Open Access   Article Go Back

E-security Through RFID

K. Amutha1 , V. Vallinayagi2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-08 , Page no. 75-78, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si8.7578

Online published on Apr 10, 2019

Copyright © K. Amutha, V. Vallinayagi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Amutha, V. Vallinayagi, “E-security Through RFID,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.08, pp.75-78, 2019.

MLA Style Citation: K. Amutha, V. Vallinayagi "E-security Through RFID." International Journal of Computer Sciences and Engineering 07.08 (2019): 75-78.

APA Style Citation: K. Amutha, V. Vallinayagi, (2019). E-security Through RFID. International Journal of Computer Sciences and Engineering, 07(08), 75-78.

BibTex Style Citation:
@article{Amutha_2019,
author = {K. Amutha, V. Vallinayagi},
title = {E-security Through RFID},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {08},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {75-78},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=920},
doi = {https://doi.org/10.26438/ijcse/v7i8.7578}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.7578}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=920
TI - E-security Through RFID
T2 - International Journal of Computer Sciences and Engineering
AU - K. Amutha, V. Vallinayagi
PY - 2019
DA - 2019/04/10
PB - IJCSE, Indore, INDIA
SP - 75-78
IS - 08
VL - 07
SN - 2347-2693
ER -

           

Abstract

Nowadays numerous applications based on Radio Frequency Identification (RFID) systems are developed and also applied to different areas such as building system, health, agriculture, hospitals industry and educational institution. RFID technology means Radio Frequency Identification include automatic wireless identification using electronic tags such as passive and active readers. In this paper, we try to solve the attendance problem in educational sector using this technology. The purpose of this function is to monitor the student attendance to eliminate the waste of time instead of manual attendance process. Therefore they capture the face to face recognition and also allocate the suitable attendance scores for further process.

Key-Words / Index Term

RFID, Attendance, Active tag, Reader, face recognition

References

[1]Chitresh, S and Amit K (2010),”An efficient Automatic Attendance Using Fingerprint Verification Techniquee” ”,International Journal on ComputerScience and Engineering (IJCSE),Vol 2 No.pp 264-269
[2]Henry.SS. Arivazhagan and Ganesan(2003),Fingerprint verifiationsusing wavlet Transform ,International Conference on computational and Multimedia Applications, 2003.[3]
[3][Maltoni D, D. Maio, A. K. Jain, S. Prabhaker (2003), “Handbook of Fingerprint Recognition”, Springer, New York,Pp 13-20.
[4] Victor S, Jonathan M,Reece J,and Lemire(2003),”StudentWolfpackClub TrackingSystem”, North Carolina State University. USA.
[5] Nambiar A.N. (2009),” A supply chain perspective of RFID Systems”, World Academy of Science, Engineering and Technology Journal, Volume 6,pp1-5.
[6] Mohamed A.B, Abdel-Hamid A and Mohammed K.Y.,(2009), ”Implementation of an Improved secure system detection for E passport by using EPC RFID tags”, World Academy of Science, Engineering and Technology Journal, Volume 6,pp1-5.
[7]Dawes A.T. (2004),”Is RFIDRight for Your Library”, Journal of Access Services, Volume 2(4), pp 7-13.
Longe O.O.(2009),”Implementation of Student Attendance System using RFID Technology”, B. Tech Project Report, Ladoke Akintola University of Technology, Ogbomoso, Nigeria
[8]Liu C.M. and chen L.S.(2009),”Applications of RFID technology for improving production efficiency in an Integrated –circuit packaging house,”International Journal ofProduction Research, vol47,no.8,pp.2203-2216.
[9]RFID SensNet Lab(2005), A white paper on Automatic attendance System Texas A&M University, Texas, USA
[10]Bardaki, C.Kourouthanassis, P. and Pramatari,K,(2012), Deploying RFID-Enabled Services in the Retail Supply Chain:Lessons toward the Internet of Things, Information Systems Management, Vol.29:no.3,pp 233-245.
[11]Stockman, H. (1948). Communication by Means of Reflected Power, Proceedings of the Institute of Radio Engineers, 36(10) 1196-1204.
[12]Strassner, B. & Chang, K. (2003). Integrated antenna system for wireless RFID tag in monitoring oil drill pipe, Proceedings of the International Symposium on Antennas and Propagation Society, IEEE, 1 208-211.
[13]Terez, T.J. (1992), Bar codes move into maintenance management, Hydraulics & Pneumatics, 45(4) 36.
[14]Domdouzis, K., Kumar, B. & Anumba, C. (2007). Radio-Frequency Identification (RFID) applications: A brief introduction, Advanced Engineering Informatics, 21(4) 350-355.
[15]Fontelera, J. (2005), RFID exploration, Converting Magazine, 23(9) 28-32.
[16]Hunt, V.D., Puglia, A.& Puglia, M. (2007), RFID-A Guide to Radio Frequency Identification, Wiley-Interscience.
[18]. Ko, C.H. & Wang, S.F. (2007), Overcoming difficulties in weekly work planning. Research Journal of Applied Sciences, 2(7) 823-827.