professional Documents
Culture Documents
The Effect of Usage of Rfid To Curb Truancy by Katibi Ibrahim
The Effect of Usage of Rfid To Curb Truancy by Katibi Ibrahim
STUDENTS IN NIGERIA
By
AUGUST 2012
1
EFFECT OF USAGE OF RFID TO CURB TRUANCY AMONG
STUDENTS IN NIGERIA
BY
AUGUST, 2012
2
DECLARATION
I, IBRAHIM ADESHINA KATIBI, humbly declare that this work entitled EFFECT OF
is as result of my research effort carried out in the school of science and technology, National
I further wish to declare that to the best of my knowledge and belief, it contains no material
previously published or written by another person nor material which to a substantial extent
has been accepted for the award of any other degree or diploma of any university or institute
of higher learning, except where due acknowledgement has been made in the text.
------------------------------------------
`` (Signature/name/date) ``
3
CERTIFICATION
This is to certify that this research project entitled EFFECT OF USAGE OF RFID TO
ADESHINA KATIBI in the School of Science and Technology, national open University of
Nigeria, Lagos for the award of Bachelor of Science Degree in Communication Technology.
4
Dean School of science and Technology
Prof Kehinde Obidairo
ACKNOWLEDGEMENT
In the name of Allah (S.W.T,) the Most Gracious, the Ever Merciful. Praise is to Allah, Lord
of the Universe and Peace and Prayers be upon His final Prophet and Messenger Muhammad
(S.A.W.).
I am forever indebted to my parents Alhaji Shehu Ahmad and Hajia Aminat A. Katibi of the
blessed memory, may Allah (swt) grant them Aljanatul Firdausi, who through the mercy of
God has brought me to life and light and the privilege given me to face all these challenges in
my life. I say a big thank you.
My inestimable gratitude also goes to my supervisor, Adiat Odumbaku (Miss) for the patient
and pains taken in reading through the project work
Finally, special thanks goes to my beloved family who had given me moral spiritual support,
Thank you.
Also, I greatly appreciate the enormous contribution of those who in various ways or the
other contributed to the success of this work
Also worthy of mention are Barrister Mashood Shehu, my awesome Blessing from Allah
(SWT): Abdulkabir, Aminat, Ahisat and Rokeebat Katibi, big thanks to you guys for your
understanding all trough my absence from home in the process of this research. And all my
friends, course mates and colleagues for their love and encouragement, thanks for your
support, love and laughter.
5
ABSTRACT
Today, the number of truant students is increasing at alarming rate in Nigeria. School
Management and parents have to come up with a way to ensure that student were being
monitored .This in some cases may be in simple form like roll call ,while in more interested
cases can be format like surprise quizzes, extra credit. These systems can however be time
The usage of RFID to track students and curbing truancy will help to overcome this and
reduce worried among parents and school managements. This project is combination of
latest technology using RFID, SMS system and web based developed using PHP , VB.Net
When the student enters the main school entrance, they must pass the tag that given to the
RFID antenna, and the RFID reader will read the student ID. Then, information about the
student such as time in and time out from school will be recorded to web based system and
the SMS system automatically sends to their parent’s mobile to inform that the children
arrived at school safely. The usage of RFID helps school to better manage its student’s
attendance and will inform the parents when the children enter and back from school. Usage
of this RFID System RFID will provide the school with a computer system that can store its
6
student’s information efficiently in a database. This system also provides the RFID antenna
and reader that can detect the student when they touch the tag through reader. Therefore,
with usage of RFID to track and monitor school student it is hoped that school will have a
better and efficient management of its students and hence curb truancy.
CONTENTS
DECLARATION
ii
CERTIFICATION
iii
ACKNOWLEDGEMENT iv
ABSTRACT
TABLE OF CONTENT
vi
LIST OF TABLES
LIST OF FIGURES
xi
7
LIST OF APPENDICES
xiv
1 INTRODUCTION
1.6.1 Usage of Appropriate RFID tag and reader for the application 5
8
2.4.2 Type of RFID 11
3.1 Introduction 24
9
3.7 Data Processing 32
4.3.1 Result 42
4.5 Findings 43
5.1 Summary 44
5.2 Conclusion 44
5.4 Recommendation 46
REFERENCES 47
LIST OF TABLES
10
TABLE NO. TITLE
PAGE
LIST OF FIGURES
11
2.2 Operation architecture of RFID 14
12
CHAPTER 1
1.0 INTRODUCTION
Today Student absenteeism and truancy have become serious issue in schools and receives lot
of attention. Absenteeism is a period of time when a student does not attend school with their
Parent consent or knowledge, whereas truancy is an unexcused absence from school without
parental knowledge or consent. Truancy is the core of the problem it’s like absenteeism, but
is an unexcused absence about which parents typically do not know. Parents are usually the
contributor to student truancy by not taking the responsibility to get their child to school each
day. Truancy is associated with sexual promiscuity, alcohol and drug use, delinquency, and
dropping out of school. Truant individuals become involved with alcohol and drugs which
lead to health issues later in life and addiction. Along with the alcohol and drug use, these
factors can also contribute to increase in crime rate in the country. In several jurisdictions,
law enforcement officials have linked high rate of truancy to burglary and vandalism (Baker
2000).Police in Lagos Nigeria, reported that one third of burglaries and one fifth aggravated
assaults occurring between 8am and 1pm on weekdays were committed by juvenile who are
Truancy is a serious problem negatively affecting the future of our youth. The cost of truancy
to society is very high. It has been clearly identified as one of the early warning signs of
students headed for potential delinquent activity, social isolation, or educational failure via
suspension, expulsion, or dropping out (OJJDP 2001) office of juvenile justice and
13
character like being harsh to teachers and fellow students, in addition to threatening acts,
stealing, engaging in fagging, speaking vulgar word and bullying other students and laying
ambush to harass their teachers. Now an interesting question arise what are the main factor
that influence Truancy or Absenteeism? There are several factors that promote Truancy
Lack of communication between the school management and Parents, Bad friends influence,
socio economic standard of the parents. Inadequate education policy. Lack of appropriate
The increase Percentage of student truancy in Nigeria school is alarming; this problem is
subsequently causing high failure among students and in most cases result in school dropout,
increase in cultism among student and other social vices. School administrators and parents
recognize the need for enhanced measure to ensure automatic registration of student
attendance. Parents are anxious about their children getting to school on daily basis. And also
to hear positive performance of their children, but unfortunately in most public school reverse
is the case. This group of student who absent themselves from school can consequently
engage themselves in other social vices. Hence the need to device means of tracking students.
Tracking the student will make it possible to discourage them from engaging in the act of
truancy. Usage of RFID to automatically detect truancy can offer means of curbing this
This research work therefore will be used to study the procedures of using RFID in
Recognizing batch of student entering school every morning is difficult given the amount of
student ,with this new implement ,RFID automatically records the exact time a student enter
14
or exit the school making it possible for school staff as well as parents or guardian to confirm
In the implement of RFID to curb truancy among secondary school in Nigeria, each student is
given passive RFID tags, which can be attached to ID card or other personal items. Passive
RFID tags not contain a battery :the power is supplied by the reader ,when a passive RFID
tags encounter radio waves from the reader ,the coiled antenna within the tag forms a
magnetic field The tag draws power from it energizing the circuit in the tag .The tag then
send the information encoded in the tag‘s memory because the tags can be read by scanners
from a distance of up to 6 centimeter no specialized entry ways are required and student can
come and freely just have to stop at a security check point for a while .Their entry and exit is
In the process of using RFID in curbing truancy a research on truancy, the following
3. How can truancy be registered automatically and information send to student parent
on real time?
15
Usage of Radio frequency identification device sending short message service system and
email system received by parent that will contain formation about attendance of the student at
the school.
The goal of this project is to research how the detection of truancy could be automated and
subsequently curb it by the use of radio frequency identification device to achieve this goal;
the research has been divided into two parts. For the first part a sub research question has
been formulated: “What does the behavior of students with respect to arrival and exit from
the school is?” The second part of the research attempts to find an answer to the question is:
1.4.2 To study on data transfer between RFID system and Visual Basic 6
The data that was read by RFID reader will communicate with interface on Visual Basic 6 for
1.4.3 To study graphical user interface (GUI) using Visual Basic 6 that will
The main objective is to developed student attendance with RFID system. We need to build
interface that will integrate with RFID system. Another interface also need to capture and
record student attendance for subsequent real time display on student monitor website.
1.4.4
Integration and testing the truancy monitoring website, SMS system and RFID truancy
monitoring system.
The system is put to test to ascertain if truly the goal of the research is achieved, this is made
possible by comparing database before and after the usage of this application.
16
1.5 SIGNIFICANCE OF THE STUDY
1. To the parent that it ensures they know the whereabouts of their children at any point
in time.
2. To the school authority, this study helps them in monitoring of their student
3. To the Government and society in general, less truancy better for society because
The main goal of this project is develop system for automatic detection of truancy am student
in Nigeria technology. There are 2 scopes to be cover in this project. Firstly is to use
appropriate RFID Tag & Reader for this application. Secondly is to design GUI to integrate
with RFID technology to enable the parent to get real time info on website meant for the
1.6.1 Usage of appropriate RFID Tag & Reader for this application
There are lots of RFID reader and tag sold at market. Not only brand, but also frequencies of
the RFID itself need to be considered. Since this system will be applied to school students,
17
the RFID reader must used same frequencies as student ID card the type being considered for
1.6.2 Study of Design and implement of a system in student attendance using RFID
The RFID reader will use to detect the student ID card code. The code will use to compare
with Access database and the information in database will be display and store by using
This involves the designing of the RFID, the application of the RFID on student and
obtaining data on the effect of RFID on students by the teachers. The instrument of collection
of these data will be the RFID device and the truancy monitoring website database. These
2. SMS: short message service act of sending short messages with cellular telephones
using the Short Messaging Service (SMS), which has a limit of 160 characters per
message.
communicate with a computer through the use of symbols, visual metaphors, and
pointing devices. Best known for its implementation in Apple Inc.'s Macintosh and
and integrated development environment (IDE) from Microsoft for its COM
18
programming model first released in 1991. Visual Basic is designed to be relatively
easy to learn and use. Visual Basic was derived from BASIC and enables the rapid
to databases using Data Access Objects, Remote Data Objects, or ActiveX Data
Objects, and creation of ActiveX controls and objects. Scripting languages such as
VBA and VBScript are syntactically similar to Visual Basic, but perform differently.
5. AC: Alternate Current flow of electric charge that periodically reverses; it starts, say,
the opposite direction, returns again to the original value, and repeats this cycle
indefinitely.
or receives analogue or digital signals through a network. DCE works at the physical
layer of the OSI model taking data generated by Data Terminal Equipment (DTE) and
converting it into a signal that can then be transmitted over a communications link
frequency between 3,000 and 300 megahertz. UHF signals are used extensively in
through 83.
19
CHAPTER 2
The literature is a valuable resources and an important storehouse of knowledge and thinking
about a topic area. This chapter will discuss more about all of the information related to the
system and other related applications. The literature review in this paper is based on
Internet, journal, books, articles, and from newspapers. Usage of RFID in curbing truancy, is
automatic record of student attendance, develops especially for secondary school student to
curb truancy. This system consists of two modules which are RFID module and Visual
Basic 6 module. Both modules will be combined together in order for this system fully
functioning. Each module carries own function and special features which will be discussed
in detail in this chapter. Figure 2.0 show overall block diagram of the system.
20
RFID
Reader
Serial comm.
Computer
2.1.1 Lack of communication between schools Managements and Parents: - The main
reasons for children absenting from schools given by Respondents, is most schools have not
school to identify list of the students who truant school. School should have early warning
systems to notify their parents or guardians immediately so that they take appropriate and
immediate action to ensure students comes to school every day and attended their classes.
Nowadays, as schools neither have a truant students list, nor early warning systems to notify
21
parents immediately so school contacted their parents when they are dropping or dropped out
from the school, it’s a long period, in this period truant could be involved in gang asterism, in
threatening acts, stealing or could be drug addict so it’s important to notify their parents as
immediately as possible so that they take immediate action. Home-school connections are
recognized as an important strategy to increase student attendance and school usually fails in
this task. One of the keys to keeping students in school is to have better communication
between the parents and the school, and increasing parental or guardian involvement in their
child’s education.
2.1.2 Working Parents: - Once a child is registered at a school, parents are responsible for
making sure they attend regularly. Due to their busy schedule, Parents don’t take their
responsibilities seriously whether their child attends school regularly or not. As Working
parents, don’t have any choice but to work, student truant school easily, even they never
informs their parent about report card grades. So it’s very important to notify their parents
2.1.3 Bad Influences: - A common cause of truancy is the influence of peers. Friends and
classmates are usually good for a good time. Many times these peers are seen encouraging
hanging out on street corners on in cinema hall instead of going to class. The child's natural
instinct to want to be a part of a larger crowd or group dynamic will take over, even if they
are taught better habits. Because these students are studying together and seeing each other
each day, this is just not a good thing; if some students are partying then majority of the
22
2.2 METHOD PRESENTLY USED BY SCHOOL
Students at risk of Truancy need to be identified as early as possible in their school careers.
This task usually falls to the teacher, school counselor, or parents. To bring failing students
back to school and foster their success, the reasons for Truancy need to be recognized and
treated.
In many schools in Nigeria, truancy curbing programs remain sanction and procedure
oriented. Resources are focused on identifying, locating and transitioning truant youth back
into their respective schools with appropriate sanctions and/or citations. Often, these efforts
which have not been shown to be effective in resolving the issues fostering truancy (Byer &
Kuhn, 2003). As well, many schools lack screening/assessment and effective attendance
management system for truant student in spite of the psychosocial problems these youth often
present. Hence a more effective method of curbing truancy to requires automatic detection
It’s generally said that the roots of radio frequency identification technology can be traced
back to World War II. The Germans, Japanese, Americans and British were all using radar
which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson Watt
to warn of approaching planes while they were still miles away. The problem was there was
no way to identify which planes belonged to the enemy and which were a country’s own
pilots returning from a mission. Radio Frequency Identification (RFID) research and
discovery began in earnest in the 1970s. RFID is commonly used to transmit and receive
information without wires. RFID readers and tags communicate through a distance using
23
radio waves. There are a lot of advantages in RFID system, included their price, size,
memory capacity and their capability. The pure memory-based RFID chip without a
coprocessor is cheap, and its footprint is small and usually use in car immobilizer
applications where the IC has to fit in a tiny glass tube bury in the key. RFID fast processing
speed is also essential. In radar and RF communications systems continued through the1950s
and 1960s. Scientists and academics the United States, Europe and Japan did research and
presented papers explaining how RF energy could be used to identify student remotely.
Companies began commercializing anti-theft systems that used radio waves to determine
whether an item has been found or not electronic article surveillance tags, which are still used
in packaging today, have a 1-bit tag. The bit is either on or off. If someone pays for the item,
the bit is turned off, and a person can leave the store. But if the person doesn't pay and tries to
walk out of the store, readers at the door detect the tag and sound an alarm The First RFID
Patents Mario W. Cardullo claims to have received the first U.S. patent for an active RFID
tag with rewritable memory on January 23, 1973.That same year, Charles Walton, a
California entrepreneur, received a patent for a passive transponder used to unlock a door
without a key. A card with an embedded transponder communicated a signal to a reader near
the door. When the read detected a valid identity number stored within the RFID tag, the
reader unlocked the door. Walton licensed the technology to Schlage Lock of San Francisco,
a lock maker, and other companies later, companies developed a low-frequency (125 kHz)
under the cows’ skin. This system is still used in cows around the world today. Low
frequency transponders were also put in cards and used to control the access to buildings over
time; companies commercialized 125 kHz systems and then moved up the radio spectrum to
high frequency (13.56 MHz), which was unregulated and unused in most parts of the world.
High frequency offered greater range and fast data transfer rates. Companies, particularly
24
those in Europe, began using it to track reusable containers and other assets. Today, 13.56
MHz RFID systems are used for access control, payment systems (Mobile Speed pass) and
contactless smart cards they’re also used as an anti-theft device in cars. A reader in the
steering column reads passive RFID tag in the plastic housing around the key. If it doesn’t get
ID number it is programmed to look for, the car won't starting the early 1990s, IBM
engineers developed and patented an ultra-high frequency (UHF) RFID system. UHF offered
longer read range (up to 20 feet under good conditions) and faster data transfer. IBM did
some early pilots with Wal-Mart but never commercialized this technology. When it ran into
financial trouble in the mid-1990s, IBM sold its patents to Intermec, a bar code systems
provider. Intermec RFID systems have been installed in numerous different applications,
from warehouse tracking to farming. But the technology was expensive at the time due to the
RFID is short for Radio Frequency Identification. Generally a RFID system consists of 2
parts. A Reader, and one or more Transponders, also known as Tags. RFID systems evolved
from barcode labels as a means to automatically identify and track products and people. You
Access Control.
RFID Readers placed at entrances that require a person to pass their proximity card
RFID tags used to carry payment information. RFIDs are particular suited to
25
people transmit payment information to a fixed reader attached to a Toll station.
RFID systems are commonly used to track and record the movement of ordinary items such
as library books, clothes, factory pallets, electrical goods and numerous items.
In a very interesting article, the San Jose Mercury News tells us about Charles Walton, the
man behind the radio frequency identification technology (RFID). Since his first patent about
it in 1973, Walton, now 83 years old, collected about $3 million from royalties coming from
his patents. Unfortunately for him, his latest patent about RFID expired in the mid-1990s. So
he will not make any money from the billions of RFID tags that will appear in the years to
come. But he continues to invent and his latest patent about a proximity card with
incorporated PIN code protection was granted in June 2004. Radio frequency identification as
known as RFID is a generic term of technologies that use radio to automatically identify
people or student. The acronym refers to small electronic devices that consist of small chip
and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The
student.TheRFIDdevicemustbescannedtoretrievetheidentifyinginformation.Referhttp://ww.R
remotely retrieving data using devices called RFID tags or transponders. The RFID tag is a
small student that can attach to or incorporated into a product, animal, or person. James
tiatIJCAI, Acapulco, Mexico stated that RFID stands for “radio frequency identification”, and
26
it's a technology that enables remotely storing and retrieving information by means of
electromagnetic radiation.
An RFID system may consist of several components: tags, tag readers, edge servers,
middleware, and application software. In a typical RFID system, individual students are
equipped with a small, inexpensive tag. When an RFID tag passes through the
electromagnetic zone, it detects the reader's activation signal. The reader decodes the data
encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host
computer for processing. In some RFID solutions a return receipt can be generated. Refer
tag(transponder)and RFID reader. RFID tag is usually attached to the student to be identified
and carries information in an electronic microchip. RFID detects tags and performs read/write
operations on RFID tags (Lara Srivastava, April 2005).Lara Srivastava (2005) states normally
readers are connected with an additional interface to forward tag information to another
system, like a PC or robot control system. The most common RFID system, the reader
transmits allow-power radio signal to the tag, which receives the signal and uses it as a power
source to activate the embedded integrated circuit, and then transmits the information stored
in it back to the reader through the antenna. The information carried by the RFID tag is the
There are three types of RFID, active, passive, and semi passive RFID tag. Active RFID and
passive RFID are fundamentally different technologies. Active RFID tags have an internal
power source (battery).The battery that can be used as a partial or complete source of power
27
for the tag's circuitry and antenna, and may have longer range and larger memories than
passive tags, as well as the ability to store additional information sent by the transceiver
Some active tags contain replaceable batteries for years of use (JR Tuttle, 1997).Passive
RFID tags have no internal power supply (battery).The power supplied by the reader. When a
passive RFID tag encounters radio waves from the reader, the coiled antenna within the tag
forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The
tag then sends the information encoded in the tag's memory and temporarily stores a very
small amount of energy from the reader’s signal to generate its own quick response. Music or
clothing store placed the reader at entrance to detect an asset or person with a passive tag
moving through the door. As quoted by Dempsey (2004) “The key point here is that these
systems don’t really provide location at all; since the reader have such a limited range,
location is surmised from which reader last read the tag .Even though active RFID offer best
performance than passive RFID, most of the researcher prefers to use passive RFID in their
system. Chatterjee et al. (2004), Science Application International Corporation (2002) and
Larsson and Qviberg (2004) stated that passive RFID is a low-cost to install and can function
for a number of years without maintenance. According to Mr. William Sharp, President of
Advanced Research Company, most tags being targeted for use today are passive RFID.
Hayashi et al. (2003) et al.(2004) are some researchers who prefer long life active RFID tag
for their research. Lara Srivastava (April 2004) state that semi-passive tag, which employs an
embedded battery to achieve better performance. Normally, such tags are only activated when
they are in the reading range of a reader. For development school children monitoring system,
passive RFID tag will be using to accomplish this project. This RFID are choosing because
the tag functions without a battery; these tags have a useful life of twenty years or more. The
tag is typically much less expensive to manufacture the tag is much smaller where some tags
28
are the size of a grain of rice. These tags have almost unlimited applications in consumer
An antenna or coil
1. ANTENNA
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are
the conduits between the tag and the transceiver, which controls the system's data acquisition
and communication. Antennas are available in a variety of shapes and sizes; they can be built
into a door frame to receive tag data from persons or things passing through the door, or
electromagnetic field produced by an antenna can be constantly present when multiple tags
are expected continually. If constant interrogation is not required, a sensor device can activate
the field. Often the antenna is packaged with the transceiver and decoder to become a reader
The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,
depending upon its power output and the radio frequency used. When an RFID tag passes
through the electromagnetic zone, it detects the reader's activation signal. The reader decodes
the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host
29
FIG 2.3 RFID ANTENNA
2. TAGS (Transponders)
that transmits this data wirelessly to a reader. At its most basic, the chip will contain a
serialized identifier, or license plate number, that uniquely identifies that item, similar to the
way many bar codes are used today. A key difference, however is that RFID tags have a
higher data capacity than their bar code counterparts. This increases the options for the type
of information that can be encoded on the tag, including the manufacturer, batch or lot
number, weight, ownership, destination and history (such as the temperature range to which
an item has been exposed). In fact, an unlimited list of other types of information can be
stored on RFID tags, depending on application needs. An RFID tag can be placed on
30
individual items, cases or pallets for identification purposes, as well as on fixed assets such as
Tags come in a variety of types, with a variety of capabilities. Key variables include:
There are three options in terms of how data can be encoded on tags: (1) Read-only tags
contain data such as a serialized tracking number, which is pre-written onto them by the tag
manufacturer or distributor. These are generally the least expensive tags because they cannot
have any additional information included as they move throughout the supply chain. Any
updates to that information would have to be maintained in the application software that
tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the
tag one time in production or distribution processes. Again, this may include a serial number,
but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new
data to be written to the tag as needed—and even written over the original data. Examples for
the latter capability might include the time and date of ownership transfer or updating the
repair history of a fixed asset. While these are the most costly of the three tag types and are
not practical for tracking inexpensive items, future standards for electronic product codes
31
Data capacity
The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as much
as several thousand bits on the high end. Of course, the greater the storage capacity, the
Form factor
The tag and antenna structure can come in a variety of physical form factors and can either be
self-contained or embedded as part of a traditional label structure (i.e., the tag is inside what
looks like a regular bar code label—this is termed a 'Smart Label') companies must choose
the appropriate form factors for the tag very carefully and should expect to use multiple form
factors to suit the tagging needs of different physical products and units of measure. For
example, a pallet may have an RFID tag fitted only to an area of protected placement on the
pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels
that also provide operators human-readable information and a back-up should the tag fail or
“Passive” tags have no battery and "broadcast" their data only when energized by a reader.
That means they must be actively polled to send information. "Active" tags are capable of
broadcasting their data using their own battery power. In general, this means that the read
ranges are much greater for active tags than they are for passive tags—perhaps a read range
of 100 feet or more, versus 15 feet or less for most passive tags. The extra capability and read
ranges of active tags, however, come with a cost; they are several times more expensive than
passive tags. Today, active tags are much more likely to be used for high-value items or fixed
assets such as trailers, where the cost is minimal compared to item value, and very long read
32
ranges are required. Most traditional supply chain applications, such as the RFID-based
tracking and compliance programs emerging in the consumer goods retail chain, will use the
EPC Tags
EPC refers to "electronic product code," an emerging specification for RFID tags, readers and
business applications first developed at the Auto-ID Center at the Massachusetts Institute of
Technology. This organization has provided significant intellectual leadership toward the use
identification, including an emerging standard for the tags themselves, including both the data
content of the tag and open wireless communication protocols. In a sense, the EPC movement
is combining the data standards embodied in certain bar code specifications, such as the UPC
or UCC-128 bar code standards, with the wireless data communication standards that have
3. RF Transceiver:
The RF transceiver is the source of the RF energy used to activate and power the passive
RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be
modulates the radio frequencies that the antenna transmits and receives. The transceiver
filters and amplifies the backscatter signal from a passive RFID tag.
33
2.4.4 OPERATING FREQUENCY OF RFID
Like all wireless communications, there are a variety of frequencies or spectra through which
RFID tags can communicate with readers. Again, there are trade-offs among cost,
performance and application requirements. For instance, low-frequency tags are cheaper than
ultra high-frequency (UHF) tags, use less power and are better able to penetrate non-metallic
substances. They are ideal for scanning students with high water content, such as fruit, at
close range. UHF frequencies typically offer better range and can transfer data faster. But
they use more power and are less likely to pass through some materials. UHF tags are
typically best suited for use with or near wood, paper, cardboard or clothing products.
Compared to low-frequency tags, UHF tags might be better for scanning boxes of goods as
they pass through a bay door into a warehouse. While the tag requirements for compliance
mandates may be narrowly defined, it is likely that a variety of tag types will be required to
solve specific operational issues. You will want to work with a company that is very
knowledgeable in tag and reader technology to appropriately identify the right mix of RFID
technology for your environment and applications. The frequency of an RFID system defines
the relationship between the tag and reader, and impacts both the transmission range and
speed. RFID systems can work in the low frequency (LF), high frequency (HF), ultra high
frequency (UHF), and microwave parts of the spectrum. Common frequencies for RFID
systems are 125-134 KHz (LF), 13.56 MHz (HF), 860-930 MHz (UHF), and 2.45 GHz
(microwave).
Shown below is a typical RFID system. In every RFID system the transponder Tags contain
information. This information can be as little as a single binary bit , or be a large array of
34
any type of information that can be stored in digital binary format.
Shown is a RFID transceiver that communicates with a passive Tag. Passive tags have no
power source of their own and instead derive power from the incident electromagnetic
field. Commonly the heart of each tag is a microchip. When the Tag enters the generated
RF field it is able to draw enough power from the field to access its internal memory and
transmit its stored information. When the transponder Tag draws power in this way the
resultant interaction of the RF fields causes the voltage at the transceiver antenna to drop in
the reader. The Tag is able to control the amount of power drawn from the field and by
35
doing so it can modulate the voltage sensed at the Transceiver according to the bit pattern it
wishes to transmit.
Inventory Management
Work-in-Process
Patient Monitoring
problematic due to the need to have a direct "line of sight" between a scanner
and a bar code. RFID tags can be read through materials without line of sight.
2. More automated reading: RFID tags can be read automatically when a tagged product
comes past or near a reader, reducing the labor required to scan product and
3. Improved read rates: RFID tags ultimately offer the promise of higher read
sorting..
36
4. Greater data capacity: RFID tags can be easily encoded with item details
5. "Write" capabilities: Because RFID tags can be rewritten with new data as
Some common problems with RFID are reader collision and tag collision. Reader collision
occurs when the signals from two or more readers overlap. The tag is unable to respond to
simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision
occurs when many tags are present in a small area; but since the read time is very fast, it is
easier for vendors to develop systems that ensure that tags respond one at a time.
37
School
entrance
8051
Tx
PORT 2
Rx DATA PIN
RFID
TAG
of downloadable Flash programmable and erasable read only memory and 2K bytes of
EEPROM. The device is manufactured using Atmel’s high-density non volatile memory
technology and is compatible with the industry-standard 80C51 instruction set and pin out.
The on-chip downloadable Flash allows the program memory to be reprogrammed in-system
combining a versatile 8-bit CPU with downloadable Flash on a monolithic chip, the Atmel
The AT89S52 provides the following standard features: 8K bytes of downloadable Flash, 2K
bytes of EEPROM, 256 bytes of RAM, 32 I/O lines, programmable watchdog timer, two data
38
pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full
duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S8252 is
designed with static logic for operation down to zero frequency and supports two software
selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM,
timer/counters, serial port, and interrupt system to continue functioning. The Power-down
mode saves the RAM contents but freezes the oscillator, disabling all other chip functions
until the next interrupt or hardware reset. The downloadable Flash can be changed a single
byte at a time and is accessible through the SPI serial interface. Holding RESET active forces
the SPI bus into a serial programming interfaces and allows the program memory to be
RFID technology offers many benefits for business, manufacturing and tracking process.
According to Stanford (2003), RFID related application and benefit. As quoted from the
study, “Make no mistake about it—at the high end, RFID tags are wireless, networked,
39
pervasive computers, successfully integrated into their environment. They are easily attached,
often of negligible weight and bulk.” Grajales (2003) stated that RIFD could enable full
control of inventory content and location for vehicles in the facility. Tuttle (1997) stated that
the technology overcome other automatic identification approaches such as infrared. Apart
from benefits mention above, Olivier (1996) stated RFID could utilize as car theft prevention.
However, RFID system also has its limitations. Two main limitation of RFID are false
negative reads and false positive reads. According James Brusey at el.(August 2003) stated
false negative reads where RFID tags are not read at all, and false positive reads where RFID
tags are detected when they are not in the interrogation range of the reader. Apart of
that these failures could be caused by collisions on the air interface tag detuning, tag
on most digital mobile phones hat permits the sending of short messages. Short messages also
known as text messages, or more colloquially SMSes, texts or even texts between mobile
phones, other handheld devices and even landline telephones. Other uses of text messaging
can be for ordering ring tones, wallpapers and entering competitions SMS stands for “Short
to mobile phones. The messages can typically be up to 160 characters in length, though some
services use 5-bit mode, which supports 224 characters.SMS was originally created for
phones that use GSM (Global System for Mobile) communication, but now all the major cell
40
2.4.2 PROCESS OF SMS
Once a message is sent, it is received by a Short Message Service Center (SMSC), which
must then get it to the appropriate mobile device to do this, the SMSC sends a SMS Request
to the home location register (HLR) to find the roaming customer. Once the HLR receives the
request, I will respond to the SMSC with the subscriber's status. There are two statuses where
inactive or active where subscriber is roaming. If the response is “inactive", then the SMSC
will hold onto the message for a period of time. When the subscriber accesses his device, the
HLR sends a SMS Notification to the SMSC, and the SMSC will attempt delivery. The
SMSC transfers the message in a Short Message Delivery Point to Point format to the serving
system. The system pages the device, and if it responds the message gets delivered. The
SMSC receives verification that the message was received by the end user, and then
categorizes the message as "sent" and will not attempt to send again. Refer
http://www.wikipedia.com.
School truancy, particularly in primary and secondary schools, represents a serious issue
deserving attention in communities across the nation. Most often treated as a management
and disciplinary problem, serious attention to the underlying causes of truancy is usually
given after the youth's absence from school becomes frequent or chronic. Truant youths are at
difficulties, and entering the juvenile justice system. Unfortunately, with few exceptions,
41
truancy has not received significant attention by criminologists. This project will address the
The technology of Radio Frequency Identification (RFID) enjoys an enormous interest at the
current time, not only from the standpoint of research but also from corporate practice
(Thiesse, 2006). RFID is a type of automatic identification system. The purpose of an RFID
system is to enable data to be transmitted by a portable device, called a tag, which is read by
an RFID reader and processed according to the needs of particular application Therefore, the
technology has brings the idea of using RFID to curb truancy among student in Nigeria
parents can keep track of their children's whereabouts. Putting together a system based on
RFID, Wi-Fi terminal and telecommunication, which sends parents short message service
(SMS) messages to confirm that their children have safely arrived at school or home. Student
(transmitter/responder) and antenna are combined to make an RFID tag, which is worn as a
bangle in student's arm. The transceiver can be placed at several strategic places at school,
such as canteen and post guard as it can detect student in about 10metres area. The student
would carry a passive RFID chip, worn on a bracelet or sewn into school uniform shirt or
blouse, known as Bangle Detector. RFID readers would be mounted aboard school buses and
at school entrances, and would communicate with central server at the school over a Wi-Fi
(Wireless Fidelity) connection. The RFID reader would log the times when the child got on
or off the school bus arrived at school or left the school premises. Each time, it would send an
SMS to the child's parents. This would help assure parents that their children were going to
school and coming home promptly. This technology will provide school authorities with not
42
only access to real-time information on a particular student's class attendance, which would
be useful for school administrators to take proactive steps against truancy, but would also
enhance access control and security at schools to prevent kidnappings which has become an
epidemic within the African nation. Using RFID Technology and the solutions for truancy
can be a game changer in improving access control and security, while improving class
CHAPTER 3
3.1 Introduction
Chapter 2 gave an overview of the applicability and suitability of RFID technology to the areas of
wearable and ubiquitous computing. It also highlighted its ability to overcome the shortcomings
inherent in student attendance and truancy monitoring system leading to the conclusion that RFID is a
This chapter describes how RFID technology is used in curbing truancy and presents a detailed
overview of the design of truancy monitoring system. In this chapter, the source of data, methods
43
of collection, the evaluation of the existing system and the organization structure of the
This includes the system's form factor and the types of hardware used. The system's data processing
techniques are discussed with descriptions of how data is gathered, stored, and used.
the state recommended approaches that focus on the root causes of poor
parenting skills, child abuse or neglect in the home, and family instability.
The state also suggested and require parents to ensure that their children
are supervised and will be held responsible for truancy of their children,
school.
such as :
performance at school.
44
3.2.1 PROBLEM OF EXISTING MONITORING SYSTEM
4. Lot of search time, when you need to see any student attendance performance
student’s attendance performance. Parents wait till end of term in most case to get the
attendance report.
system analysis, data is collected about the present system. The data is then analyzed
requirement for a new system. Three tasks of this are gathering data, Analyzing the
Analyzing data:- there are several tools for the analyzing of data which includes
study, a system analysis report is prepared for higher management in the application.
45
The initial concept and problem analysis/ form factor of the mobile component was an RFID enabled
glove. Another consideration in the design of the system’s form factor arises from the initial pro-to
type evaluation. The form factor was influenced by the inherent limitations of the RFID readers range.
For this reasons a different system form factor was developed for RFID truancy monitor. This takes
the form of a pouch which is placed inside a pocket with tagged items. A box was designed using a
Figure 3.1: System Form Factor: Left image shows the front of the pouch with an integrated
LCD display. Right image shows the back of the pouch with RFID reader.
This box along with the RFID reader and batteries are held within the pouch. The prototype RFID
truancy detector pouch measures 10.5cm x 11cm, and is 2.5cm thick. Its weight is0.35kg. It is made
of cloth and contains a zip at the bottom which facilitates the removal of the internal components for
battery replacement. . A switch is also found inside the zip for powering on and of the system. The
front side of the pouch features the LCD display and the back side of the pouch has a clear plastic
covering to show the RFID reader. This pouch is carried easily within a pocket or a bag. Due to the
limited capacity of pockets and bags the reader will be constantly in close proximity to tagged items.
The goal of this is to overcome the limitations of the reader's range. To evaluate and test this design,
the pouch was placed in a bag and jacket pocket with tagged students. The purpose of this evaluation
was to determine if tagged students could be successfully identified using this system form factor.
46
3.4 RFID SYSTEM DESIGN.
three tasks: 1. designing alternative system 2.Selceting the best system 3.Hardware
design.
(A). Economic feasibility – Costs and benefits, time for the system to pay for (itself).
(B). Technical feasibility:- hand ware and software reliability, available training.
(C). Operational feasibility:- the ability the system to work within the organization.
2. Will the system be flexible enough to be modified and needed in the feature?
5. Writing the system design report:- this is to document and it communicate the
There are a number of key hardware components required for the RFID truancy monitor system. The
mobile component of RFID truancy detector consists of an RFID reader connected to a Gumstix com-
puter 1. The Gumstix is a mini computer running a Linux operating system. The Gumstix is expanded
with wireless capabilities, two serial connections, and has an integrated Bluetooth module. Expanding
the Gumstix involves using expansion boards which simply click onto the Gumstix .The first board is
47
known as Wistix which give the Gumstix wireless capabilities and the second board contains two
serial port connections. Figure 3.2 shows these components. The Gumstix facilitates the necessary
data processing and wireless transmission of recorded data required by the mobile component. It is
responsible for gathering information about student location and transmitting this data wirelessly to
the Truancy monitor application. Information about a student location is gathered using the RFID
reader, which detects when the embedded tag being carried by a student is detected (step 1 in _figure
3.5).
Figure 3.2: A) Gumstix, B) Serial port expansion board, C) Wistix, D) Gumstix connected
To connect the reader to the Gumstix a small circuit is constructed which regulates a 5V power supply
for the reader and relays tag reads to the Gumstix through one of its serial ports. Figure 6.0 shows the
schematic for this circuit. Figure 3.4 shows the circuit and the RFID reader connected to the Gumstix
48
Figure 3.3: Schematic drawing of Hardware sesign: Left) Serial to RFID reader circuit
Once an RFID tag comes into range of the reader and its ID is read successfully, the ID is taken in by
the Gumstix. The Gumstix then transmits this ID wirelessly to a server where it can be stored in a
database (step 2 in _figure 7). The function of the server is to host the online student truancy monitor
website and a database. The database stores the information which has been wirelessly transmitted by
the Gumstix (step 3 in _figure 3.5). The server runs on a laptop connected to a router. This allows the
Gumstix to be configured to connect to the router and use it to transmit data to the server and store it
in the database. Connected to the Gumstix is a 32 character LCD screen. The purpose of this is to
enhance the user to system interaction. The LCD connects to one of the Gumstix serial ports. The
LCD screen is connected to the serial port via a second circuit. This circuit regulates a 5V power
supply to power the LCD screen. Figure 3.3 shows the schematic for this circuit. The Gumstix
transfers data through this circuit which is displayed on the screen as text. Based on student that has
49
Figure 3.4: System Architecture
1) Gumstix connected to RFID reader and LCD, 2) Router wirelessly receives data from
Gumstix, 3) Laptop server hosting database and truancy monitoring website. Figure 7.0 shows
50
3.6 DATA COLLECTION
information on how the system works. This form of date collection was useful in the
sense that it sealed light into the present information on truancy monitoring system.
These provide information that is required within a section of the system and what is
contained in. The printed output form shade more knowledge on which department
representatives receive each document and where it is sent to after is has being uses.
RFID truancy monitor requires a server used to host the Truancy monitor website and database. The
Server setup used in this project is known as Linux Apache MySQL PHP (LAMP). The LAMP server
system consists of a number of open source software technologies which are commonly used together
in server applications. It consists of an Apache server 4, MySQL 5 for managing databases, and PHP 6
scripting language used for server side data processing in dynamic web pages. These technologies are
running on a Linux operating system. The LAMP system was chosen as it encapsulates the required
software technologies for the Truancy monitor application. MySQL facilitates the storage and
retrieval of tag read data which is transmitted to the server by the mobile component. This data is
stored in a MySQL database. The Apache server hosts the web pages which are written in PHP. Using
PHP allows interaction with the MySQL database, such as storing and retrieving data, and processes
this information displaying it to the user through the website. See _figure 3.6 for a data flow diagram
51
Tracker
When the Gumstix is powered and boots up, it runs a Python script. The Python script is responsible
for transmitting tag IDs to the server which have been read by the RFID reader.
52
It is also responsible for displaying information on the LCD screen. When a tagged student is read by
the RFID reader, its ID is passed through the serial port to the Gumstix, (step1 in figure3.6). This ID
is taken in by the Python script. The Python script can then transmit this ID to a PHP page running on
the LAMP server. This PHP page is responsible for storing the tag ID in the database. When a tag is
read, its ID is transmitted wirelessly via the router to the PHP page, (step 2 and 3 in figure3.5). This
ID is stored in a database using MySQL queries embedded within the PHP page. Each ID is given a
time stamp when it is stored, consisting of the current time and date. When storing a tag ID it is a
second database. The second database stores all tag ID's recognized by the system and which student
the ID corresponds to. When a tag ID is stored, this information is used to determine which student
the ID belongs to and store the corresponding item name with the tag ID, (step 4 in figure3.6). For
example, the tag ID `04162B761F' is received by the server and PHP page. This ID is checked against
the second database which indicates that`04162B761F' corresponds to `certain student'. This ID can
then be stored with its item name and is given a timestamp. Each time a tag ID is read on the Gumstix,
the Python program stores the last occurrence of the item. Each time student is identified. Its
timestamp is updated, so that the system records when last that student is located. Using this
information, the Python script sends this data to the LCD screen and displays it in the form of a
simple cue (step 5 in figure3.5). necessary to establish which student the ID corresponds to. Each item
With RFID data stored, a PHP website can incorporate this as part of the truancy monitor
application. When a parent want to know the history of their children school attendance they simply
logon to this website and select the identity of student they are looking for, or simply by sending the
identity of their child into a short code via an SMS . Using PHP with MySQL the website can retrieve
relevant information from the database. This data is presented to the user when and where they last
the student had being (step 6 and 7 in figure3.6). One of the goals for this system is to return this
information in the form of human readable cues, or in such a way that is as close as possible to human
53
readable language. For example, `The student enter school gate by 7:00am and exit the gate by
3:45pm on 13th July 2012.. This is achieved within the PHP pages, formatting and filtering data, and
displaying relevant information in the form of the human readable cues. The aim of using human
readable cues is to create an application which people can easily relate to. It is the opinion of this
author that a person can better relate to natural human language rather than lists of data consisting of
IDs. The user can read a simple line of text rather than deciphering lists of data in order to
obtain useful information. This however may not always be true. The effectiveness of the two
data representations, human readable cues and a more technical representation, is discussed
in chapter 4. Based on the information obtained from these evaluations the truancy monitor
application presents data in both forms. Figure 3.7 shows a screen shot from the web site,
The second means of presenting useful information to the user is through the LCD screen
built into the mobile component. The LCD continues to display the last time you had
certain items. Due to the LCD's limited screen space, consisting of 32 characters, the cues
are simpler than those found on the Truancy monitor website, for example, `Last had phone @
17:38, 17/04/2008'. A second limitation with the screen is that users cannot interact with it.
They do not have control over the information which is displayed, the system simply cycles
through available information. While there are limitations to the LCD screen, the presented
information still facilitates user assistance in the situation where a computer is unavailable.
The goal of this work is to use a RFID system to curb truancy and create a student monitor web based
application which helps Parent to monitor and track their children. Two main components are required
to achieve this. A mobile component and the truancy detection application. The mobile component is
carried by the user and is responsible for gathering information about a student where about on real
54
time basis. To gather this information the mobile component requires a means of retrieving data and
processing the same data. The system will be operating in the following sequence after installation:
1.The student’s old Identity -cards will get replaced with RFID Identity-cards which will be
as same as their Identity-cards having their Name, Photo and all other details.
2. The sufficient number of RFID Readers will be installed at the entrance gate of the school.
3. All readers are networked to the computer via controller and data converter
4. When the student enters the school gate he will show his ID cards to the RFID reader from
5. After successful reading of the card reader will blow a green light on the reader and an
6. Looking at the noisy conditions at the gate of the school, there will be an extra light
indicator at every reader so as to indicate the successful reading of the card and confirm the
7. The RFID Reader reads the card data that is card number and sends to the computer via
9. RFID Reader reads a card within less than a second. Photo, Roll No and Name of the card
holder on the screen for a while and waits for other card get scanned.
10. The software collects the data, maintains the various masters and gives the necessary
reports. There can be special SMS’s sent like school early closed or emergency holiday etc.
on the top of the click. The system gives you the whole attendance history of a student
: Software Features:
1. Masters:
55
1) The student Master containing the complete data of the students with Roll no, Adress,
2) The online attendance monitoring system transactions would be handled by the software
1) Time In
2) Time Out
4). Reports:
1) Name
2) Roll No
3) Class
4) Between dates
1) Presenters Reports
2) Absenteeism Reports
4) % Attendance Reports
5) Class Reports
7) Weekly Reports
8) Monthly Reports
56
CHAPTER 4
RFID Truancy monitor is flawless automated attendance truancy monitor system of school
student. The system is based on RFID (radio frequency identification devices) which stands
to be the most advanced and reliable contactless technology used all over the world. The
system takes care of the attendance of student everyday .thereby monitoring each student
attendance. It replaces the old traditional, manual attendance system of calling roll no of
every student, which is highly time consuming. It also create a parent information system e.g.
every day system send a SMS to all parent on arrival and exit of their child from the school
There can be special SMS’s sent like school early closed or emergency holiday etc on the top
Old truancy monitoring programme is usually a slower process because: 1) lots of time is
wasted on daily basis in the process of taking attendance, 2) we have to search over a large
In this study all the previous problem and challenges were over come as shown in the graph.
57
Figure 3.6: Graph: Time taken for tracking vs. Size of Database (by usage of RFID)
The usage of RFID to curb truancy has lower time complexity compare to conventional to
manual truancy monitoring system .The graph of Time versus N shown in figure 5.12 .Here
N is the index of the student to be identified and monitored at any point in time .As we can
see that time was increasingly linearly with the size of database.
PERFOMANCE ANALYSIS
Table 3.1
Number of Students and Their Corresponding Number of truant using the existing
system.
0 33 34 12 83
1-3 62 44 30 38
4-9 55 59 41 37
10-14 34 22 13 19
15-19 26 12 7 8
20+ 42 21 24 15
Total 252 192 127 200
Table 3.2
Percent of Students and Their Corresponding Number of
Truant using the existing system
58
Total 100.0 100.0 100.0 100.0
A case study of Ejigbo Junior High school in Ejigbo Oshodi Isolo Lagos state of Nigeria
As we can see from our truancy monitoring experiments, this key based identification takes
Table 4.1: Performance of RFID truancy monitor device on a database of 150 student
compares with manual system
This gave rise to non-uniform graph. But this non-uniformity in graph will apparently vanish
(figure4.14) showing comparative results over database size of million students to be tracked
sec = around 3 minutes, while by one to one tracking technique will be roughly
of millions, this truancy monitoring technique runs in minutes, while Manual tracking
method takes hours to complete or even days in some cases of missing records
The usage of RFID to track truancy in Nigeria results is so good that we can use this Truancy
Monitoring for the whole Country by deploying the device to all public and private secondary
schools.
59
Usage of Manual attendance
tracking system to track truancy
Figure 4.1: Expected Graph for comparison: Time taken for tracking of student vs.
Size of database in million
As we can see that time was increasing linearly with size of database .this is so because size
was 150 which is of the order n. As the size will increase e.g. millions or thousand, the slope
Table 4.1 shows the results from the evaluation of the RFID reader's range. It shows the mean
readable range of each tag type for the front, back and side of the RFID reader .For each of the front
back and sides, the standard deviation (SD) of the obtained result are given.
60
The results of this evaluation highlighted the limitations of the RFID reader's range. However
it was found that once a tag is within this range it is accurately identified. Viewing the test
page which displayed the content of the database ,indicated that once ID is read ,it is always
transmitted and stored correctly in the database .This was confirmed using the testing web
page and the LED light incorporated into the circuit which connect the RFID reader to the
Gumstix. The Led Flashes to indicate that the circuit is receiving data. The Testing webpage
Viewing this webpage indicated that the tag reads had been successfully transmitted and
stored in the database. This indicates that the hardware setup and data processing techniques
The goal of the system's form factor is to create a system which is small, compact and easily
carried by the user. The second factor in its design was to address the limitations of the readers range
A small pouch design can be placed within a pocket or bag along with other items. Due to the
relatively small space of pockets and bags, items are in close proximity to each other at all times. The
aim of this test was to determine if this design can overcome the reader’s limitations. Although the
system is very compact and portable it is necessary to highlight that it is a proof of concept. If such a
system was designed and built commercially it would be considerably smaller and lighter. For
example the Gumstix computer is much more powerful than is necessary for the data processing
involved in the system. The circuits involved for connecting components could be constructed using
printed circuit boards which would also be considerably smaller in size. The weight of the form factor
is mainly due to the two 9V batteries it contains. Again a commercially built system could feature a
61
This evaluation involved placing the pouch inside the pocket of a bag and a jacket. Tagged student
will stand closed to the pocket, with the pouch in different combinations and positions in other to
determine if they could be identified successfully .Tagged student consisted of all 150 students tagged
with RFID embedded ID card in this study. The RFID reader is positioned at the back of the pouch, as
seen in figure3.1. For this reason it was necessary to evaluate its effectiveness at reading tags from
both the front and back of the pouch. In the evaluation the pouch was tested 30 times for each side.
4.3.1 RESULT
The results of the form factor evaluation were promising but also highlighted a potential weakness in
its design. When placed in a pocket, RFID truancy monitor successfully identified tagged students
27 out of 30 tests as long as the reader was facing toward them. If the pouch was positioned the wrong
way around it was found that the system was less effective, with 12 of 30 tests identifying a tagged
item. These results indicate that the form factor is very effective when used in a specific way,
however if the pouch was placed in a pocket incorrectly it is considerably less accurate.
To evaluate the human readable cues a survey was created to gather feedback on which technique
people consider more effective, the human readable cues or raw data consisting of date and time
time stamps. This was issued to 3 parents whose child is tagged who had no much knowledge. Of
computer database. To eliminate the possibility that some parent may have certain bias toward more
complicated and detailed data based on their experience with this type of data. The survey was issue
to 10 non computer literate parents whose child was tagged with RFID embedded chip for the purpose
of being monitored.
62
4.5 FINDINGS
1. Speed of tracking a student with a usage of RFID system is 2-4 seconds at most 4-
8secondse from distant range while By insertion i.e insertion of access card in slot,
2. Also, a stained card test was carried out with a stained both magnetic strip card and an
RFID card with dirt and then the magnetic strip into the slot. The magnetic strip
seemed not to work as a result of the dirt making the reader malfunctioning the case
of the RFID card, the signal from transponder was retrieved because communication
3The overall finding of this work indicate that RFID is an effective and useful technology in
this system. This was indicated by the RFID prototype evaluation which showed a high
level of accuracy. This supports the finding of Schmidt and Gellerson in their research of
the applicability of RFID in wearable computing [10]. While RFID technology is shown to
be accurate it was found to be limited in its range. The system's form factor was designed
to compensate for this, where the mobile component consisted of a pouch which is placed
inside a pocket with tagged items. The results indicated that this was a successful approach,
However the pouch needs to be used in a specific way to facilitate accurate tag reading.
The goal of the truancy monitoring web site is to present the user with data recorded by the
One important result of the implementation that warrants attention is that a lot of student
carry calculator and mobile phone, when the tags are kept close to these electronic devices,
the read degrades tremendously. The students have to retry their tags in front of the antenna
63
CHAPTER 5
5.1 SUMMARY
The Usage of RFID to curb truancy Attendance System consists of an RFID reader, RFID
tags, a personal computer, and a server. The function of the entire system is very simple. It
involves using a reader to read the tags. The information in the tag is transfer to a database
.this later is published for user i.e. parent of a tagged student, to see in a legible format via
method like web server or sms, this is a possible option for replacing the current attendance
methods. Not only does usage of RFID to track truancy is quick, but it also efficient. This
device is must-have system for those schools that value every minute of their lecture time.
Assuming a “roll-call” takes about 5 minutes per lecture and that the class meets 3 times a
week for fifteen weeks in a term, then the RFID DEFICE can save up to 4 hours! This easily
gives the school 4 extra hours that can be used towards other better purpose.
5.2 CONCLUSION
In this chapter, the research questions which were stated at the start of the research project are
answered based on the research results collected during two types of research: the data from
test website (1) and the data from the practical experiment of network traffic monitoring (2).
Furthermore there are recommendations for future work proposed in order to continue the
development.
This project mainly comprised of usage of RFID technology to curb truancy among student in
Nigeria. Truancy monitoring system is very helpful in saving valuable time of student and
teacher, generating report at the required time, for storage in its database an forward same to
64
truancy monitoring website or via an sms to the tracked student. This study presented a
framework in which student tracking can be made automated and on line .A general
implementation approach to truancy monitoring was proposed using RFID device. Further an
idea for using portable devices along with wireless LAN or mobile 3G network was
suggested.
RFID truancy monitoring System used for student identification is faster in implementation
2. Skills and self-confidence in coding and working with software like Matlab were
developed.
3. An applicable truancy monitoring system was designed for educational organization. Ideas
were presented for making whole system online using portable device and 3G mobile
networks
4. An improved and faster RFID truancy curbing system was developed for student
Truancy monitoring.
5. RFID truancy monitoring system was compared with existing manual truancy reduction
system.
the system took 0.157 sec while manual truancy monitoring system 150 minutes
in worst case for database size of 150. It was then estimated that for a database of size of
millions, this system will take around 3minutes at maximum, while the existing manual
6. The future expectations from this study is to actually implement usage of RFID in curbing
65
7. Usage of RFID truancy curbing system can be used in curbing truancy in all Nigeria school
5.5 RECOMEDATION
In order to commercially publish the effect of usage of RFID to curb truancy among student
in Nigeria, research needs to be conducted in at least two areas to verify assumptions which
have been made during the initial design and development phase which resulted in the current
Authentication method:
The current authentication method is based on the fact that tagged students are only exclusive
holder of their embedded RFID card only know their own login credentials. Or the other way
round; tagged student are the only known carrier. Then as, it is assumed that the person who
corresponds to this profile, is the person who is recognized and is physically present.
Since this is an assumption it is interesting to perform research to investigate the usage and
distribution of credentials and whether or not they are shared with for example family or
friends.
There is discovery of peaks in data traffic around school resumption time and closing time.
The assumption is made that the students either rushing in to avoid getting late to school or
rushing out at closing time to avoid missing their school bus, around these moments. Since
these are assumptions, there is need to be verified by means of research in order to conclude
about the increase in data traffic, so that the system will be design in such a way to withstand
66
Acceptance
The prototype uses personal data with more or less private information as its input. Despite
the fact that the impact on privacy of the students is low, not everybody might be able to
correctly evaluate the impact on personal privacy. For that reason, research has to be
conducted to investigate how an usage of RFID truancy detection system as proposed in this
thesis, will be received by the people, especially the target group namely the students and
their parent.
Absence recognition
The main research question of this project is how to automatically register truancy, so how do
we register absence? It turned out that this is an ambitious goal. This research proved
automated presence registration, absence registration is however at least one step beyond.
Research needs to be conducted in order to investigate how the current results gathered with
presence registration can be used for and transformed into absence registration.
Prototype
For the prototype there are a lot of extensions possible. Three important ones are described
The prototype tracked people, but it also needs to know who it has to tracked During the
practical experiment performed in the context of this study for example a teacher of the
school has been tracked in the data traffic. This is nice but this is not the goal of the system.
Besides the knowledge about who needs to be there, the truancy monitor also has to know
One of the next steps to take with the prototype is facilitating a connection with this system
or at least the database, so presence expectations can be made which need to be compared
67
with the results of the data traffic monitoring process. The difference in this comparison
68
REFERERENCES
(2008).
Castro, L. and Fosso Wamba, S. (2007). “An Inside Look at RFID Technology”. Journal of
Technology Management & Innovation, Vol. 2, No. 1, pp. 128 – 141, (ERA: C)
Debdoot Sheet, Atul Kumar, Agnibesh Dutta, Samrat Das Gupta, Tirthankar Datta, Subir Kr.
Sarkar. “Realization and Simulation of the Hardware for RFID System and its Performance
study.” Proc. Of ICTES 2007. Dr. M.G.R. University, Chennai, Tamil Nadu, India. December,
http://www.rfidjournal.com/article/view/1334/
http://www.rfidjournal.com/article/view/1339/
http://www.aimglobal.org/technologies/RFID/what_is_rfid.asp
http://www.slais.ubc.ca/courses/libr500/04-05- wt2/www/A_Farrell/HowDoesRFIDWork.htm
T. Frank, H. Brad, M. Anand, B. Hersh, C. Anita, K. John, “RFID Security”, (2006) ISBN: 1-
59749-047-4.
V. Daniel Hunt, Albert Puglia, Mike Puglia. RFID-A Guide to Radio Frequency Identification.
Wiley-Interscience. 2007
69