This is a complete project material on Design, Construction And Display Of Radio Frequency Identification And Detection (Rfid) Based Ushering And Welcoming System
ABSTRACT
PASS 2024 UTME WITHOUT STRESS:- 👉 DOWNLOAD and PRACTICE with 2023 UTME CBT APP 📱👈
CLICK to DOWNLOAD NOW.:- 👉 PASS Your POST UTME by Downloading Your School's Post UTME Past Questions and Answers 📱👈
Radio Frequency Identification and Detection (RFID) for guests ushering and providing a laudable welcome to guests. The system comprises a individual intelligent identification cards, a terminal and a high-end server. An RFID card (tags) attached to each guest’s Identity card is used to identify and recognize the individual or bearer. The terminal is an all-in-one standalone machine integrating a card reader, a display and a network system. The high-end server is a wired or wireless connectivity connected to an SQL database.
TABLE OF CONTENTS
Cover page
Title page
Declaration
Approval
Dedication
Acknowledgements
Table of Contents
List of Figures
Abstract
CHAPTER ONE
1.0 Introduction
1.1 Background of Study
1.2 Statement of Problem
1.3 Aims and Objective
1.4 Methodology
1.4.1 The RFID Tags/ ID card
1.4.2 The RFID Reader
1.4.3 Host Software
1.4.4 Server
1.4.5 Data base
CHAPTER TWO
2.0 Literature Review
2.1 Introduction
2.1.1 The evolution of RFID
2.1.2 Technology Development
2.1.3 Spectrum Exploitation
2.1.4 Data Storage and Management
2.1.5 Research Gaps
2.2 Review of Related Works
2.2.1 Biometrics
2.2.2 Barcode
2.2.3 Smartcards
2.3 Present Research Work
2.4 Comparative Analysis
2.5 Advantages of Radio Identification and Detection (RFID) System
2.6 Area of Applications
2.6.1 Instance or Class Identification
2.6.2 Location Identification
2.6.3 Transfer of Further Data
2.6.4 Asset Tracking
2.6.5 Manufacturing
2.6.6 Supply Chain Management
2.6.7 Payment Systems
2.6.8 Security and Access Control
2.7 Conclusion
CHAPTER THREE
3.0 Design Methodology
3.1 Introduction
3.2 Design Specification
3.3 Design Analysis
3.4 Component Selection
3.4.1 Components Used
3.4.2 PIC18F2550 Microcontroller
3.4.3 The UHF Reader
3.4.4 The RFID TAGs
3.4.5 The Database Management System (SQL Server)
3.4.6 The Display Unit
3.4.7 Software Development
3.5 The Host Software
3.6 Circuit Diagram
3.6.1 Principle of Operation
3.6.2 The Login Screen
3.6.3 The Registration Screen
3.6.4 The Authentication (Live Event Screen)
CHAPTER FOUR
4.0 Construction and Packaging
4.1 Introduction
4.2 Construction
4.3 Packaging
4.4 Conclusion
CHAPTER FIVE
5.0 Testing and Results
5.1 Introduction
5.2 Testing
5.3 Results
CHAPTER SIX
6.0 Conclusion and Recommendation
6.1 Conclusion
6.2 Recommendation
References
Appendix
CHAPTER ONE
NTRODUCTION
1.1 Background of the Report
Radio Frequency Identification and Detection (RFID) technology has been around since 1970, but until recently, it has been too expensive to use on a large scale. Originally, RFID tags were used to track large items, like cows, railroad cars and airline luggage that were shipped over long distances. These original tags, called inductively coupled RFID tags, were complex systems of metal coils, antennae and glass.
Radio Frequency Identification and Detection (RFID) is the wireless use of electromagnetic fields to transfer data for the purpose of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder.
Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object. Radio frequency identification (RFID) is one method for Automatic Identification and Data Capture (AIDC).
Radio frequency identification (RFID) has become and will continue to be very important in the area of automated identification.
1.2 Statement of Problem
Officials at most events face some difficulties in identifying all the guests in an event. Some guests frown at improper acknowledgement of their presence. Other top guests would also want an ovation at their entrance.
Furthermore, some important events require that each guest be accredited and issued an invitation card/tag before She / he is allowed or is elegible to attend such events. This could cause a problem since there are no sure ways to reduce impersonation and forgery or falsification of information.
1.3 Aims and Objective
The objective of this project is to eliminate and reduce to the barest minimum impersonation, forgery and falsification of information.
This project “RFID USHERING SYSTEM” offers an automatic identification for guests, displays a laudable welcome message for each registered guest identified at the entrance. This system also ensures that only registered or invited persons are allowed in.
1.4 Methodology
This project was implemented using a PIC18F2550 microcontroller, a Mi-fire long range RFID reader (4 – 5 metres) ,tags, a mini- PC, an 22” LED TV to serve as the screen. An SQL server for the database and guest data storage.
A wooden stand to hold the Application system, the screen and other electronic devices.
A computer Graphical User Interface (GUI) program will be written in C# to control the whole system. Data capture, database communication, welcome screen will be controlled through the GUI.
An SQL 2012 server will be installed as the Relational Database Management System (RDBMS).
1.4.1 The RFID Tags/ ID card
A radio-frequency identification system uses tags, or labels attached to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its response.RFID tags can be either passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal.
A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader.
However, to operate a passive tag, it must be illuminated with a power level roughly a thousand times stronger than for signal transmission. That makes a difference in interference and in exposure to radiation.A passive RFID tag will be used in this project, since no user data is to be stored on the card.
1.4.2 The RFID Reader
The primary function of any server is to provide resources to other computers. The Microsoft SQL server used here will provide data base resources to the host software and also serve as its Relational Data base Management System (RDBMS).
1.4.5 Data base
This is the storage unit of the system. It will be designed using Microsoft SQL.
Scope of the study
The RFID ushering and welcoming system has no limit to the number of guests that can be registered per event; this is because of the use of Microsoft SQL. Hence can handle guests ranging from a few hundreds to tens of thousands.
However, the UHF RFID reader has a special feature called “ANTI COLLISION”. Once more than a TAG/ID is presented, the reader detects none. This is to prevent confusion in deciding which to detect/read from.
To this end, the system is limited to a single guest detection at a time, hence can only display a single guest information at time.
Report Outline
The entire project is basically divided into six chapters.Chapter one gave an introduction about the project report as well as statement of problems, objective and scope of the project. Chapter two gives an insight of related project works and chapter three describes the design procedures used to design the RFID ushering and welcoming system.
Chapter four talks about the construction and packaging of the project work.Chapter five shows the testing and results of the project work as well as challenges encountered. Chapter six is the conclusion and recommendations for this project which describes the overall project based on the observation of the results obtained and summarize the entire project. This chapter also discusses the recommendation for future planning.
SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW
>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894