RFID Technology Based Attendance Management System

RFID is a nascent technology, deeply rooted by its early developments in using radar 1 as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas. Industry specific key applications of this technology include vehicle tracking, automated inventory management, animal monitoring, secure store checkouts, supply chain management, automatic payment, sport timing technologies, etc. This paper introduces the distinctive components of RFID technology and focuses on its core competencies: scalability and security. It will be then supplemented by a detailed synopsis of an investigation conducted to test the feasibility and practicality of RFID technology.

[1]  Sandip Lahiri,et al.  RFID Sourcebook , 2005 .

[2]  Roman Espejo,et al.  RFID Technology , 2009 .

[3]  Katherine Albrecht,et al.  Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .

[4]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[5]  James G. Jones,et al.  A+ Exam Cram , 1998 .

[6]  ABCs of RFID: Understanding and using radio frequency identification , 2007 .

[7]  H. Stockman,et al.  Communication by Means of Reflected Power , 1948, Proceedings of the IRE.

[8]  Gottfried Vossen,et al.  A Design and Development Methodology for Mobile RFID Applications Based on the ID-Services Middleware Architecture , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[9]  Roy Want,et al.  Enabling ubiquitous sensing with RFID , 2004, Computer.

[10]  Matthias Schumann,et al.  RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.

[11]  Jürgen Bohn Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures , 2006, Personal and Ubiquitous Computing.

[12]  Joël Dansou-Eloi RFID technology , 2005, sOc-EUSAI '05.

[13]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[14]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[15]  Hanifa Shah,et al.  The Role of Enterprise Architecture in Healthcare-IT , 2009, 2009 Sixth International Conference on Information Technology: New Generations.