Escolar Documentos
Profissional Documentos
Cultura Documentos
smart0512@gmail.com
Authorized licensed use limited to: Green Hills Engineering College. Downloaded on July 27, 2009 at 10:14 from IEEE Xplore. Restrictions apply.
small tags. The varieties of RFIDs are widely used in recognition but also integrate the examination of finger
different fields according to their specific features. printer and pupil scanning.
Authorized licensed use limited to: Green Hills Engineering College. Downloaded on July 27, 2009 at 10:14 from IEEE Xplore. Restrictions apply.
operates at 433 MHz and the longest range is about 58
meters. The message sender/ receiver GM-7000 as shown in
figure 3, its main function is to send messages to its
important users and to inform whom its status quo of
the present system when an emergency happens.
Besides, it is equipped with a function of receiving
messages .If necessary, it can even turn the contents of
messages into computer commands.
3.2 Implementation
z
RFID Tag
Authorized licensed use limited to: Green Hills Engineering College. Downloaded on July 27, 2009 at 10:14 from IEEE Xplore. Restrictions apply.
ʳʳʳʳʳ ready to be picked up by their parent outside the
The system is an active RFID system of enhancing building so that their parent can immediately take their
security for kindergartens. Its configuration is shown children without additional waiting. Consequently, the
traffic congestion in front of the kindergarten is
as figure 5. When a student goes into the school, the
significantly relieved at rush hour after class.
reader will respond the student’s tag and write his/her
information into the roll file. At the same time, the
system reads the information of the student and sends
message to his/her parent through the massage sender.
It proves that the student has reached school safely,
and let his/her parent work without worry.
4. Discussion
Although the system has been completed, there is
much to be desired:
Authorized licensed use limited to: Green Hills Engineering College. Downloaded on July 27, 2009 at 10:14 from IEEE Xplore. Restrictions apply.
z Controls for the amount of the students Although the proposed system has been accomplished
When too many students step into the campus at the and experimentally executing at a cooperated
same time, there will be nothing wrong with the kindergarten that accommodates about 200 people
reader’s response . The computer may crash down including the children, teachers and other employees,
when the GPS Modem is sending messages with the but the privacy and the cost are the main issues we are
server’s problems and its slow speed .Thus , I suggest currently concerned. Many parents still doubt the
that the telecommunication providers send all the efficiency of the system. They do not like their cars
messages . would be detected without perception and do complain
the additional cost of the tags. Therefore, our next step
z Stealing the information of the students is performing an evaluation to see if the proposed
Because the messages are sent by the system can actually meet the all expectations and
telecommunication providers, it possibly causes the propose a solution for privacy issues.
telecommunication providers to run any commercial
behavior by stealing the students’ information. 6. References
z Possibility of sending too many messages at a [1] Geethapriya Venkataramani and Srividya
time Gopalan, “Mobile phone based RFID
The system basically sends a message a day. Due to architecture for secure electronic Payments using
the speed problems for the computer management, the RFID credit cards”, Proceedings on The Second
system might make a few errors. For example, one International Availability, Reliability and
parent receives more than 10 messages at a time. Security (ARES 2007), April 2007, Pages:610 –
620
4.3 Usages for the future [2] Michael Anshel and Sarah Levitan, “Reducing
medical errors using secure RFID technology”,
z Taking the temperature of the students ACM SIGCSE Bulletin, 2007, Pages: 157 – 159
Because young children’s physical resistance is not [3] Upkar Varshney, “Pervasive Healthcare and
good. We can’t emphasize the importance of taking the Wireless Health Monitoring”, Mobile Networks
temperature too much. If the tag is attached to a and Applications, 2007, Pages 113 – 127
thermometer, the parents can know their kids’ physical [4] Asdf Robert C. Yoder, “USING RFID IN THE
conditions at any time by sending the messages. CLASSROOM TO TEACH INFORMATION
SYSTEMS PRINCIPLES”, Journal of
z Learning the concept of the time and numbers : Computing Sciences in Colleges, Volume 21,
If the tag is attached to a watch, it can help children 2006, Pages: 123 – 129
learn numbers and tell the time. [5] Yingjiu Li and Xuhua Ding, “Protecting RFID
Communications in Supply Chains”, Proceedings
z Matching with 3G system : on the 2nd ACM symposium on Information,
If we put the tag into our mobile phones, letting the computer and communications security,
parents realize their kids’ conditions at any time and Singapore, 2007, Pages: 234 - 241
any place. We can make the parents feel safe and free
by doing so.
Authorized licensed use limited to: Green Hills Engineering College. Downloaded on July 27, 2009 at 10:14 from IEEE Xplore. Restrictions apply.