Muhamad Anwar Bin Johari - Report
Muhamad Anwar Bin Johari - Report
March 2021
SUPERVISOR APPROVAL
This thesis was prepared under the supervision of the project supervisor, Albin Lemuel
Kushan. It was submitted to the Faculty of Computer and Mathematical Sciences and
was accepted in partial fulfilment of the requirements for the degree of Bachelor of
computer Science (Hons.) Data Communication Networking.
Approve by
.......................................
Albin Lemuel Kushan
Project Supervisor
I hereby declare that this thesis and project entitled “RFID ATTENDANCE
MANAGEMENT SYSTEM USING NODEMCU” is my own of quotations and
summaries which have been acknowledgement in full. I also declare that the analysis
and the research are for academic purpose only.
.......................................
Muhamad Anwar Bin Johari
2019593369
I would like to praise Alhamdulillah to Allah for His blessings, all of my issues have
been streamlined, and I am capable of doing this job within the allotted time.
Additionally, I want to express my gratitude to my supervisor, Sir Albin Lemuel
Kushan, for giving more comprehensive instructions for each job that has to be
completed. Special appreciation also to Madam Faridah Sappar, my CSP 600 project
formulation lecturer, who gave many notes and instructions from the beginning to the
final week.
iv
TABLE OF CONTENTS
CONTENTS PAGE
SUPERVISOR APPROVAL
STUDENT DECLARATION
ABSTRACT
ABSTRAK
ACKNOWLEDGEMENT iv
TABLE OF CONTENTS v
LIST OF FIGURES ix
LIST OF SYMBOLS x
LIST OF ABBREVIATIONS xi
2.1 Introduction 6
2.2 Radio Frequency Identification (RFID) 6
2.3 Attendance Management System 7
2.4 Internet of Things (IoT) 9
2.5 Communication Module (NodeMCU) 14
2.6 Related Work
2.6.1 Biometric Attendance System
2.6.2 RFID Door Access Control
2.6.3 RFID Key for Bike Security
2.7 Summary
3.1 Introduction 25
3.2 Project Methodology 25
3.3 Elaboration of Project Methodology 27
3.3.1 Project Framework 28
3.4 Analysis Phase 29
3.5.4.1 XAMPP
3.5.4.3 Notepad++
3.11 Summary
4.1 Introduction
4.2.3 Discussion
4.3 Summary
5.1 Introduction
5.2 Conclusion
REFERENCES 38
APPENDICES 40
LIST OF TABLES
viii
LIST OF FIGURES
V - Voltage
GHz - Frequency
mA - Supply Current
K - Mass
° - Angle
°C - Temperature
" - Length
g - Weight
mm - Measurement
X
LIST OF ABBREVIATIONS
URL
RFID
xampp
LCD
IP
MySQL
COM - Communication
xii
CHAPTER 1
INTRODUCTION
This Chapter explains the project background, problem statement, the objectives of
proposing this project, project scope, and project significance.
2
1.2 Problem Statement
In Addition, even though manual attendance does not cost anything to set up
an attendance system, it does cost anything to print the attendance sheet regularly.
Manually recording attendance will take a long time. Sometimes, there will be a human
error in filling attendance sheet. A student might correct their mistakes, among other
things, this may take up a significant amount of your time. In RFID Attendance
Management System, however, students will be able to do it in a second. Furthermore,
3
1.3 Objective
a) To develop graphical user interface (GUI) using XAMPP server that will
integrate with RFID system
b) To ensure the data transmission between RFID RC-522 module and website
localhost server developed is successful.
4
1.5 Project Significance
However, using this RFID-based attendance system will enhance the efficiency of
the method for keeping track of student attendance. There are various advantages
to participating in this project and the first one is real-time access. By using this
radio frequency identification attendance system, lecturers will be able to track the
exact moment of their student attendance. There are no longer any concerns with
students arriving late to class since the lecturer keeps a detailed record of when
they arrive.
5
CHAPTER 2
LITERATURE REVIEW
2.1 Introduction
Chapter 2 describes any discussion related to the project title. All previous
review are based on finished publications that have been cited in articles, books, and
journals. This chapter also will be contained information that is needed for the current
investigation.
Based on the article written by (Rajaraman, 2017), RFID tags are intuitive with
the inclusion of processors and sensors in RFID tags. Since the early 2000s, radio
frequency identification (RFID) has been used. It is also a technology that is frequently
utilized to assist people from a variety of businesses. Moreover, The RFID system is
also tightly linked to the Internet of Things (IoT), where it may develop world-class
technologies to improve consumer comfort.
The author also defined that this tag antenna technology system is consist of
three parts which are an RFID reader, an RF antenna, and an RFID tag. The RFID
reader has four parts which are a power source, a radiofrequency generator, circuits to
amplify, digitize, and store the analog signal received from the tag, and a rudimentary
microprocessor to process the data in the memory. This integrated circuit however will
be fitting to an external computer. After that, the reader is attached to a radio frequency
antenna, which sends out a radio signal. For example wireless signals to a tag. In
reaction to radio signals reflected by a tag's antenna, this antenna receives them as
well. In addition, RFID technology becomes cost-effective only when semiconductor
technology is matured. Below is a timeline of the RFID application.
6
Figure 2.1: Timeline of RFID applications.
Last but not least, Due to the increased demand for RFID technology, this is a
tremendous benefit for RFID technology vendors. This will produce a million
productions of this technology. This is because the use of RFID tags is escalating due
to the reduction of the RFID tags price itself. After that, not only will the RFID
business have a significant influence, but RFID systems such as the Internet of Things,
GPS, Cloud Computing, and Big Data analysis will also see increasing innovation. For
other businesses, such as RFID systems in health, biology studies, and scientific
apparatus, will be discovered as well.
7
2.3 Attendance Management System
Figure 2.2 shows the circulation of the whole system. This system that
consisted of the element of the information of individual and monitoring system is also
known as the Attendance Monitoring System. There are four main structures for the
system, which are Admin, Student, Lecturer, and Guardian.
8
The information system interacts directly with the administrator, student, and
lecturer, whereas the guardian interacts indirectly by getting notifications as output
from other processes. The role of the information system will be further explained in
the next section. In addition, it would be ideal if the attendance management system
could create reports that could be delivered to the guards. Parents may monitor their
child's attendance on a daily, weekly, or monthly basis. In web-based monitoring,
online parent tracking, also known as third-party tracking, is analyzing network traffic
from the browser or device and detects any third-party destinations related to tracking.
The Internet of Things (IoT) is the mix of a network and physical items that
are connected by sensors, software, and other associated gear to link devices and
systems. According to a research article written by Sura I. Mohammed Ali and
Marwah Nihad (2021), to assist two ways of communication between students and
lecturers, either online or physically, the method of embedding sensors and also mobile
devices into IoT is a good method that can be implemented in the academic
environment. Despite the Coronavirus disease (COVID-19) now affecting the entire
country, more internet of things (IoT) applications are required to aid the educational
system. The learning process was not interrupted. The lecturers have to take several
measures to put the learning sessions into action. Introducing video conferencing as a
platform for interaction between students and professors is one of them.
9
Figure 2.3 above is an architecture of the Internet of Things (IoT). Four layers that
contained in this architecture. The first layer is shown in figure 2.3, the sensor layer,
sense or accepts data physically, processes the data, and releases it to the network.
Secondly, an internet gateway is needed in this layer. Advanced gateway will create a
connection between the sensor and the network also gives effectiveness like the
protection of malware, and the data management services. Furthermore, data
processing utilities involve the ecosystem of the IoT. Data processing will be sent to
the data sensor which will be accessed by the compatible software application. Last
but not least is the execution layer or application layer. Cloud management is a location
for users to handle stored data in any job that utilizes IoT. The most important thing in
developing an IoT system, is an architecture for a safer IoT environment needs to be
sufficient and secure architecture for IoT layer infrastructure (HaddadPajouh, H.,
Khayami, R., Dehghantanha, A. 2020).
10
2.5 Communication Module (NodeMCU)
Figure 2.4 above shows about ESP8266 block diagram. The main features that
make this communication board desirable to implement in IoT applications are
standard Institute of Electrical and Electronics Engineers (IEEE) 802.11 b/g/n (WiFi)
compliance with an onboard antenna. 802.11 b/g/n is a WiFi modem that will emit a
signal that is compatible with B, G, and N mode devices. When N-only devices are
used in the home, changing the wireless mode to N-only may assist to enhance speeds.
11
In this sub-topic, there are three similar project that related to each other. However,
each of these initiatives has its own set of benefits.
Figure 2.6 shows there are several problems that may occur during the
fingerprint scanning process. According to (L Karthik Narayan et al., 2020),
Passwords are not accurate enough to secure persons' belongings when utilizing an
outdated security mechanism, especially when employing a biometric identification
system. However, fingerprint scanning also occur an error during the scanning and
among them are finger misplacement, dirty finger, orientated, skin problem, and wet
finger.
14
The radio frequency identification (RFID) access control system is a technology that
has been around for a long time. The conventional RFID-based controlled access
system consists of a single unique tag that determines whether data is permitted or
refused access to the areas. According to (Khabarlak, K., & Koriashkina, L. 2021),
The project does not just rely on RFID, but also incorporates additional features such
as mobile access control and a server-side control system. Moreover, the author
mentioned that multi features together with a standard passive RFID tag will gives
more satisfactory results.
Furthermore, the data collected from the RFID tag will be stored in a binary format
called NFC Data Exchange Format (NDEF) which was applied on Android. There are
several written in the system, among them are Global Unique Server Identifier
(GUID), which is used to verify user registration in one organization. The second one
is unsigned integer indicating the organization's gate id. Thirdly, Android Application
Record (AAR). This application used to launch whenever the device is near to the tag
but the mobile must unlock first. The last system written by the author is Universal
Link. Table 2.1 provides a more complete description of the data written on the RFID
tag.
15
When it comes to the motorcycle's security, the ignition lock switch is generally the
sole thing to consider. Thieves will have an easier time stealing motorcycles as a result
of this. RFID Key for Bike Security is a project established to test the multi-purpose
electronic lock for bike or scooter utilizing various options. The objective of this
project is to secure the vehicles from theft using RFID security features. According to
project developed by (Srithar, S et al., 2019), normal key was replaced to the passice
swtich key using RFID. Moreover, the use of HELMET enforces the need of wearing
a helmet and detects alcohol use straight from the start of the motorcycle.
Furthermore, figure 2.8 shows the block diagram used by the developer in the passive
switch key. Arduino IDE software is used to conduct all the other component and all
of it are buzzer, LCD, Reader Module, and including RFID tag. The verification of the
RFID tag use 12 digits code as the reader module while for the buzzer, one beep one
will heard once it is approved.
17
The flow chart shown in figure 2.9 tell of how the flow of the system using
Passive Switch Key worked. Moreover, with the use of an IR sensor, the author
discussed the effectiveness of wearing a helmet or not wearing a helmet, as well as
alcohol consumption using the MQ-6 alcohol sensor. Next, if the speed breaker is
excessive, the developer employs an ultrasonic sensor to adjust its speed, either
slowing it down or speeding it up, and then continues the ride. As a result, a self-stop
flow mechanism has already been installed on this system to prevent any mishaps.
18
CHAPTER 3
PROJECT METHODOLOGY
3.1 Introduction
19
Figure 3.1: Waterfall Methodology
Next, second phase that shown on figure 3.1 above is to select the appropriate
hardware and software for project development. After that, once the phase one and two
is executed, project implementation can be done. In this phase, any hardware
assembling, or coding application will be implemented. However, if there is any
problem or changes required in this phase, The prior step, namely the design phase,
must be referred again. After that, testing phase need to be done to point out any error
occur whether the problem comes from the hardware of software. After that, for the
documentation phase, once the testing phase is done, all of the data recorded will be
stored at the MySQL database. MySQL is an open sources database management
system that interacts with an operating system to install a relational database in a
computer's storage system, manages users, permits network access, and simplifies
database integrity testing and backup generation. Last but not least, everything
pertaining to project documentation will be included in the final report, which will
serve as the project's thesis.
20
3.3 Elaboration of Project Methodology
1. Analysis 2. Design
4. Testing
5. Documentation
- Data stored in
MySQL database
- Update project in
report
21
3.4 Analysis Phase
To begin this project, some framework must be developed during the analysis
phase, first by selecting a suitable title. This is critical to avoid any title changes owing
to a hefty title or a title that is identical to another. In addition, a survey of the hardware
or software to be utilised must be conducted. This seeks to figure out how much money
is required to offer all of the essential equipment. Once satisfied with the title, the
chosen title must be presented to the appropriate supervisors. Furthermore, in this
analysis phase, chapter 1 which is introduction need to be prepared, chapter 2 which
consists of literature review, and also research methodology as chapter 3. for chapter
1, some information such as project background, problem statement, objectives,
project scope and project significance need to be provided. Next, in order to improve
this area of the literature review, roughly 15 articles should be prepared for Chapter 2.
As a comparison of the projects that have been implemented, 3 relevant worked should
also be included in this chapter 2. Lastly, this research methodology, which is covered
in detail in chapter 3, explains how this project is carried out. The sort of approach
adopted is one of them. All phases are explained, as well as the types and specifications
of the hardware and software utilised, the project flowchart, and project milestones.
22
3.5.1 Design of Prototype
The research design refers to the overarching approach used to connect the
many components of the study in a cohesive and logical manner, thus guaranteeing
that the research issue is successfully addressed. It serves as the blueprint for design
of prototype, component used, and analysis.
23
3.5.2 Project Architecture
This architecture above explained about the flow of the project. To begin with,
Students must first have an admin-registered RFID tag/card. The RFID attendance
device, which consists of an RFID module and a NodeMCU board, must be tapped to
the card. The lecturer must update the student's information once the student taps the
RFID tag/card on the device; among the information that must be changed is the
student's complete name, student id, and student email. Not to mention that instructors
who wish to register students must first enable enrol mode. because there are two
modes to choose which are enrol and attendance mode.
25
Next, hardware that uses to communicate with the RFID tag are called RFID-
RC522 Module. This module is capable of producing 13.56MHz electromagnetic
waves and communicating with a microprocessor chip through Serial Peripheral
Interface (SPI) with 10Mbps maximum data rate. Finally, a male to female jumper
wire is used as the third hardware in this project. Moreover, this wire connects all of
the components and may also be used with the board.
3.5.4.1 XAMPP
XAMPP is a web server that allows users to develop and test applications using
local web servers. The software's creator is known as Apache Friends, and the
configuration code may be updated by the user as desired. Users who wish to alter an
existing port to the port they want to use, for example, are permitted. This package
also includes the Apache HTTP Server, MariaDB, and interpreters for PHP and Perl,
among other computer languages.
26
Moreover, there are 11 languages mentioned, and it is also compatible with
additional systems including MacOS and Linux. Furthermore, the letters XAMPP
stand for "cross-platform," "A" stands for "Apache," "M" stands for "MySQL," and
the two letters P stand for "PHP" and "Perl," respectively. Typically, XAMPP users
test their host or server by building a local web page with the goal of obtaining a
response from the server and the client. Laptops and PCs are regularly used gadgets.
27
The Arduino Integrated Development Environment or Arduino Software
(IDE), contains a text editor for writing or code editing, a text console, a text area, a
toolbar with buttons for common functions and a series of menus. It connects to the
Arduino hardware to upload programs and communicate with the components.
Arduino Software written program are called sketches or book of sketch. When
the user wrote the codes in the text editor, the file can be saved with the file.ino format.
Moreover, the other function that included are crop/cut and then paste it. Searching
and replacing text also will help the user to replace any text they want. The message
box provides feedback throughout the storing and exporting processes, as well as
shows mistakes.
The console shows text that the Arduino Software generates, including error
messages and other information. Moreover, the toolbar buttons allow user to verify
and upload programs, create, open, and save sketches, and open the serial monitor.
Book Sketching
The Arduino IDE is based on the idea of a sketchbook, a standardized location
for storing code (or sketches). The drawings in sketchbook may be accessed through
the File button and the click Sketchbook menu button item or using the toolbar's Open
button. When the Arduino software is used for the first time, it automatically creates a
directory for sketchbook. The Preferences dialogue allows user to see or modify the
location of the sketchbook.
28
Uploading
When a sketch is uploaded in Arduino software, a little program is uploaded
into the board's program. It allows users to upload the code without requiring an
additional component. When the board is reset, the bootloader is enabled for a few
seconds before launching the most recently uploaded sketch to the microcontroller.
The on board which pin 13 LED will begin blinking as the bootloader starts (i.e. when
the board resets).
Libraries
Libraries enhance the usefulness of graphics by enabling them to interface with
hardware and handle data. To include a library into a drawing, use the Drawing option
and then click Import Library option. This creates the library from the user's artwork
and adds one or many “include” lines to the sketch's top. Because they are submitted
alongside the user's artwork, libraries take up more space on the board. If a sketch no
longer needs a library, remove the “include” lines from the top of the code.
Third-Party Hardware
Third-party hardware support may be added to the hardware directory of the
sketchbook directory. Platforms such as board definitions (board menu), core library,
bootloaders, and programmer definitions may be installed. Create a directory for the
hardware first, and then unzip the third-party platform into its own subfolder. (If the
user uses the subdirectory name "arduino," the built-in Arduino platform is
overridden.) To uninstall a software, just delete its directory.
29
Serial Monitor
Serial Monitor transmitted through USB or connection from Arduino board.
By entering the text, to submit the data to the board, click “send” button. When the
user choose to use serial monitor on window, mac, or linux, the board will be reset. It
is important to take a look that serial monitor does not handle control things. If the
design needs complete administration of serial connections, including control
characters, the user may connect an external terminal program to the Arduino board's
COM port.
30
3.5.4.3 Notepad++
31
3.6 Implementation Phase
32
3.7 Testing Phase
Next, each project must go through a testing step after the implementation
process has been completed. Because this project comprises two components that must
be examined, namely the ESP8266 device, the RFID module, and the RFID attendance
management system, the flaws must be highlighted one by one. The coding entered
into the devices used must be proper, and the coding can be uploaded into the device
used to check the RFID module device. When coding is successfully uploaded, it
signifies that the coding on the devices is precise. Then, open the serial monitor to see
if the RFID tag/card is responding to the RDIF module. A run-time process will
normally show on the monitor serial as soon as the RFID card touches the RFID
module.
In addition, the RFID attendance management system must be evaluated.
Because once the RFID module is touched, data will continue to enter the user log as
an indication that the user has been present, the system will be linked to it. Other
functions, such as user login, registration, and data modification, must be tested as
well. If any functions fail, data should be recorded, and the preceding part of the
implementation phase should be re-implemented until the project is free of faults.
33
3.8 Documentation Phase
The gathered data is saved in a MySQL database, according to the last phase,
documentation. admin data, such as emails and passwords, registered use data, and the
precise time students should arrive for class. The advantages of databases over
spreadsheets may be divided into numerous categories. First and foremost, it is simple
to use. To view or verify the data gathered, the administrator merely requires access to
the internet. Furthermore, the information acquired is correct. This is because all data,
including names, student IDs, and class attendance times, is correct and may be
modified by students at any time.
Last but not least, the last phase is to complete the project's entire report, which
includes chapters 1 through 5. The major goal of the project report is to keep track of
current development and compare it to the original plan. Preparing a project report is
also significant since it allows the writer to track down any project flaws.
34
3.9 Flow Chart
Start
End
Figure 3.10 above explained about flow chart of the users. To begin with, the
initial step for users is to touch the RFID tag/card as a time in record after being
registered by the admin. Next, once the user tap for the first time, the time in record
will be updated into the RFID attendance management system.
35
Start
Admin login
Admin manage
student’s
information
enroll
Admin choose Admin register
enroll or student’s detail
attendance to RFID tag/card
attendance
Admin monitor
student time in
End
36
Figure 3.11 above describe the flow chart for admin. Only the RFID attendance
management system is used for admin duties. Logging into the system is the initial
step for the administrator. The administrator or lecturer in charge will be provided the
email address as well as the current password. Once the admin login, the main page
for the system will show all the users that have been registered. Moreover, admin will
be able to manage users, enrol devices, register new admins if necessary, and log out
sessions, among other things. In the manage user page, admin will be able to add user,
update user’s information, and remove any users. Lastly, for the main function for the
admin is to monitor the time in of the students.
37
3.10 Project Milestone
Project milestone consist of duration that shows an important achievement
during the project development. Table 3.4 below will describe the project milestone
38
3.11 Summary
As a conclusion for this research, to demonstrate that the study is effective and
successful, the data must be genuine and trustworthy. As a result, the research was
carried out according to established protocols, and the data collected from this study
was needed in order to achieve the study's goal as well as to back up subsequent results.
Moreover, the waterfall model is a traditional system development life cycle model
that uses a linear and sequential method to build a system. The model is called a
waterfall because it progresses methodically from one phase to the next in a downward
direction. The output of one phase is utilised as the input of the following phase in this
model, which is split into many phases. Every phase must be finished before the next
one begins, and the phases must not overlap.
39
CHAPTER 4
4.1 Introduction
This chapter will discuss about the findings and discussions on data transmission
from Arduino IDE serial monitor and RFID Attendance Management System. The
data collected are student’s name, student’s id and the exact time student’s attendance.
All of the data collected will be shown at MySQL database.
The proposed system is achieving two aims, the first objective is to develop
graphical user interface (GUI) using XAMPP server that will integrate with RFID
system and the second objective is to ensure the network connectivity between
NodeMCU and the code implemented in Arduino IDE successful. The traditional
method for taking student absence report is usually done by using paper-work and
handwriting on the advertisement wall. Hence, paperwork method consumes
workforce requirements, duplication of the efforts, and imposes time-consuming and
inefficiency.
40
4.2.1 Hardware Outcome
41
Figure 4.2: RFID Tag Tap the RFID Module
After XAMPP is up and running, open the web browser and then enter the
localhost URLs. Since the utilized code file is in the .php format the localhost URLs
of the system will then end in.php. Furthermore, the right URLs will lead user to the
system's login page. As is customary, the lecturer's id or email, as well as a secret
password, must be entered as shown in figure 4.4 below.
42
Figure 4.3: XAMPP Control Panel Activation
43
Figure 4.5: System Main Page
Next, lecturer will access the main page management system once more. The
user page, manage users, users log, device, admin page, and logout session will all
have a fixed header in this system. The name, student id, gender, UID card, date, and
class of all users who have registered are displayed on this main page. Moreover, this
page is for the lecturer to register, change, and delete any students who are no longer
relevant for the following page. The RFID tag must first be touched to begin the
student registration procedure, and the data will appear as illustrated in figure 4.6.
Select the chosen card and edit the information according to the lecturer's requirements
to modify the desired data. Furthermore, if there are unconnected or excessive users,
the lecturer has the option of deleting the information.
44
Figure 4.7: Serial Monitor Output
Moreover, the user log page is the following page. This page is for the lecturer
to keep track of each student's time-in. The information on this page is nearly identical
to the information on the main page, with the exception that there is a record of student
time-in. The specified time-in data will be added to the MySQL database as a future
reference source for instructors. In addition, the Arduino IDE software is the subject
of this user log page. Because the serial monitor will produce a linked IP address and
a run-time mark each time an RFID tag is utilized when the coding is successfully
uploaded in the software. This process can be seen as in figure 4.7 above.
45
Figure 4.9: System Device Page
Afterward, the next page is for managing the device that was used; each device
that was registered will indicate the class that was utilized. The device module includes
two features: enrollment and attendance. Enrollment is used by the lecturer to maintain
student information, while attendance is used by the lecturer to take attendance of their
students. For example, if a lecturer teaches three classes in one semester, the lecturer
will register three devices. As an example, as illustrated in figure 4.10, a new device
form will be appeared.
46
Figure 4.11: Admin Update Form
This RFID attendance monitoring system also has features that allow
professors to change the system's admin account. The professor merely needs to
modify the name, email, and password if he or she so desires. The converted data will
continue to enter the MySQL database once the exchange is completed. Last but not
least, in this system, log out sessions are also available. When a professor logs out and
then clicks to return to the previous page, the lecturer must log back in. This is due to
a logged-out session.
47
4.2.3 Discussion
Table 4.1 shows that the comparison between old attendance system and RFID
system. The old attendance system was a manual attendance method. This outdated
approach will also affect numerous things such as the amount of time it takes to take
attendance, the speed with which it is taken, the security system, the resources utilised,
the accuracy of the data, and the time it takes to register. Therefore, some advantages
may be acquired by employing an RFID attendance management system, based on the
factors indicated in the preceding paragraph. The use of an RFID attendance
management system will cut the time it takes for both the lecturer and the student to
take their attendance.
Moreover, because there is a database system that maintains all of the reports
gathered, instructors no longer need to upload files including student attendance
papers. As can be seen in the table above, this RFID approach takes less than 3 minutes,
which is faster than the old method. As a result, we may conclude that this system's
RFID is faster than the old technique. Furthermore, the old technique will be more
vulnerable in terms of system security than the RFID technology, which can only be
accessed by authorised individuals. When it came to the resources needed, the
traditional system relied on paper to create an attendance record. RFID systems, on the
other hand, only employ technology in conjunction with the system.
Finally, the outcomes of effective data transfer are given in Figures 4.7 and 4.8,
demonstrating that both of the study's objectives were successfully achieved. A
website based on the localhost server was also established successfully as a lecturer
monitoring system. Aside from that, this chapter describes the contrast between the
old system and the RFID system. The study's findings demonstrate that the RFID
technology is a strong innovation in terms of attendance management. Finally, all of
the information gathered will be properly placed in the MySQL database.
49
CHAPTER 5
5.1 Introduction
This chapter consists of the discussions about the result achieved from the
objectives. This part also discusses about the conclusion and recommendation for
improvement that can be added for this RFID Attendance Management System.
5.2 Conclusion
50
5.3 Future Action
Below are a few suggestions and ideas obtained that can be considered as the
future action that can be improvised. It is also recommended a proper way of
statistical analysis gained.
51
APPENDIX
Gantt Chart
52
REFERENCES
Islam, M., Alam, T., Yahya, I., & Cho, M. (2018). Flexible Radio-Frequency
Identification (RFID) Tag Antenna for Sensor Applications. Sensors, 18(12), 4212.
MDPI AG. Retrieved from http://dx.doi.org/10.3390/s18124212
Sura I. Mohammed Ali and Marwah Nihad (2021) J. Phys.: Conf. Ser. 1897 012076
Tripti Jain, Urvashi Tomar, Umang Arora and Swati Jain. (2020) IOT Based
53
Kumar, Munish. (2018). Fingerprint Recognition System: Issues and Challenges.
International Journal for Research in Applied Science and Engineering Technology.
6. 556-561. 10.22214/ijraset.2018.2080.
Mesquita, J., Guimarães, D., Pereira, C., Santos, F., & Almeida, L. (2018, September).
Assessing the ESP8266 WiFi module for the Internet of Things. In 2018 IEEE 23rd
International Conference on Emerging Technologies and Factory Automation (ETFA)
Khabarlak, K., & Koriashkina, L. (2021). Mobile Access Control System Based on
RFID Tags And Facial Information. arXiv preprint arXiv:2103.06767.
Shafin, M. K., Kabir, K. L., Hasan, N., Mouri, I. J., Islam, S. T., Ansari, L., ... &
Hossain, M. A. (2015, March). Development of an RFID based access control system
in the context of Bangladesh. In 2015 International Conference on Innovations in
Information, Embedded and Communication Systems (ICIIECS) (pp. 1-5). IEEE.
Srithar, S., Suvathe, V. V., Pandi, S. V., & Mounisha, M. (2019). Implementation of
Smart Secure System in Motorbike using Bluetooth Connectivity.
54
Halder, R., Chatterjee, R., Sanyal, D. K., & Mallick, P. K. (2020). Deep learning-based
smart attendance monitoring system. In Proceedings of the Global AI Congress 2019
(pp. 101-115). Springer, Singapore.
55
APPENDICES
56
57
58
59
60