386 research outputs found

    RFID Technology in Real Time Attendance Register System

    Get PDF
    RFID stands for Radio Frequency Identification which provides the ability to identify, locate and sense the conditions of animate and inanimate entities. Radio frequency identification or RFID is a generic term for technologies that are used for auto identification of people or object using radio waves. In this technology a unique serial number is stored to identify a person or an object and other related information, on a microchip of silicon that is attached to an antenna which in turn is attached to a RFID reader. The antenna enables the chip to transmit the identification information to a reader then the reader converts the radio waves reflected back from the RFID tag into digital information that can then passed on to computers running RFID application middleware, that can make use of it. The system stores the absent and present student’s attendance details in electronic format so that management of attendance becomes easy. Radio-Frequency Identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organizations as part of their automation systems. In this study, an RFID based system has been built in order to produce a time-attendance management system. This system consists of two main parts which include: the hardware and the software. The hardware consists of the motor unit and the RFID reader. The RFID reader, which is a low-frequency reader (125 kHz), is connected to the host computer via a serial to USB converter cable. The Time-Attendance System GUI was developed using visual basic.Net. The Time-Attendance Management System provides the functionalities of the overall system such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. This interface was installed in the host computer. Keywords: Systems, RFID, Technology, Attendance, Register, DOI: 10.7176/CEIS/12-2-06 Publication date: September 30th 202

    TYRE PRESSURE MONITORING SYSTEM (CONTROLLER AND DISPLAY)

    Get PDF
    Maintaining the correct tyre pressure for a vehicle is the variable on how much load its tyres can safely drive. The correct tyre pressure can carry the weight without a problem. Too little tyre pressure will eventually cause tyre failure that can lead to many unpleasant accidents. This project requires students to study the existing system of TPMS and to come up with depth research on how to design the system from scratch and prepare the model of this system. This project is the initial background work for the development of the miniature pressure sensor and controller unit for TPMS. This main purpose of these systems is to warn the driver if their tyres are loosing air pressure, leaving the tyres under inflated and dangerous. The systems attach a pressure sensor together with transmitter to the vehicle's wheel inside the tyre's air chamber. This project is performed by two students, the author and Mr Khairul Asyraff. Mr Khairul Asyraff did the sensor and transmitter part while the author did the microcontroller and the display part and finally both parts are being merged and integrated. The final objective of the project is to design circuit consist of pressure sensor, microcontroller (PIC), transmitter and receiver. The pressure sensor used is a microelectronic device. This system will read a pressure inside a tyre and transmit it to the receiver which can produce the output (display). This report represents approaches to the scope of developing microcontroller and LCD display to warn the driver that the tyre pressure is not sufficient. Input from pressure sensor is required before a transmitter transmits data to receiver and the signal will be transmit to microcontroller to convert the signal from analogue to digital before the value being display. Mostly the related information is collected from reference books and from the internet. As for conclusion, tyre pressure monitoring system is an interesting area and important to make sure the safety of the driver and everyone inside the car

    A proposal for a development platform for microcontroller-based devices

    Get PDF
    This thesis is concerned with designing, implementing and testing a miniaturised temperature data logging device. Investigations demonstrated that a microcontroller could provide a low-cost single-chip solution to this problem and after a detailed review of 8-bit microcontrollers, the MC68HCll was chosen for this task. This document also includes discussion on an environment that was developed for creating and testing MC68HC11 software and the use of Motorola\u27s evaluation boards. To ensure that the device was designed to software engineering standards an investigation into software engineering analysis techniques took place. This resulted in the Jackson Structured Programming (JSP) methodology being adapted to produce a proposed development platform suitable for microcontroller-based design

    Wearable health monitor to aid Parkinson's disease treatment

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2003.Includes bibliographical references (leaf 31).by Joshua A. Weaver.S.M

    The MAGCLOUD wireless sensor network

    Get PDF
    Initially, the aim of this project consisted in manufacturing some nodes for a wireless sensor network by hand. If this document concludes that they can be properly produced in the EETAC lab, the cost of a future large deployment using raw components would be much lower than in the case of acquiring the genuine factory assembled hardware. Also, the future students involved in the process could learn many useful advanced techniques along the way. The project ended sowing a future WSN concept, so powerful that even could end competing on the market. We designed an almost unlimited scalable platform in terms of range, number of nodes, connectivity and measuring capabilities that is 100% free, open and environment sustainable. We called this unique wireless magnitude acquisition cloud: THE MAGCLOUD. The whole system cannot be fully finished within the time and budget restrictions of a single PFC but slicing it into diverse future upgrades is a completely realistic approach. In this document, sticking to the original idea, we explain how to produce the functional hardware and software skeleton but also guide the reader on the future upgrades required to complete the MAGCLOUD system. During the realization of the project we found countless problems that luckily end up solved. Those are carefully treated so can be avoided in the future

    Secure CAN logging and data analysis

    Get PDF
    2020 Fall.Includes bibliographical references.Controller Area Network (CAN) communications are an essential element of modern vehicles, particularly heavy trucks. However, CAN protocols are vulnerable from a cybersecurity perspective in that they have no mechanism for authentication or authorization. Attacks on vehicle CAN systems present a risk to driver privacy and possibly driver safety. Therefore, developing new tools and techniques to detect cybersecurity threats within CAN networks is a critical research topic. A key component of this research is compiling a large database of representative CAN data from operational vehicles on the road. This database will be used to develop methods for detecting intrusions or other potential threats. In this paper, an open-source CAN logger was developed that used hardware and software following the industry security standards to securely log and transmit heavy vehicle CAN data. A hardware prototype demonstrated the ability to encrypt data at over 6 Megabits per second (Mbps) and successfully log all data at 100% bus load on a 1 Mbps baud CAN network in a laboratory setting. An AES-128 Cipher Block Chaining (CBC) encryption mode was chosen. A Hardware Security Module (HSM) was used to generate and securely store asymmetric key pairs for cryptographic communication with a third-party cloud database. It also implemented Elliptic-Curve Cryptography (ECC) algorithms to perform key exchange and sign the data for integrity verification. This solution ensures secure data collection and transmission because only encrypted data is ever stored or transmitted, and communication with the third-party cloud server uses shared, asymmetric secret keys as well as Transport Layer Security (TLS)

    RFID System Integration

    Get PDF
    • …
    corecore