0% found this document useful (0 votes)
66 views74 pages

Muhamad Anwar Bin Johari - Report

This document describes a thesis submitted by Muhamad Anwar Bin Johari to fulfill the requirements for a Bachelor's degree in Computer Science. The thesis proposes developing an RFID attendance management system using NodeMCU to automatically record student attendance at universities. Currently, most universities use a manual attendance system that is time-consuming. The proposed system would use RFID technology with an RFID reader and student ID cards as RFID tags to quickly and automatically record attendance. When implemented, the system could help improve efficiency and reduce the time spent on attendance tasks at universities.

Uploaded by

Muhamad Aiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views74 pages

Muhamad Anwar Bin Johari - Report

This document describes a thesis submitted by Muhamad Anwar Bin Johari to fulfill the requirements for a Bachelor's degree in Computer Science. The thesis proposes developing an RFID attendance management system using NodeMCU to automatically record student attendance at universities. Currently, most universities use a manual attendance system that is time-consuming. The proposed system would use RFID technology with an RFID reader and student ID cards as RFID tags to quickly and automatically record attendance. When implemented, the system could help improve efficiency and reduce the time spent on attendance tasks at universities.

Uploaded by

Muhamad Aiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

Universiti Teknologi MARA

RFID Attendance Management System Using


NodeMCU

Muhamad Anwar Bin Johari

Thesis submitted in fulfilment of the requirements


for Bachelor of Computer Science (Hons.) Data
Communication and Networking.

March 2021
SUPERVISOR APPROVAL

RFID Attendance Management System Using NodeMCU


By

MUHAMAD ANWAR BIN JOHARI


2019593369

This thesis was prepared under the supervision of the project supervisor, Albin Lemuel
Kushan. It was submitted to the Faculty of Computer and Mathematical Sciences and
was accepted in partial fulfilment of the requirements for the degree of Bachelor of
computer Science (Hons.) Data Communication Networking.

Approve by

.......................................
Albin Lemuel Kushan
Project Supervisor

JULY 14, 2021


STUDENT DECLARATION

I hereby declare that this thesis and project entitled “RFID ATTENDANCE
MANAGEMENT SYSTEM USING NODEMCU” is my own of quotations and
summaries which have been acknowledgement in full. I also declare that the analysis
and the research are for academic purpose only.

.......................................
Muhamad Anwar Bin Johari
2019593369

JULY 14, 2021


ABSTRACT
ABSTRAK
ACKNOWLEDGEMENT

I would like to praise Alhamdulillah to Allah for His blessings, all of my issues have
been streamlined, and I am capable of doing this job within the allotted time.
Additionally, I want to express my gratitude to my supervisor, Sir Albin Lemuel
Kushan, for giving more comprehensive instructions for each job that has to be
completed. Special appreciation also to Madam Faridah Sappar, my CSP 600 project
formulation lecturer, who gave many notes and instructions from the beginning to the
final week.

Moreover, I would also like to thank my parents who always encouraged me in


preparing this thesis. Finally, to my classmates who are always ready to exchange
information online, I want to express my gratitude for your generosity. Thank you.

iv
TABLE OF CONTENTS

CONTENTS PAGE

SUPERVISOR APPROVAL

STUDENT DECLARATION

ABSTRACT

ABSTRAK

ACKNOWLEDGEMENT iv

TABLE OF CONTENTS v

LIST OF TABLES viii

LIST OF FIGURES ix

LIST OF SYMBOLS x

LIST OF ABBREVIATIONS xi

LIST OF APPENDICES xii

CHAPTER ONE: PROEJCT MOTIVATION EVALUATION

1.1 Project Background 1


1.2 Problem Statement 2
1.3 Objectives 4
1.4 Project Scope 4
1.5 Project Significance 5

CHAPTER TWO: LITERATURE REVIEW

2.1 Introduction 6
2.2 Radio Frequency Identification (RFID) 6
2.3 Attendance Management System 7
2.4 Internet of Things (IoT) 9
2.5 Communication Module (NodeMCU) 14
2.6 Related Work
2.6.1 Biometric Attendance System
2.6.2 RFID Door Access Control
2.6.3 RFID Key for Bike Security
2.7 Summary

CHAPTER THREE: PROJECT METHODOLOGY

3.1 Introduction 25
3.2 Project Methodology 25
3.3 Elaboration of Project Methodology 27
3.3.1 Project Framework 28
3.4 Analysis Phase 29

3.5 Design Phase 34

3.5.1 Design of Prototype

3.5.2 Project Architecture

3.5.3 Hardware Requirement

3.5.4 Software Requirement

3.5.4.1 XAMPP

3.5.4.2 Arduino IDE Software

3.5.4.3 Notepad++

3.6 Implementation Phase

3.7 Testing Phase

3.8 Documentation Phase


3.9 Flow Chart

3.10 Project Milestone

3.11 Summary

CHAPTER FOUR: FINDINGS AND DISCUSSIONS

4.1 Introduction

4.2 Result and Analysis

4.2.1 Hardware Functionality

4.2.2 System Functionality

4.2.3 Discussion

4.3 Summary

CHAPTER FIVE: CONCLUSION AND RECOMMENDATIONS

5.1 Introduction

5.2 Conclusion

REFERENCES 38

APPENDICES 40
LIST OF TABLES

TABLE TITLE PAGE

Table 2.1 Data Written on RFID tag 10

Table 3.1 Hardware Specification 30

Table 3.2 Arduino IDE Specification 33

Table 3.3 Project Milestone 34

viii
LIST OF FIGURES

FIGURE TITLE PAGE

Figure 2.1 Timeline of RFID applications. 8

Figure 2.2 Context Diagram for System Proposed. 9

Figure 2.3 Architecture of (IoT) 15

Figure 2.4 ESP8266 block diagram 16

Figure 2.5 Flowchart of IoT Based Biometric Attendance System

Figure 2.6 Problem occur during fingerprint scanning proses

Figure 2.7 a – access control system; b – system

Figure 2.8 Passive Switch Key Block Diagram

Figure 2.9 System Flowchart 20

Figure 3.1 Waterfall Methodology 26

Figure 3.2 Project Framework 28

Figure 3.3 Interfacing RFID RC522 with NodeMcu Module

Figure 3.4 Project Architecture of RFID Attendance Management System

Figure 3.5 XAMPP Control Panel Interface

Figure 3.6 Arduino (IDE) software

Figure 3.7 Interface of Notepad++

Figure 3.8 ESP8266 Boards

Figure 3.9 MySQL Database Records

Figure 3.10 User Flow Chart

Figure 3.11 Admin Flow Chart


LIST OF SYMBOLS

V - Voltage

GHz - Frequency

mAh - Electric Charge

mA - Supply Current
K - Mass
° - Angle
°C - Temperature
" - Length
g - Weight
mm - Measurement

X
LIST OF ABBREVIATIONS

URL

RFID

xampp

LCD

UID - Unique Identification numbers

IP

MySQL

Wi-Fi - Wireless Fidelity

USB - Universal Serial Bus

IoT - The Internet of Things

IDE - Integrated Development Environment

COM - Communication

Mbps - Megabits Per Second

SPI - Serial Peripheral Interface


LIST OF APPENDIX

APPENDIX TITLE PAGE

Gantt Chart Project Gantt Chart 53

xii
CHAPTER 1

INTRODUCTION

This Chapter explains the project background, problem statement, the objectives of
proposing this project, project scope, and project significance.

1.1 Project Background

Drastic technological change has the potential to make a significant difference


in addressing common challenges. The first definition is the creation and use of
tools, equipment, materials, and processes to resolve human issues. The term
"technology" is frequently associated with designs and devices that employ the
most up-to-date scientific concepts and methods. Nowadays, there are more than a
hundred institutes of higher education operating in Malaysia, each institute has a
student of more than 1000 people. Due to the enormous number of students, this
will have an impact on the attendance system. Attendance can be kept manually or
with the help of an automated system. Usually, university students typically
employ manual ways to keep track of student attendance which by signing
attendance forms. This manual time entry will cost a time consuming which will
take almost 10 minutes to wait for the entire class to sign it.

As a result, a variety of efforts may be taken to assist students in filling the


attendance which is the RFID attendance system. Radio Frequency Identification
(RFID) is a technology that employs electromagnetic fields to identify and detect
electronic information tags embedded in tiny chips that are automatically
connected to items. This tag does not need to be at the same level or in the same
direction as a barcode to be adhered to the item to be detected. It works based on
radio waves.
1
These tags are utilised in a variety of sectors, including tracking the movement
of industrial components in the production process, storing pharmaceutical items
in warehouses, and implanting animals and pets for instant identification.
Moreover, In the not-too-distant future, RFID systems' capacity to transmit precise
and accurate data on tagged products will enhance efficiency and bring various
benefits to the corporate community and consumers alike.

In this project, RFID technology is employed to automatically record student


attendance. This project will employ an RFID reader and a student ID card as an
RFID tag. This RFID technology will be linked to a web page. This strategy is
more successful in preventing difficulties during the manual attendance procedure.

2
1.2 Problem Statement

Every institution in Malaysia, particularly, need a more efficient attendance


system in order to obtain more precise statistics. When it comes to educational
institutions in Malaysia, whether private or public, the traditional system of taking
daily attendance is still used. The majority of lecturers must print their own attendance
forms for each class they teach. Using this ancient approach, various problem
statements may be obtained, which are the number of absentees was miscalculated,
neglecting to get the attendance sheet printed or attendance sheet not being brought to
class, attendance sheet is missing or misplaced, and probability of students forging
signatures of friends.

In Addition, even though manual attendance does not cost anything to set up
an attendance system, it does cost anything to print the attendance sheet regularly.
Manually recording attendance will take a long time. Sometimes, there will be a human
error in filling attendance sheet. A student might correct their mistakes, among other
things, this may take up a significant amount of your time. In RFID Attendance
Management System, however, students will be able to do it in a second. Furthermore,

Moreover, using the conventional method deprives academic staff, students,


and guardians from transparency of the absenteeism process. Sometimes, guardians do
not know their children’s attendance. Academic staff likewise also have little
knowledge of the absenteeism process. The contributions of this paper are as follows:
first, the paper provides insight on the problems associated with absenteeism
management in the context of Malaysian educational institutions; and second, the
paper proposes an integrated platform for the absenteeism monitoring process. The
remainder of the paper is organized as follows. First, the paper will explain relevant
Information System (IS) literature related to the study. Then, the methodology of the
study will be presented. Next, the findings of the study will be highlighted. Finally,
the paper concludes with recommendations for future studies, as well as mentions
some limitations faced while conducting this study.

3
1.3 Objective

a) To develop graphical user interface (GUI) using XAMPP server that will
integrate with RFID system

b) To ensure the data transmission between RFID RC-522 module and website
localhost server developed is successful.

1.4 Project Scope

The scope of this project are as follows:


a) This project proposes using Radio Frequency Identification (RFID) tags to
obtain students’ attendance data.
b) PHP web server-based is used as an attendance management system to
monitor students’ attendance.
c) Admin will be able to add, update, remove users and add a new device (RFID
tag).
d) ESP32 Wi-Fi Module will collect the RFID tags from multiple users and send
it to the attendance management system.
e) All the data collected will be saved in a database which is MySQL.

4
1.5 Project Significance

Radio Frequency Identification (RFID) based attendance system is a technology


that simplifies any workplace, school, college, etc. For example, some universities
or colleges are using paper as an attendance system. This will result in several
issues, including cheating in filling attendance, time-consuming of students to sign
in their name, and high risk in losing attendance paper.

However, using this RFID-based attendance system will enhance the efficiency of
the method for keeping track of student attendance. There are various advantages
to participating in this project and the first one is real-time access. By using this
radio frequency identification attendance system, lecturers will be able to track the
exact moment of their student attendance. There are no longer any concerns with
students arriving late to class since the lecturer keeps a detailed record of when
they arrive.

5
CHAPTER 2
LITERATURE REVIEW

2.1 Introduction

Chapter 2 describes any discussion related to the project title. All previous
review are based on finished publications that have been cited in articles, books, and
journals. This chapter also will be contained information that is needed for the current
investigation.

2.2 Radio Frequency Identification (RFID)

Based on the article written by (Rajaraman, 2017), RFID tags are intuitive with
the inclusion of processors and sensors in RFID tags. Since the early 2000s, radio
frequency identification (RFID) has been used. It is also a technology that is frequently
utilized to assist people from a variety of businesses. Moreover, The RFID system is
also tightly linked to the Internet of Things (IoT), where it may develop world-class
technologies to improve consumer comfort.

The author also defined that this tag antenna technology system is consist of
three parts which are an RFID reader, an RF antenna, and an RFID tag. The RFID
reader has four parts which are a power source, a radiofrequency generator, circuits to
amplify, digitize, and store the analog signal received from the tag, and a rudimentary
microprocessor to process the data in the memory. This integrated circuit however will
be fitting to an external computer. After that, the reader is attached to a radio frequency
antenna, which sends out a radio signal. For example wireless signals to a tag. In
reaction to radio signals reflected by a tag's antenna, this antenna receives them as
well. In addition, RFID technology becomes cost-effective only when semiconductor
technology is matured. Below is a timeline of the RFID application.

6
Figure 2.1: Timeline of RFID applications.

The above description mentioned about the chronology of RFID applications.


RFID has several advantages, many of which you can take use of right now with
existing goods. Other benefits are also partially attainable, and it is envisaged that
technological advancements will gradually bring these benefits to maturity. Thus,
because of the variety and originality of this RFID technology, it will be able to provide
a wide range of applications. Some of the advantages may infringe on people's privacy
rights, which might cause problems when RFID is used in certain circumstances.
Despite these drawbacks, RFID will most likely be the technology of choice in other
sectors.

Last but not least, Due to the increased demand for RFID technology, this is a
tremendous benefit for RFID technology vendors. This will produce a million
productions of this technology. This is because the use of RFID tags is escalating due
to the reduction of the RFID tags price itself. After that, not only will the RFID
business have a significant influence, but RFID systems such as the Internet of Things,
GPS, Cloud Computing, and Big Data analysis will also see increasing innovation. For
other businesses, such as RFID systems in health, biology studies, and scientific
apparatus, will be discovered as well.

7
2.3 Attendance Management System

Monitoring students’ attendance is considered as one of the issues faced by


many universities, in Malaysia especially. To begin with, Attendance Management
System is used to track student’s attendance through Attendance Management.
Furthermore, It's the method to track whether the time spends in class is enough or not.
Attendance management may be accomplished by keeping track of staff hours on
paper, using spreadsheets, punching time cards, or through online attendance software.
According to (Rosman, M. R. M., 2020), most private and public institutions still use
the old system of recording students' attendance daily. Academic staff must normally
print out the attendance sheet and bring it to class with them.

Figure 2.2: Context Diagram for System Proposed.

Figure 2.2 shows the circulation of the whole system. This system that
consisted of the element of the information of individual and monitoring system is also
known as the Attendance Monitoring System. There are four main structures for the
system, which are Admin, Student, Lecturer, and Guardian.

8
The information system interacts directly with the administrator, student, and
lecturer, whereas the guardian interacts indirectly by getting notifications as output
from other processes. The role of the information system will be further explained in
the next section. In addition, it would be ideal if the attendance management system
could create reports that could be delivered to the guards. Parents may monitor their
child's attendance on a daily, weekly, or monthly basis. In web-based monitoring,
online parent tracking, also known as third-party tracking, is analyzing network traffic
from the browser or device and detects any third-party destinations related to tracking.

2.4 Internet of Things (IoT)

The Internet of Things (IoT) is the mix of a network and physical items that
are connected by sensors, software, and other associated gear to link devices and
systems. According to a research article written by Sura I. Mohammed Ali and
Marwah Nihad (2021), to assist two ways of communication between students and
lecturers, either online or physically, the method of embedding sensors and also mobile
devices into IoT is a good method that can be implemented in the academic
environment. Despite the Coronavirus disease (COVID-19) now affecting the entire
country, more internet of things (IoT) applications are required to aid the educational
system. The learning process was not interrupted. The lecturers have to take several
measures to put the learning sessions into action. Introducing video conferencing as a
platform for interaction between students and professors is one of them.
9

Figure 2.3: Architecture of (IoT)

Figure 2.3 above is an architecture of the Internet of Things (IoT). Four layers that
contained in this architecture. The first layer is shown in figure 2.3, the sensor layer,
sense or accepts data physically, processes the data, and releases it to the network.
Secondly, an internet gateway is needed in this layer. Advanced gateway will create a
connection between the sensor and the network also gives effectiveness like the
protection of malware, and the data management services. Furthermore, data
processing utilities involve the ecosystem of the IoT. Data processing will be sent to
the data sensor which will be accessed by the compatible software application. Last
but not least is the execution layer or application layer. Cloud management is a location
for users to handle stored data in any job that utilizes IoT. The most important thing in
developing an IoT system, is an architecture for a safer IoT environment needs to be
sufficient and secure architecture for IoT layer infrastructure (HaddadPajouh, H.,
Khayami, R., Dehghantanha, A. 2020).
10
2.5 Communication Module (NodeMCU)

NodeMCU ESP8266 module is a communication development board and also


known as ESP8266 -12E WiFi module. This board must be programmed using
Arduino IDE software and used C and C++ programming language. Sensing and
wireless communication potential has become such a satisfying innovation and the cost
component has not been a hindrance. According to (Mesquita, J, 2018) Wifi or wireless
communication is also preferred as low-energy wireless and low-energy Bluetooth that
operate with other technologies that sensing through communication operators.

Figure 2.4: ESP8266 block diagram

Figure 2.4 above shows about ESP8266 block diagram. The main features that
make this communication board desirable to implement in IoT applications are
standard Institute of Electrical and Electronics Engineers (IEEE) 802.11 b/g/n (WiFi)
compliance with an onboard antenna. 802.11 b/g/n is a WiFi modem that will emit a
signal that is compatible with B, G, and N mode devices. When N-only devices are
used in the home, changing the wireless mode to N-only may assist to enhance speeds.
11

In addition, according to (Parihar, Y. S. ,2019), NodeMCU put forward a


complete solution for Wi-Fi networking, it allows the host to offload all Wi-Fi
networking activities to a different application processor. The author also mentioned
that ESP8266 NodeMCU has dynamic processing and storage potential that allows it
to be integrated with sensor-specific devices.
12

2.6 Related Work

In this sub-topic, there are three similar project that related to each other. However,
each of these initiatives has its own set of benefits.

2.6.1 Biometric Attendance System

In a project developed by (Tripti Jain et al., 2020), biometric scanner which is


fingerprint based is used collect the attendance data. The fundamental aim of this
project is to streamline the method for recording attendance. The data collected is
saved in ThingsBoard IoT cloud platform and can manage the collected data visually,
device management, and process the data.

Figure 2.5: Flowchart of IoT Based Biometric Attendance System


13

The flowchart of IoT Based Biometric Attendance System as shown in Figure


2.5, the author’s project starts with finger scanning. the embedded module used is GT-
511C3, which is a fingerprints scanner or FPS which has high speed and high accuracy
(Tripti Jain et al., 2020). High speed and high accuracy are an important thing in
making the finger scanning procedure go as smoothly as possible. Once the student’s
fingerprint matched, the id of the fingerprint will be sent to server. This is because
when the server receives biometric data from the system, it updates the student's
presence. Furthermore, the author also used Arduino IDE software as the platform to
program the hardware.

Figure 2.6: Problem occur during fingerprint scanning proses

Figure 2.6 shows there are several problems that may occur during the
fingerprint scanning process. According to (L Karthik Narayan et al., 2020),
Passwords are not accurate enough to secure persons' belongings when utilizing an
outdated security mechanism, especially when employing a biometric identification
system. However, fingerprint scanning also occur an error during the scanning and
among them are finger misplacement, dirty finger, orientated, skin problem, and wet
finger.
14

2.6.2 RFID Door Access Control

The radio frequency identification (RFID) access control system is a technology that
has been around for a long time. The conventional RFID-based controlled access
system consists of a single unique tag that determines whether data is permitted or
refused access to the areas. According to (Khabarlak, K., & Koriashkina, L. 2021),
The project does not just rely on RFID, but also incorporates additional features such
as mobile access control and a server-side control system. Moreover, the author
mentioned that multi features together with a standard passive RFID tag will gives
more satisfactory results.

Figure 2.7: a – access control system; b – system

Furthermore, the data collected from the RFID tag will be stored in a binary format
called NFC Data Exchange Format (NDEF) which was applied on Android. There are
several written in the system, among them are Global Unique Server Identifier
(GUID), which is used to verify user registration in one organization. The second one
is unsigned integer indicating the organization's gate id. Thirdly, Android Application
Record (AAR). This application used to launch whenever the device is near to the tag
but the mobile must unlock first. The last system written by the author is Universal
Link. Table 2.1 provides a more complete description of the data written on the RFID
tag.
15

Table 2.1: Data Written on RFID tag

Furthermore. In this project, a client-server application has been described.


There are administrative system and the function is to configure gate access regulations
and monitoring using filters based on access time, user, and RFID-tagged gate. In
addition, in order to unlock the door, the author makes use of a mobile application that
was created to register the door as well as the key that you wish to use. This
registration is very important precaution because the system software maintains and
tracks the user information has been designed entirely to keep track of all previously
recorded information (Shafin, M. K et al., 2015). Because of the low cost of using the
cheap RFID system, if this system can be implemented in a school or university, it will
be a huge accomplishment.
16

2.6.3 RFID Key for Bike Security

When it comes to the motorcycle's security, the ignition lock switch is generally the
sole thing to consider. Thieves will have an easier time stealing motorcycles as a result
of this. RFID Key for Bike Security is a project established to test the multi-purpose
electronic lock for bike or scooter utilizing various options. The objective of this
project is to secure the vehicles from theft using RFID security features. According to
project developed by (Srithar, S et al., 2019), normal key was replaced to the passice
swtich key using RFID. Moreover, the use of HELMET enforces the need of wearing
a helmet and detects alcohol use straight from the start of the motorcycle.

Figure 2.8: Passive Switch Key Block Diagram

Furthermore, figure 2.8 shows the block diagram used by the developer in the passive
switch key. Arduino IDE software is used to conduct all the other component and all
of it are buzzer, LCD, Reader Module, and including RFID tag. The verification of the
RFID tag use 12 digits code as the reader module while for the buzzer, one beep one
will heard once it is approved.
17

Figure 2.9: System Flowchart

The flow chart shown in figure 2.9 tell of how the flow of the system using
Passive Switch Key worked. Moreover, with the use of an IR sensor, the author
discussed the effectiveness of wearing a helmet or not wearing a helmet, as well as
alcohol consumption using the MQ-6 alcohol sensor. Next, if the speed breaker is
excessive, the developer employs an ultrasonic sensor to adjust its speed, either
slowing it down or speeding it up, and then continues the ride. As a result, a self-stop
flow mechanism has already been installed on this system to prevent any mishaps.

18
CHAPTER 3

PROJECT METHODOLOGY

3.1 Introduction

Research methodology refers to procedure for the entire ‘RFID Attendance


Management System’ development. It assists in explaining the research techniques and
conveys the concept to the audience in an elegant way that is mostly dependent on the
project. It also contains a detailed explanation of the hardware and software utilised,
as well as information on how the data is transferred to the database.

3.2 Project Methodology

Project methodology is a guide and a process used whether, planning, manage,


design and execute project. This method determines how the project is implemented.
In every project development, each phase is significant in its own right. This seeks to
guarantee that each phase in the construction of a project goes smoothly. Therefore,
the waterfall technique is the most appropriate form of methodology to apply for this
project. The creation of this waterfall approach entails a procedure that flows like the
waterfall itself, such as phases of analysis, design, development, and testing. This
means before moving on to the next phase, each phase must be completed first. To
begin with, the first phase which is requirement explained about the analysis of the
project. All information must be gathered regarding the topic must be record in one
document and the detail are including cost, any risk, or timeline needed

19
Figure 3.1: Waterfall Methodology

Next, second phase that shown on figure 3.1 above is to select the appropriate
hardware and software for project development. After that, once the phase one and two
is executed, project implementation can be done. In this phase, any hardware
assembling, or coding application will be implemented. However, if there is any
problem or changes required in this phase, The prior step, namely the design phase,
must be referred again. After that, testing phase need to be done to point out any error
occur whether the problem comes from the hardware of software. After that, for the
documentation phase, once the testing phase is done, all of the data recorded will be
stored at the MySQL database. MySQL is an open sources database management
system that interacts with an operating system to install a relational database in a
computer's storage system, manages users, permits network access, and simplifies
database integrity testing and backup generation. Last but not least, everything
pertaining to project documentation will be included in the final report, which will
serve as the project's thesis.

20
3.3 Elaboration of Project Methodology

3.3.1 Project Framework

1. Analysis 2. Design

- Research on - Project architecture


project topic
- Scenarios, layout and
- Cost needed project topology

- Survey hardware - Product requirement


and software
needed

4. Testing

- Testing the whole


project including
3. Implementation
system

- take a note on any - Coding application


problems occur
- Component assembling

5. Documentation

- Data stored in
MySQL database

- Update project in
report

Figure 3.2: Project Framework

21
3.4 Analysis Phase

To begin this project, some framework must be developed during the analysis
phase, first by selecting a suitable title. This is critical to avoid any title changes owing
to a hefty title or a title that is identical to another. In addition, a survey of the hardware
or software to be utilised must be conducted. This seeks to figure out how much money
is required to offer all of the essential equipment. Once satisfied with the title, the
chosen title must be presented to the appropriate supervisors. Furthermore, in this
analysis phase, chapter 1 which is introduction need to be prepared, chapter 2 which
consists of literature review, and also research methodology as chapter 3. for chapter
1, some information such as project background, problem statement, objectives,
project scope and project significance need to be provided. Next, in order to improve
this area of the literature review, roughly 15 articles should be prepared for Chapter 2.
As a comparison of the projects that have been implemented, 3 relevant worked should
also be included in this chapter 2. Lastly, this research methodology, which is covered
in detail in chapter 3, explains how this project is carried out. The sort of approach
adopted is one of them. All phases are explained, as well as the types and specifications
of the hardware and software utilised, the project flowchart, and project milestones.

3.5 Design Phase

Several contents are discussed in this design phase, including Design of


Prototype, Project Architecture, hardware, and software employed. It demonstrates
how to interface RFID RC522 with NodeMcu Module for the prototype design. Both
components use the same pins. Following that, Project Architecture provides an
overview of the project flow. Last but not least, the hardware and software
specifications utilised to construct this project.

22
3.5.1 Design of Prototype

The research design refers to the overarching approach used to connect the
many components of the study in a cohesive and logical manner, thus guaranteeing
that the research issue is successfully addressed. It serves as the blueprint for design
of prototype, component used, and analysis.

Figure 3.3: Interfacing RFID RC522 with NodeMcu Module

Above is a figure that shows Interfacing RFID RC522 with NodeMCU


Module. To link these two components, a male to female wire is required. As
previously indicated, a total of 7 wires must be linked according to the pins' respective
roles. If the wire is not correctly attached, its function will also provide a different
result. In reality, the electrical component's coding will likewise generate an error.

23
3.5.2 Project Architecture

Figure 3.4: Project Architecture of RFID Attendance Management System

This architecture above explained about the flow of the project. To begin with,
Students must first have an admin-registered RFID tag/card. The RFID attendance
device, which consists of an RFID module and a NodeMCU board, must be tapped to
the card. The lecturer must update the student's information once the student taps the
RFID tag/card on the device; among the information that must be changed is the
student's complete name, student id, and student email. Not to mention that instructors
who wish to register students must first enable enrol mode. because there are two
modes to choose which are enrol and attendance mode.

Furthermore, to take student attendance, the instructor must enable attendance


mode after enrolling and updating student information. The student's details and the
precise time will be shown on the user log page as soon as the student taps the RFID
tag. All of the information gathered will be saved in a database, which will be
accessible only by the professor. Last but not least, This RFID attendance tracking
system may also be monitored by instructors using their own mobile phones. simply
by inputting an IP address that is the same as the lecturer's laptop or computer's IP
address.
25
3.5.3 Hardware Requirement

Number Hardware Specification


1 NodeMCU ESP8266 12E • ESP-8266 32-bit Microcontroller
Board • 80 MHz Clock Speed
• 3.3 V Operating Voltage
• Fitted 802.11 b/g/n Wi-Fi
• Micro USB connector
2 RFID-RC522 Module • MFRC522 chip-based board
• 13.56MHz Operating Frequency
• SPI Interface
• 10 Mbit/s Data Transfer Rate
• 60mm × 39mm Dimensions
3 Male to Female Jumper • Female header at the one end, male
Wires header at the other end
• Wire Colors: brown, red, orange,
yellow, green, blue, purple, grey,
white, black
• Fits breadboard

Table 3.1: Hardware Specification

This phase consists of hardware needed in this project. As seen above,


NodeMCU is an open-source platform based on ESP8266 which can connect objects
and let data transfer using the Wi-Fi protocol. In addition, by providing some of the
most important features of microcontrollers such as GPIO, PWM, ADC, and etc, it can
solve many of the project’s needs alone. To order to use this hardware, it is important
to upload the additional board manager URLs at the preference setting. Once the URLs
has been uploaded, install ESP8266 board and this board manager are ready to use.

25
Next, hardware that uses to communicate with the RFID tag are called RFID-
RC522 Module. This module is capable of producing 13.56MHz electromagnetic
waves and communicating with a microprocessor chip through Serial Peripheral
Interface (SPI) with 10Mbps maximum data rate. Finally, a male to female jumper
wire is used as the third hardware in this project. Moreover, this wire connects all of
the components and may also be used with the board.

3.5.4 Software Requirement

3.5.4.1 XAMPP

Figure 3.5: XAMPP Control Panel Interface

XAMPP is a web server that allows users to develop and test applications using
local web servers. The software's creator is known as Apache Friends, and the
configuration code may be updated by the user as desired. Users who wish to alter an
existing port to the port they want to use, for example, are permitted. This package
also includes the Apache HTTP Server, MariaDB, and interpreters for PHP and Perl,
among other computer languages.

26
Moreover, there are 11 languages mentioned, and it is also compatible with
additional systems including MacOS and Linux. Furthermore, the letters XAMPP
stand for "cross-platform," "A" stands for "Apache," "M" stands for "MySQL," and
the two letters P stand for "PHP" and "Perl," respectively. Typically, XAMPP users
test their host or server by building a local web page with the goal of obtaining a
response from the server and the client. Laptops and PCs are regularly used gadgets.

3.5.4.2 Arduino IDE Software

Figure 3.6: Arduino (IDE) software

Arduino (IDE) software is represented as Arduino Integrated Design


Environment. This software is an open-source operating system platform in a form of
single board microprocessor device controller. This microcontroller in Arduino (IDE)
is a program that is reprogrammable. The only officially approved method of
programming Arduino is via the use of the Arduino language and the Arduino IDE.
Moreover, A visual programming method is another way to program an Arduino
board. Arduino normally use a visual programming language.

27
The Arduino Integrated Development Environment or Arduino Software
(IDE), contains a text editor for writing or code editing, a text console, a text area, a
toolbar with buttons for common functions and a series of menus. It connects to the
Arduino hardware to upload programs and communicate with the components.

Arduino Software written program are called sketches or book of sketch. When
the user wrote the codes in the text editor, the file can be saved with the file.ino format.
Moreover, the other function that included are crop/cut and then paste it. Searching
and replacing text also will help the user to replace any text they want. The message
box provides feedback throughout the storing and exporting processes, as well as
shows mistakes.

The console shows text that the Arduino Software generates, including error
messages and other information. Moreover, the toolbar buttons allow user to verify
and upload programs, create, open, and save sketches, and open the serial monitor.

Book Sketching
The Arduino IDE is based on the idea of a sketchbook, a standardized location
for storing code (or sketches). The drawings in sketchbook may be accessed through
the File button and the click Sketchbook menu button item or using the toolbar's Open
button. When the Arduino software is used for the first time, it automatically creates a
directory for sketchbook. The Preferences dialogue allows user to see or modify the
location of the sketchbook.

28
Uploading
When a sketch is uploaded in Arduino software, a little program is uploaded
into the board's program. It allows users to upload the code without requiring an
additional component. When the board is reset, the bootloader is enabled for a few
seconds before launching the most recently uploaded sketch to the microcontroller.
The on board which pin 13 LED will begin blinking as the bootloader starts (i.e. when
the board resets).

Compilation, Multiple Files and Tab


Allows for the management of drawings with multiple. These may be standard
Arduino code files (without an extension), C files, C++ files, or header files.

Libraries
Libraries enhance the usefulness of graphics by enabling them to interface with
hardware and handle data. To include a library into a drawing, use the Drawing option
and then click Import Library option. This creates the library from the user's artwork
and adds one or many “include” lines to the sketch's top. Because they are submitted
alongside the user's artwork, libraries take up more space on the board. If a sketch no
longer needs a library, remove the “include” lines from the top of the code.

Third-Party Hardware
Third-party hardware support may be added to the hardware directory of the
sketchbook directory. Platforms such as board definitions (board menu), core library,
bootloaders, and programmer definitions may be installed. Create a directory for the
hardware first, and then unzip the third-party platform into its own subfolder. (If the
user uses the subdirectory name "arduino," the built-in Arduino platform is
overridden.) To uninstall a software, just delete its directory.

29
Serial Monitor
Serial Monitor transmitted through USB or connection from Arduino board.
By entering the text, to submit the data to the board, click “send” button. When the
user choose to use serial monitor on window, mac, or linux, the board will be reset. It
is important to take a look that serial monitor does not handle control things. If the
design needs complete administration of serial connections, including control
characters, the user may connect an external terminal program to the Arduino board's
COM port.

Number Software Specification


1 Arduino IDE Arduino IDE 1.8.15
Table 3.2: Arduino IDE Specification

30
3.5.4.3 Notepad++

Figure 3.7: Interface of Notepad++

A very comprehensive text editor for Windows. Developed in 2003 and


Notepad++ is used for both writing text and source code. Along with Windows, Mac
and Linux text documents, the application has specific support for more than 50
programming languages. Moreover, in order to create a new project or file, it will pop
up a new tab. A features like auto-completion for a word are able in this platform, and
there is setting to auto save the coding as well. Additionally, saved document that not
known extension like Python will saved according the color codes itself depends on
the programming language used.

PHP Source Code

PHP, or Hypertext Preprocessor, is a recursive acronym in which the first letter


stands for the acronym itself. This PHP is a default scripted language on Apache web
server, where MySQL is part of Linux + Apache + MySQL + PHP/Perl/Python
(LAMP). Moreover, when a php page is accessed, the web server, which is an Apache
server, executes the php code and outputs an HTML webpage. to distinguish this php
code from other code, php uses its start code such as <? php and closes using ? > sign.

31
3.6 Implementation Phase

Figure 3.8: ESP8266 Boards

This is an essential phase since it is the project's implementation phase. When


it comes to IoT, soldering the components that will be utilised is a need. To deliver
electrical current to the RFID module RC-522, soldering between the female wire and
the module is done in this project. Moreover, as shown in figure 3.8 above, the esp8266
board must first be installed, which is done with Arduino IDE software. To specify the
new external board manager wanted to install into this Arduino IDE programme, it
need to provide extra board manager URLs. In this project, URLs
http://arduino.esp8266.com/stable/package_esp8266com_index.json is used.

32
3.7 Testing Phase

Next, each project must go through a testing step after the implementation
process has been completed. Because this project comprises two components that must
be examined, namely the ESP8266 device, the RFID module, and the RFID attendance
management system, the flaws must be highlighted one by one. The coding entered
into the devices used must be proper, and the coding can be uploaded into the device
used to check the RFID module device. When coding is successfully uploaded, it
signifies that the coding on the devices is precise. Then, open the serial monitor to see
if the RFID tag/card is responding to the RDIF module. A run-time process will
normally show on the monitor serial as soon as the RFID card touches the RFID
module.
In addition, the RFID attendance management system must be evaluated.
Because once the RFID module is touched, data will continue to enter the user log as
an indication that the user has been present, the system will be linked to it. Other
functions, such as user login, registration, and data modification, must be tested as
well. If any functions fail, data should be recorded, and the preceding part of the
implementation phase should be re-implemented until the project is free of faults.

33
3.8 Documentation Phase

Figure 3.9: MySQL Database Records

The gathered data is saved in a MySQL database, according to the last phase,
documentation. admin data, such as emails and passwords, registered use data, and the
precise time students should arrive for class. The advantages of databases over
spreadsheets may be divided into numerous categories. First and foremost, it is simple
to use. To view or verify the data gathered, the administrator merely requires access to
the internet. Furthermore, the information acquired is correct. This is because all data,
including names, student IDs, and class attendance times, is correct and may be
modified by students at any time.

Last but not least, the last phase is to complete the project's entire report, which
includes chapters 1 through 5. The major goal of the project report is to keep track of
current development and compare it to the original plan. Preparing a project report is
also significant since it allows the writer to track down any project flaws.

34
3.9 Flow Chart

Start

User tap the FID


tag/card. first tap for
time in

User time log


updated at
management system

End

Figure 3.10: User Flow Chart

Figure 3.10 above explained about flow chart of the users. To begin with, the
initial step for users is to touch the RFID tag/card as a time in record after being
registered by the admin. Next, once the user tap for the first time, the time in record
will be updated into the RFID attendance management system.

35
Start

Admin login

Admin manage
student’s
information

enroll
Admin choose Admin register
enroll or student’s detail
attendance to RFID tag/card

attendance

Student tap and time


in/out detail shown
in students log page

Admin monitor
student time in

End

Figure 3.11: Admin Flow Chart

36
Figure 3.11 above describe the flow chart for admin. Only the RFID attendance
management system is used for admin duties. Logging into the system is the initial
step for the administrator. The administrator or lecturer in charge will be provided the
email address as well as the current password. Once the admin login, the main page
for the system will show all the users that have been registered. Moreover, admin will
be able to manage users, enrol devices, register new admins if necessary, and log out
sessions, among other things. In the manage user page, admin will be able to add user,
update user’s information, and remove any users. Lastly, for the main function for the
admin is to monitor the time in of the students.

37
3.10 Project Milestone
Project milestone consist of duration that shows an important achievement
during the project development. Table 3.4 below will describe the project milestone

Phases Activities Progress Execution Milestone


Analysis - Research on - Discuss with - Introduction Week 1 –
project topic supervisor - Literature Week 14
- Cost needed - research for chapter Review
- Survey 1- chapter 3 - Research
hardware and Methodology
software needed
Design -Project Week 15 –
architecture Week 16
-Scenarios, - Prepare project Project Layout
layout and layout to supervisor
project topology

Implemen - Coding - solder component Week 16 –


-tation application used Project Week 27
- Component - Install board Prototype
assembling manager needed in
Arduino IDE
Testing - Testing the - RFID attendance Week 28 –
whole project management system Week 29
including testing Project
system - test whether RFID Improvise
tag/card function or
not
Documen - Data stored in Week 30 –
-tation MySQL Week 34
database - Generate full report Project Report
- Update project
in report

Table 3.3: Project Milestone

38
3.11 Summary

As a conclusion for this research, to demonstrate that the study is effective and
successful, the data must be genuine and trustworthy. As a result, the research was
carried out according to established protocols, and the data collected from this study
was needed in order to achieve the study's goal as well as to back up subsequent results.
Moreover, the waterfall model is a traditional system development life cycle model
that uses a linear and sequential method to build a system. The model is called a
waterfall because it progresses methodically from one phase to the next in a downward
direction. The output of one phase is utilised as the input of the following phase in this
model, which is split into many phases. Every phase must be finished before the next
one begins, and the phases must not overlap.

39
CHAPTER 4

FINDINGS AND DISCUSSIONS

4.1 Introduction

This chapter will discuss about the findings and discussions on data transmission
from Arduino IDE serial monitor and RFID Attendance Management System. The
data collected are student’s name, student’s id and the exact time student’s attendance.
All of the data collected will be shown at MySQL database.

4.2 Result and Analysis

The proposed system is achieving two aims, the first objective is to develop
graphical user interface (GUI) using XAMPP server that will integrate with RFID
system and the second objective is to ensure the network connectivity between
NodeMCU and the code implemented in Arduino IDE successful. The traditional
method for taking student absence report is usually done by using paper-work and
handwriting on the advertisement wall. Hence, paperwork method consumes
workforce requirements, duplication of the efforts, and imposes time-consuming and
inefficiency.

40
4.2.1 Hardware Outcome

The hardware functionality content is made up of a comprehensive hardware


design that acts as a data transfer channel between an RFID module and an RFID
attendance management system. The ESP8266 functions as a Wi-Fi module that
connects the data collected by the RFID-RC522 module to the localhost system,
allowing data transmission between the server and the client. Based on figure 4.1
below, all of the components were successfully installed and are performing
admirably.

Figure 4.1: Final Design of Hardware Connection

41
Figure 4.2: RFID Tag Tap the RFID Module

4.2.2 System Outcome

RFID attendance management system was established as a platform to let


lecturers monitor and manage the data acquired in order to monitor the specifics of
student attendance. First and foremost, the local server, the XAMPP server, must be
activated. Apache, MySQL, File Zilla, Mercury, and Tomcat are among the five types
of modules available in this control panel. Only two of these possibilities, however,
were chosen to be enabled. As far as database administration goes, the Apache module
comes top, followed by the MySQL module. Figure 4.3 shows the XAMPP control
panel activation where only Apache and MySQL need to be activated.

After XAMPP is up and running, open the web browser and then enter the
localhost URLs. Since the utilized code file is in the .php format the localhost URLs
of the system will then end in.php. Furthermore, the right URLs will lead user to the
system's login page. As is customary, the lecturer's id or email, as well as a secret
password, must be entered as shown in figure 4.4 below.

42
Figure 4.3: XAMPP Control Panel Activation

Figure 4.4: Login Page of RFID Attendance Management System

43
Figure 4.5: System Main Page

Next, lecturer will access the main page management system once more. The
user page, manage users, users log, device, admin page, and logout session will all
have a fixed header in this system. The name, student id, gender, UID card, date, and
class of all users who have registered are displayed on this main page. Moreover, this
page is for the lecturer to register, change, and delete any students who are no longer
relevant for the following page. The RFID tag must first be touched to begin the
student registration procedure, and the data will appear as illustrated in figure 4.6.
Select the chosen card and edit the information according to the lecturer's requirements
to modify the desired data. Furthermore, if there are unconnected or excessive users,
the lecturer has the option of deleting the information.

Figure 4.6: System Manage User Page

44
Figure 4.7: Serial Monitor Output

Figure 4.8: Users Daily Log Page

Moreover, the user log page is the following page. This page is for the lecturer
to keep track of each student's time-in. The information on this page is nearly identical
to the information on the main page, with the exception that there is a record of student
time-in. The specified time-in data will be added to the MySQL database as a future
reference source for instructors. In addition, the Arduino IDE software is the subject
of this user log page. Because the serial monitor will produce a linked IP address and
a run-time mark each time an RFID tag is utilized when the coding is successfully
uploaded in the software. This process can be seen as in figure 4.7 above.

45
Figure 4.9: System Device Page

Figure 4.10: Add a New Device Form

Afterward, the next page is for managing the device that was used; each device
that was registered will indicate the class that was utilized. The device module includes
two features: enrollment and attendance. Enrollment is used by the lecturer to maintain
student information, while attendance is used by the lecturer to take attendance of their
students. For example, if a lecturer teaches three classes in one semester, the lecturer
will register three devices. As an example, as illustrated in figure 4.10, a new device
form will be appeared.

46
Figure 4.11: Admin Update Form

This RFID attendance monitoring system also has features that allow
professors to change the system's admin account. The professor merely needs to
modify the name, email, and password if he or she so desires. The converted data will
continue to enter the MySQL database once the exchange is completed. Last but not
least, in this system, log out sessions are also available. When a professor logs out and
then clicks to return to the previous page, the lecturer must log back in. This is due to
a logged-out session.

47
4.2.3 Discussion

Type Time- Speed System Resource Data Registration


consuming Security Used Accuracy Time
Old System Up to 10 Slow More Paper Low Up to 10
minutes vulnerable minutes
RFID System Less than Fast Authorized Use Accurate 2-3
3 minutes person only technology minutes

Table 4.1: Old System and RFID System Comparisons

Table 4.1 shows that the comparison between old attendance system and RFID
system. The old attendance system was a manual attendance method. This outdated
approach will also affect numerous things such as the amount of time it takes to take
attendance, the speed with which it is taken, the security system, the resources utilised,
the accuracy of the data, and the time it takes to register. Therefore, some advantages
may be acquired by employing an RFID attendance management system, based on the
factors indicated in the preceding paragraph. The use of an RFID attendance
management system will cut the time it takes for both the lecturer and the student to
take their attendance.

Moreover, because there is a database system that maintains all of the reports
gathered, instructors no longer need to upload files including student attendance
papers. As can be seen in the table above, this RFID approach takes less than 3 minutes,
which is faster than the old method. As a result, we may conclude that this system's
RFID is faster than the old technique. Furthermore, the old technique will be more
vulnerable in terms of system security than the RFID technology, which can only be
accessed by authorised individuals. When it came to the resources needed, the
traditional system relied on paper to create an attendance record. RFID systems, on the
other hand, only employ technology in conjunction with the system.

The accuracy of the data gathered is also an important consideration. RFID


technology, as seen in the table above, provide more exact data than the conventional
way. Last but not least, the time it takes to register is a factor in this comparison. RFID
systems have been demonstrated to take just 2 to 3 minutes to spend the attendance
time taken, as opposed to the old approach, which took up to 10 minutes.
48
4.3 Summary

Finally, the outcomes of effective data transfer are given in Figures 4.7 and 4.8,
demonstrating that both of the study's objectives were successfully achieved. A
website based on the localhost server was also established successfully as a lecturer
monitoring system. Aside from that, this chapter describes the contrast between the
old system and the RFID system. The study's findings demonstrate that the RFID
technology is a strong innovation in terms of attendance management. Finally, all of
the information gathered will be properly placed in the MySQL database.

49
CHAPTER 5

CONCLUSION AND RECOMMENDATIONS

5.1 Introduction

This chapter consists of the discussions about the result achieved from the
objectives. This part also discusses about the conclusion and recommendation for
improvement that can be added for this RFID Attendance Management System.

5.2 Conclusion

As mentioned in chapter 1, the first objectives for this project to develop


graphical user interface (GUI) using XAMPP server that will integrate with RFID
system. The outcomes of these initial aims may be realized, and the outcomes can be
viewed in Chapter 4 which is Findings and Discussions. It demonstrates that a XAMPP
server-based system website may be developed using PHP as the scripting language
plus this attendance management system also works well.

Furthermore, the second objective of this project is to ensure the data


transmission between RFID RC-522 module and website localhost server developed
is successful. This aim likewise has a very defined goal, and the outcomes can be seen
in Chapter 4: Software Outcome. The RFID module's data will continue to be delivered
to the user-log page, indicating that the data transmission procedure is complete.

As a conclusion, this RFID Attendance Management System project intends to


make professor management easier when it comes to taking student attendance. This
RFID-based project makes use of an RFID module, an ESP8266 NodeMCU, and a
XAMPP localhost website system. This website method may also be used to track
attendance.

50
5.3 Future Action

Below are a few suggestions and ideas obtained that can be considered as the
future action that can be improvised. It is also recommended a proper way of
statistical analysis gained.

1) To begin with, because this system is a single-factor authentication (SFA)


system that just needs email and password for authentication, system
security upgrades can be introduced in the future. Face recognition, for
example, becomes a benefit that can boost the security system for this
project.
2) The second enhancement that may be made is to include tools that allow
users to produce reports on a daily, weekly, or monthly basis. The data may
be filtered by day, week, or month for lecturers. These new functionalities
may make the lecturer's job easier by eliminating the requirement to open
a MySQL database to filter the relevant data.
3) More extensive study information on statistical analysis might be supplied
as an addition from the perspective of research analysis. Perhaps
information from surveys or questionnaires might be included in this
project's research.

51
APPENDIX

Gantt Chart

52
REFERENCES

Rajaraman. (2017). Radio Frequency Identification, 18(12), 4212. MDPI AG.


Retrieved from http://dx.doi.org/10.3390/s18124212

Islam, M., Alam, T., Yahya, I., & Cho, M. (2018). Flexible Radio-Frequency
Identification (RFID) Tag Antenna for Sensor Applications. Sensors, 18(12), 4212.
MDPI AG. Retrieved from http://dx.doi.org/10.3390/s18124212

Sura I. Mohammed Ali and Marwah Nihad (2021) J. Phys.: Conf. Ser. 1897 012076

Yasmin Fathy, Payam Barnaghi. (2019). Quality-based and Energy-efficient Data


Communication for the Internet of Things Networks. Sensors, 18(12), 4212. MDPI
AG. Retrieved from http://dx.doi.org/10.3390/s18124212

HaddadPajouh, H., Khayami, R., Dehghantanha, A. (2020) an AI-powered secure


architecture for edge layer of Internet of things. Neural Comput & Applic. Retrieved
from https://doi.org/10.1007/s00521-020-04772-3

Rosman, M. R. M., Ismail, M. I. U., Ahmad, M. H., & Dzarawi, M. A. Z. M. A.


(2020). Conceptualizing Attendance Monitoring System for Malaysian Educational
Institutions

Tripti Jain, Urvashi Tomar, Umang Arora and Swati Jain. (2020) IOT Based

Biometric Attendance System, International Journal of Electrical Engineering &

Technology, 11(2), 2020, pp. 156-161.

53
Kumar, Munish. (2018). Fingerprint Recognition System: Issues and Challenges.
International Journal for Research in Applied Science and Engineering Technology.
6. 556-561. 10.22214/ijraset.2018.2080.

Mesquita, J., Guimarães, D., Pereira, C., Santos, F., & Almeida, L. (2018, September).
Assessing the ESP8266 WiFi module for the Internet of Things. In 2018 IEEE 23rd
International Conference on Emerging Technologies and Factory Automation (ETFA)

Parihar, Y. S. (2019). Internet of Things and Nodemcu. Journal of Emerging


Technologies and Innovative Research, 6(6), 1085. (Vol. 1, pp. 784-791). IEEE.

L Karthik Narayan , Sonu. G , Soukhya S. M, 2020, Fingerprint Recognition and its


Advanced Features, INTERNATIONAL JOURNAL OF ENGINEERING
RESEARCH & TECHNOLOGY (IJERT) Volume 09, Issue 04 (April 2020),

Khabarlak, K., & Koriashkina, L. (2021). Mobile Access Control System Based on
RFID Tags And Facial Information. arXiv preprint arXiv:2103.06767.

Shafin, M. K., Kabir, K. L., Hasan, N., Mouri, I. J., Islam, S. T., Ansari, L., ... &
Hossain, M. A. (2015, March). Development of an RFID based access control system
in the context of Bangladesh. In 2015 International Conference on Innovations in
Information, Embedded and Communication Systems (ICIIECS) (pp. 1-5). IEEE.

Srithar, S., Suvathe, V. V., Pandi, S. V., & Mounisha, M. (2019). Implementation of
Smart Secure System in Motorbike using Bluetooth Connectivity.

54
Halder, R., Chatterjee, R., Sanyal, D. K., & Mallick, P. K. (2020). Deep learning-based
smart attendance monitoring system. In Proceedings of the Global AI Congress 2019
(pp. 101-115). Springer, Singapore.

55
APPENDICES

56
57
58
59
60

You might also like