scholarly journals Design of Attendance Recording System for Pilkades Participants Using Web-Based RFID (E-KTP)

Author(s):  
Atmiasri ◽  
Eko Andris Kosmono

The development of information technology has now been widely used to facilitate, accelerate, and streamline work. The recording system that is still being applied is a type of recording using a manual system using paper media and is inefficient when viewed from a time perspective, recapitulating attendance data and the accuracy or authenticity of the data presented. There is still a frequent habit of voting in the village head elections or not being present at the voting process. Contrary to these problems, this research has developed a recording system using RFID (Radio Frequency Identification) technology. RFID will use sensors to read data. The use of RFID which can make it easier for KPPS officers at TPS. The use of both active and passive RFID technology is able to help record and move data in KPPS, Use of RFID technology, data will be recorded only by passing through a sensor reader on the device, thus the attendance data present by pilkades participants will be stored automatically in storage. So that the attendance of election participants will be easier to do, faster and avoid human error or fraud in the absence of pilkades

2021 ◽  
Vol 4 (1) ◽  
pp. 43-56
Author(s):  
Yul Hendra ◽  
Ely Nuryani

In this study there are 3 topics of discussion, namely the problem of monitoring the teaching presence of lecturers, recording data on the use of the room into a database that can be accessed by an online application in realtime. The methodology used in this study is the prototype method which has the following stages: 1. Identification of needs, 2. Building Prototype, 3. Coding, 4. Testing and Evaluation of Prototype ,. The system is created using the application of Radio Frequency Identification (RFId) technology, the PHP programming language and MySQL as the software and database. RFId technology is used as an input device when lecturers enter using the RFId Card. The RFId Card is used by lecturers for attendance that will be automatically recorded into the database along with the room, day and hour data. This system can be accessed by users through a web-based application to facilitate the Academic Section, the Financial Section and the Head of the Study Program and the leadership to monitor and track the number of lecturers' teaching attendance in class. The result is a monitoring and recording system for teaching attendance based on RFId lecturers and this database helps the Academic Section, the Finance Section and the Head of the Study Program and the leadership in monitoring and overseeing lecturer attendance.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hugo Landaluce ◽  
Laura Arjona ◽  
Asier Perallos ◽  
Lars Bengtsson ◽  
Nikola Cmiljanic

One of the main existing problems in Radio Frequency Identification (RFID) technology is the tag collision problem. When several tags try to respond to the reader under the coverage of the same reader antenna their messages collide, degrading bandwidth and increasing the number of transmitted bits. An anticollision protocol, based on the classical Binary Tree (BT) protocol, with the ability to decrease the number of bits transmitted by the reader and the tags, is proposed here. Simulations results show that the proposed protocol increases the throughput with respect to other recent state-of-the-art protocols while keeping a low energy consumption of a passive RFID system.


2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Adnan Mehmood ◽  
Han He ◽  
Xiaochen Chen ◽  
Aleksi Vianto ◽  
Ville Vianto ◽  
...  

This paper introduces ClothFace, a shirtsleeve-integrated human-technology interface platform, which comprises two wrist antennas and three radio frequency identification (RFID) integrated circuits (ICs), each with a unique ID. The platform prototype, which is created on a shirtsleeve by cutting the antennas and antenna-IC interconnections from copper tape, can be used for push button and swipe controlling. Each IC can be activated, i.e., electrically connected to the two antennas, by touching the IC. These ICs can act as wireless input buttons to the technology around us. Due to the used passive ultrahigh-frequency (UHF) RFID technology, there is no need for clothing-integrated energy sources, but the interface platform gets all the needed energy from an external RFID reader. The platform prototype was found to be readable with an external RFID reader from all directions at distances of 70–80 cm. Further, seven people giving altogether 1400 inputs tested the prototype sleeves on a table and on body. In these first tests, 96–100% (table) and 92–100% (on-body) success rates were achieved in a gamelike testing setup. Further, the platform was proved to be readable with an off-the-shelf handheld RFID reader from a distance of 40 cm. Based on these initial results, this implementation holds the potential to be used as a touch interface blended into daily clothing, as well as a modular touch-based interaction platform that can be integrated into the surfaces of electronic devices, such as home appliances.


2013 ◽  
Vol 723 ◽  
pp. 877-884 ◽  
Author(s):  
Jia Ruey Chang ◽  
Shu Rong Yang ◽  
Kun Hu Lin

To provide certain level of serviceability, road authorities need to perform appropriate and timely maintenance and rehabilitation (M&R) activities. Manholes on roads are the most persecution for the evenness of pavements. Lowering manholes into road structures is a good approach to keep the serviceability of pavement. However, a vast expanse of road systems greatly increases the complexity of manhole identifications. Therefore, an emerging method to find the manholes beneath pavements is needed. In this study, radio frequency identification (RFID) technology was used to identify manholes. RFID tags stuck on the metal were buried in asphalt concrete at different depths and then were identified from laboratory experiments. On the other hand, location-based service (LBS) has been applied to mobile devices with mobile positioning functions to provide users with location-specific services for several years. Augmented reality (AR) can support users in manipulating virtual objects in real environments. In this study, a mobile manholes monitoring system (MMS) and a web-based MMS based on LBS and AR were developed. The RFID adhered to covers of manholes beneath pavements can be easily monitored by the mobile MMS. The location and information of neighboring manholes will be transmitted from the web-based MMS and be shown on the mobile MMS based on the AR technology. By using RFID and AR technologies, the time and costs of manhole identifications can be significantly decreased and then pavement maintenance activities also can be timely processed.


Author(s):  
Norsuzila Ya’acob ◽  
Aziean Mohd Azize ◽  
Azita Laily Yusof ◽  
Suzi Seroja Sarnin ◽  
Nani Fadzlina Naim ◽  
...  

An alibi is a priceless thing that someone can rely on when in needs. A good data management can and will save someone life in respond to any unwanted situation.A simple, accurate and trustworthy data log for students in boarding school can and will help ease parent-teacher monitoring system. However, the conventional system require student to manually inform and record their log to their parents and teachers. The system is lacks of automation where a number of problem may arise. The problem includes the inaccurate logging time, misplace of outing card and an unorganized log record. Web-Based Boarding School Monitoring System (WEBMOS) Using MySQL Database and RFID Technology were invented to solve this problem. This technology offered a system that can record student log data in an accurate manner. The aim is to build a system that can provide the accurate data to parent and teacher via a single click through their personal device. This system uses RFID module technology to monitor the student’s logs activity in real time manner. The monitoring system involve the utilization of Arduino Mega, Ethernet Shield, Global System for Mobile communication (GSM) and Radio Frequency Identification (RFID) Module. The system performs an automated data log after the student flashed their card to RFID reader, the data is uploaded to database after the card being flashed and the uploaded information can be view at the webpage at anywhere and anytime. Thus, thesystem is capable of collecting and recording aprecise real time data logging for student’s activity.


Author(s):  
Dewa Agung Krishna Arimbawa P ◽  
I Ketut Gede Darma Putra ◽  
I Made Sukarsa

  Libraries as a service provider to the user that needs fast, easy, and efficient services. Optimization of the services performed by the application of information technology such as utilizing barcode technology for the library system. Along with the development, there were some shortcomings in the use of barcode technology. Barcode technology can be replaced by RFID (Radio Frequency Identification) in order to further improve the operational and library services. RFID has some advantages over the barcode system is the possibility of data can be read automatically without regard to alignment readings, past the non conductor materials like cardboard paper with access speeds of several hundred tags per second at a distance of several meters. The advantages and capabilities of RFID can be applied in a library system in the inventory, self-service, and security so as to generate optimal library services more than manual systems or even a barcode system. Utilization of RFID technology in the library and then combined with technology Telegram Bot API as a medium to facilitate user access such as notification, accessing history, and others.  


2021 ◽  
Vol 13 (9) ◽  
pp. 235
Author(s):  
Abdallah Y. Alma’aitah ◽  
Mohammad A. Massad

Radio frequency identification (RFID) technology facilitates a myriad of applications. In such applications, an efficient reader–tag interrogation process is crucial. Nevertheless, throughout reader–tag communication, significant amounts of time and power are consumed on inescapable simultaneous tag replies (i.e., collisions) due to the lack of carrier sensing at the tags. This paper proposes the modulation cutoff intervals (MCI) process as a novel reader–tag interaction given the lack of carrier sensing constraints in passive RFID tags. MCI is facilitated through a simple digital baseband modulation termination (DBMT) circuit at the tag. DBMT detects the continuous-wave cutoff by the reader. In addition, DBMT provides different flags based on the duration of the continuous-wave cutoff. Given this capability at the tag, the reader cuts off its continuous-wave transmission for predefined intervals to indicate different commands to the interrogated tag(s). The MCI process is applied to tag interrogation (or anti-collision) and tag-counting protocols. The MCI process effect was evaluated by the two protocols under high and low tag populations. The performance of such protocols was significantly enhanced with precise synchronization within time slots with more than 50% and more than 55.6% enhancement on time and power performance of anti-collision and counting protocols, respectively. Through the MCI process, fast and power-efficient tag identification is achieved in inventory systems with low and high tag mobility; alternatively, in addition to the rapid and power efficient interaction with tags, anonymous tag counting is conducted by the proposed process.


Infotekmesin ◽  
2020 ◽  
Vol 11 (1) ◽  
pp. 50-56
Author(s):  
Andriansyah Zakaria ◽  
Andesita Prihantara

In every academic and student activity, data collection on student meetings is always done. General student data collection activities are still carried out manually by filling in the student attendance form. Besides being able to help and correct problems in lecturing activities, the manual presentation system is not practical in centralized recording and also increases human error in recording. The technology that can be used to add to these shortcomings is Radio Frequency Identification (RFID) in the presence of students. By utilizing RFID technology to approve and MySQL as a database, it is expected that student data collection and recording can be done easily and centrally. It can be concluded from the study that each RFID card used is a unique card identity that functions as a valid marker or identity for students or lecturers in conducting attendance.


Author(s):  
Mehdia Ajana. El Khaddar ◽  
Hamid Harroud ◽  
Mohammed Boulmalf ◽  
Mohammed El Koutbi

Radio Frequency Identification (RFID) has been used since the Second World War to identify “friend or foe” aircrafts. It has become an enabling wireless technology that is widely used in a number of application areas, such as product tracking through manufacturing and assembly, inventory control, and supply chain management (SCM). By 2006, Wal-Mart used RFID for all of its suppliers. The use of RFID in supply chain networks has allowed Wal-Mart to create value through greater visibility in its networks, higher product velocity, reduce human error and labor cost, and more efficient inventory management, which led to the achievement of Quick Response (QR) and improved Customer Relationship Management (CRM) in the supply chain. However, RFID system challenges and uncertain Return-On-Investment (ROI) must be overcome to fully achieve these objectives. This paper introduces RFID technology and its key components and concepts, and presents an RFID middleware solution called FlexRFID that achieves the maximum benefits of RFID technology independently of the interested backend applications. This paper illustrates how RFID technology is used to solve the main problems in SCM, the advantages and key issues when implementing RFID in SCM networks, and the relationship between RFID and the main SCM processes.


Author(s):  
Diane A. Desierto

This paper describes Bayan Muna et al. v. Mendoza et al., a 2009 Philippine Supreme Court petition involving the first and ongoing certiorari challenge to the Philippine government’s implementation of passive Radio Frequency Identification (RFID) technology in the registration of all motor vehicles in the Philippines. As a matter of constitutional jurisprudence and policy, the passive use of RFID technology in this context does not infringe constitutionally-protected privacy expectations, entirely consistent with the Executive Branch’s law enforcement powers. The paper shows how the proposed RFID tagging of motor vehicles in the Philippines satisfies the tests of reasonable expectations, and by dealing only with already publicly available information, avoids spectral fears of data mining and government abuse.


Sign in / Sign up

Export Citation Format

Share Document