Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Design of an Employee Tracking System using RFID
1
Agaba, Francis, 2Ojekundu, Nathaniel
Research Scholar
Computer Science Department
Ignatius Ajuru University of Education
Rumuolumeni, Port Harcourt,
Nigeria.
Abstract:- Every organization, regardless of whether They need to meander from space to room, floor to
enormous or little, has human asset difficulties to floor to play out their work. In such cases, it turns out to be
survive. Each association has diverse representative amazingly hard to monitor individuals and discover them
administration needs, hence we outline select worker when they are required.
following framework utilizing Radio Frequency
Identification (RFID) framework that are adjusted to Answer for the above issue is as further a following
your administrative prerequisites. This is intended to framework which can track a person when they go into a
help with following of specialists inside an association for room would get the job done the need. This procedure
quick and simple availability, and will enable you to should occur in a problem free way and along these lines a
guarantee that your association is outfitted with the remote framework would be beneficial.
correct level of HR for your future objectives.
Additionally, for those bustling official who are A collector can be put in every one of the rooms in the
dependably in a hurry, our frameworks accompany building and associated with a PC framework which can
remote access highlights, which will enable you to deal take contribution from the associated recipient and enter it in
with your workforce whenever, consistently. These a database all things considered or work force in the
frameworks will at last enable you to more readily building.
oversee assets, for example, time and vitality. RFID
technology encourages programmed remote The recipient would get contribution from a transmitter
distinguishing proof utilizing electronic aloof and which would be given to every one of the general population
dynamic labels with appropriate reader. In this paper, working in the building. Since all the data is signed in a
an endeavour is made to take care of worker checking database, any individual in the building will have the
issue inside an association utilizing RFID technology. capacity to get to this data through any PC associated with
RFID is an technology that utilizations radio waves to this framework and come to know the area of the individual
exchange information from an electronic tag, called he or she is looking for.
RFID tag or name, appended to a worker's identity card,
through a reader to identify and following the Radio-frequency identification (RFID) is a
representative which works in accordance with a programmed identification technique, depending on Storing
product called middleware that encourages and remotely recovering information utilizing gadgets called
correspondence between the framework and the RFID RFID labels or transponders. The innovation requires the
gadgets. The use of RFID to representative checking as collaboration of a RFID reader and a RFID tag. A RFID tag
created and conveyed in this examination is equipped for is a protest that can be connected in to a question with the
wiping out time squandered amid manual looking. One end goal of distinguishing proof and following. This should
of the main features in employee tracking system is time be possible by utilizing radio waves. A few labels can be
tracking for employees. Effective time tracking perused from a few meters away and past the viewable
mechanism saves both time and energy for the pathway of the reader. A RFID tag is a protest that can be
organization. joined into an item; here it is vehicles with the end goal of
recognizable proof and following utilizing radio waves.
Keywords:- Tracking System, RFID, Employee,
Organization. RFID following framework is likewise called a
representative following application. There is a relative
I. INTRODUCTION absence of research concerning following and observing the
development of labourers inside an association premises.
In this day and age, man battles to make his life less This examination goes for evaluating the plausibility of
demanding. The requirement for following has accepted applying RFID for representative following purposes. There
high significance in view of differed and different assets, at are distinctive sorts of GPS beacons accessible in showcase
that point be it a result of an organization being sent from today. Radio Frequency Identification (RFID) is a rising
the organization to customer, be it the benefits, and be it in innovation that utilizations remote radio waves to
the inventory network administration or so far as that is distinguish objects from a separation. RFID empowers the
concerned even the labour. In extensive authoritative client to catch ongoing data in quick moving and massive
structures, where the labour is high, individuals are not item streams with the point of accomplishing a high level of
generally in their lodges. effectiveness and guaranteeing high calibre. The parts of a
common RFID framework incorporate a RFID tag, a RFID
IJISRT18AG42 www.ijisrt.com 146
Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
reader, a RFID middleware and the backend framework. The retransmitted occurrence radio waves with sound recurrence
RFID tag is the distinguishing proof gadget joined to the data. Sound waves vibrated a stomach which marginally
thing to be followed. The RFID reader and receiving wire adjusted the state of the resonator, which tweaked the
are gadgets that can perceive the nearness of RFID labels reflected radio recurrence despite the fact that this gadget
and read the data put away on them. The point of RFID was secret listening gadget, not a recognizable proof gadget
middleware is to process the transmission of data between or tag, it is thought to be an antecedent of radio recurrence
the reader and different applications in the wake of distinguishing proof (RFID) innovation since it was
accepting the data. Middleware is programming that moreover aloof, being empowered and enacted by waves
encourages correspondence between the framework and the from an outside source. Comparative advancements, for
RFID gadgets. The lower costs and the expanding abilities example, the IFF (distinguishing proof companion and
of the RFID method pull in consideration in following along adversary) transponder created in the United Kingdom, was
and observing the development of labourers/representative routinely utilized by the partners in the World War 2 to
in an association. recognize flying machines as companion or enemy.
Transponders are as yet utilized by most fuelled flying
A. Significant of the Study machines right up 'til the present time.
In extensive authoritative structures, where the labour
is high, individuals are not generally in their lodges. Mario .W. Cardullo was the first to have gotten the
Henceforth RFID is proposed as a result of its lower cost United States patent for a functioning RFID tag with re-
and expanding capacities of the RFID procedure which pulls writable memory on January 23, 1973 (Amirjan B. N, 2009).
in consideration in following along and checking the In that same year, Charles Walton, a California business
development of labourers/representative in an association. person, got a patent for a detached transponder used to open
an entryway without a key. A card with an implanted
B. Aim and Objectives transponder conveys a reader close to an entryway, when the
The aim of this research is to design an employee reader identifies a substantial recognizable proof number put
tracking system using RFID. And the following objectives away inside the tag, the reader opens the entryway. Walton
are: authorized the innovation to Schalge bolt of San Francisco, a
To explore the usage of RFID in Tracking. bolt producer and different organizations (Daniel M. D and
To design a database which will input and store employee Steven M. W 2010).
information.
Time and participation frameworks are a noteworthy
To design an architectural framework for the tracking piece of the present human asset frameworks, take
system using RFID. association towards better human asset practice, frameworks
In the paper, Section II is on some related concepts on and greatness. The usage of time and participation
Radio Frequency Identification (RFID), section III is on framework has a ton of points of interest for the chief. The
proposed architectural framework using RFID to track sort of framework that is actualized relies on what the
employee location within an organization. Section IV is on association is endeavouring to accomplish by executing the
the system flowchart and section V is the conclusion. framework. There are diverse kinds of programmed
participation frameworks; each sort of framework is suited
C. Scope of the Study to various necessities and prerequisites (Gordon .N. W,
The examination is focused on every organization, 2002). Probably the most well-known composes
regardless of its size. Such associations might be incorporate; biometric participation framework, attractive
Educational institutions, Hospitals, Banks, Company a so stripe participation framework, scanner tag participation
on. framework, and RFID participation framework.
II. RELATED WORKS Various related works exist in writing, use of RFID
Technology to various zones and particularly to the zone of
The utilization of Radio-frequency identification scholarly and association participation observing issue.
(RFID) innovation in computerized electronic condition and Writers have composed and actualized a model of an
for following items has been generally looked into upon by anchored and compact inserted reader framework to peruse
analysts and conveyed by different associations as a the biometric information from the electronic visa. The
component of their mechanization frameworks. Cases of a creators endeavoured to tackle issues of unwavering quality;
genuine RFID contact less information connect security and protection in E-travel papers by confirming
arrangements that use RFID innovation for question holder web based utilizing Global System of Mobile
following and robotized information accumulation Communications (GSM) organize. The GSM arrange is the
arrangement. RFID is an innovation that utilizations radio principle interface between ID focus and the e-travel permit
waves to exchange information from an electronic tag, reader (Mohamed A.B, et al 2009). The correspondence
called RFID tag or mark, joined to a question, through a information is ensured amongst server and e-passport reader
reader to identify and following the protest (Mohd F. B. M, by utilizing AES to scramble information for insurance
2008). while exchanging through GSM organize. Creator checked
on the ebb and flow examine use of RFID to various zones
In 1945, Leon Theremin imagined a reconnaissance with accentuation on application for production network
device (for spy exercises) for the Soviet Union which administration and built up an ordered system to arrange
IJISRT18AG42 www.ijisrt.com 147
Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
writing which empowers quick and simple substance serialized identifier, or tag number, that particularly
examination to help recognize regions for future research distinguishes that thing, like the manner in which many
(Nambiar A.N. (2009)). It was surveyed the utilization of scanner tags are utilized today. A key distinction anyway
RFID in a coordinated circuit(IC) bundling house to is that RFID labels have a higher information limit than
determine stock exchange issues (Liu C.M and Chen L.S their standardized tag partners. This expands the
(2009)). His investigation recommends that RFID alternatives for the kind of data that can be encoded on
contributes critical upgrades to the water accepting the tag. The measure of information stockpiling on a tag
procedure and the stock exchange process that diminish can shift, going from 16 bits on the low end to as much
work cost and man-made mistakes. A computerized as a few thousand bits on the top of the line. Obviously,
participation administration framework was actualized both the more noteworthy the capacity limit, the higher the
in electronic and versatile stage utilizing stationary network cost per tag. Like every single remote correspondence,
AR 400 RFID reader with four circulatory enraptured radio there are assortments of frequencies or spectra through
wires and Symbol MC9000-G handheld RFID reader which RFID labels can speak with reader. Low-
separately. In the electronic stage, the participation recurrence labels are less expensive than ultra-high-
administration framework delineates a basic customer recurrence (UHF) labels, utilize less power and are better
(receiving wires set at classroom entrance)/server (favoured ready to enter non metallic substances.
understudy database) framework. Understudies can
outwardly observe their names as they entered class on the RFID Reader: A gadget used to speak with RFID Tag.
screen and they are guaranteed that their essence has been The reader has at least one reception apparatuses, which
entered in the educator's database (RFIDSensNet Lab, discharges radio waves and get motions back, from the
2005). Be that as it may, one essential disadvantage about RFID Tag. Additionally called Interrogator since it
this framework is the RFID label read rates corrupt hugely questions the RFID Tag. Information recovery - RFID
as it comes nearer to electronic gadgets. Reader – Device - Emits radio waves - Received by the
RFID Tag - Activates the microchip information get
A. Components of RFID transmitted.
An essential RFID framework comprise of three
segments: B. Advantages of RFID
An receiving wire (Antenna) or coil Not requiring observable pathway access to be perused.
A handset (with decoder) Automatic checking and information logging is
A transponder (RF tag) electronically modified with conceivable without Operator intercession.
exceptional data. These are depicted underneath: Each tag can hold something beyond a novel vehicle
code.
Antenna: The receiving wire transmits radio signs to
Everything can be separately named
initiate the tag and read and compose information to it.
With the correct innovation a majority of labels can be
Receiving wires are the courses between the tag and the
simultaneously perused.
handset, which controls the framework's information
securing and correspondence. Reception apparatuses are Gives a high level of security and item verification – a
accessible in an assortment of shapes and sizes; they can tag is harder to fake than a scanner tag.
be incorporated with a door jamb to get label information The supporting information framework can permit
from people or things going through the entryway, or information recovery and vehicle following anyplace
mounted on an interstate tollbooth to screen movement gave the scanner/reader is sufficiently close to the tag.
going by on a road. The electromagnetic field created by Since each tag can be one of a kind they can go about as
a radio wire can be always present when various labels a security highlight if lost or stolen.
are normal ceaselessly. On the off chance that consistent
C. Disadvantages of RFID
cross examination isn't required; a sensor gadget can
initiate the field. Frequently the radio wire is bundled Some normal issues with RFID are reader impact.
with the handset and decoder to wind up a reader, which Reader impact happens when the signs from at least two
readers cover.
can be designed either as a handheld or a settled mount
gadget. The reader transmits radio waves in scopes of Another issue is Tag impact. Label crash happens when
somewhere in the range of one inch to 100 feet or all the numerous labels are available in a little territory
more, contingent on its capacity yield and the radio D. Advantages of RFID over manual Search
recurrence utilized. At the point when a RFID label goes
RFID Can Read Multiple Tags Simultaneously
through the electromagnetic zone, it distinguishes the
Playing out a manual stock process expects staff to
reader initiation flag. The reader deciphers the
separately coordinate label ID's or serial numbers. This can
information encoded in the label's incorporated circuit
be an exceptionally tedious and inclined to mistakes.
(silicon chip) and the information is passed to the host
Utilizing scanner tags accelerates the stock procedure and
PC for preparing.
makes it more precise, yet at the same time requires every
advantage for being filtered separately. Numerous handheld
TAGS (Transponders): A RFID tag is involved a
RFID readers can read up to 20 labels or more at the same
microchip containing distinguishing data and a reception
time.
apparatus that transmits this information remotely to a
reader. At its most fundamental, the chip will contain a
IJISRT18AG42 www.ijisrt.com 148
Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
RFID Does Not Require Line-of-Sigh worker following framework is quicker, and does not
Both manual and standardized identification forms require viewable pathway. The RFID framework has higher
necessitate that the labels be physically found and information stockpiling. In the RFID frameworks, the
perceptible. Another favourable position of RFID is the transponders are additionally simple to disguise or fuse in
capacity to peruse labels that are not unmistakable. Not at all different things. For instance in 2009, specialists effectively
like standardized identifications and intelligible labels that stuck RFID small scale transponder to live ants with a
must be physically found and visible to peruse, RFID labels specific end goal to think about their conduct (Daniel M. D
don't should be noticeable to be perused. For instance, and Steven M. W, 2010). Besides, different RFID cards can
labelling a PC up under a work area would expect staff to be perused all in the meantime. Data about the workers'
creep up under the work area to physically find and view the entrance and participation can be put away on the database.
label when utilizing a manual or standardized identification
process. Utilizing a RFID tag would enable work force to F. RFID Frequency band
peruse the tag through the work area without seeing it. There Recurrence alludes to the measure of the radio waves
are a few special cases to this lead when metal and fluid are used to impart between the RFID framework's segments. It
included. can be expected that higher recurrence coming about quicker
information exchange rate and longer perusing separation.
RFID Improves Processes Anyway as recurrence builds, the affectability to ecological
Physically reviewing and inspecting resources can be a factor additionally increments. RFID framework presently
tedious procedure that can pull profitable workers from their works at Low Frequency, High Frequency and Ultra High
ordinary employment obligations to take part in a stock. As Frequency. For the most part a lower recurrence implies a
a rule these representatives are over-qualified and over-paid lower read go and slower information read rate, however
for the assignment. At least, pulling these staff far from their expanded abilities for perusing close or on metal or fluid
duties can influence the primary concern. Actualizing a surfaces (SEEED RFID Reader Manual,
RFID arrangement can drastically diminish the labour www.seeedstudio.com).
required to monitor your benefits and give better
G. Miniaturization
deceivability.
RFIDs are anything but difficult to cover or
E. Operations consolidate in different things. For instance, in 2009 analysts
RFID gadgets and programming are bolstered by a at Bristol University effectively stuck RFID miniaturized
modern programming engineering that empowers the scale transponders to live ants so as to examine their conduct
accumulation and conveyance of area based data in close (Carlos .C. Murphy, 2005). This pattern towards
continuous. A total photo of the RFID representative progressively scaled down RFIDs is probably going to
following framework joins the RFID Tags and reader with proceed as innovation propels. Hitachi holds the record for
access to worldwide institutionalized database, guaranteeing the littlest RFID chip, at 0.05mm x 0.05mm. This is 1/64th
continuous access to a la mode data on the card. The card the span of the past record holder, the mu-chips. Make is
contains a one of a kind recognizable proof number called empowered by utilizing the silicon-on-cover (SOI) process.
an electronic item code (EPC). The RFID tag can be perused This residue estimated chips can store 38-digit numbers
from a separation and the inserted electronic data for each utilizing 128-bits read just memory (ROM) (Mohd F. B. M,
card can be over composed more than once. This builds 2008). A noteworthy test is the connection of the reception
innovations like reconnaissance cameras to be enacted in apparatuses, therefore restricting read range to just
conjunction with a worker being in their region. The RFID millimetres.
IJISRT18AG42 www.ijisrt.com 149
Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
III. PROPOSED ARCHITECTURAL FRAMEWORK OF AN EMPLOYEE TRACKING SYSTEM
Human Resource/Administrative Marketing/Production
Department Department
Central server
Information Technology Security Department
Department
Fig 1:- Framework of an employee tracking system
IJISRT18AG42 www.ijisrt.com 150
Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
IV. FLOW CHART OF THE PROPOSED EMPLOYEE TRACKING SYSTEM
START
Add new employee
Manage log, time
and attendance
Tracking
NO
Authentification
Of employee
YES
User interface
END
A software framework is constantly separated into put away in database implies it gives where worker has
subsystems that make it simpler for the advancement and experienced divisions.
testing. The diverse subsystems are known as flowcharts and Time and Attendance: This module keeps section time of
the way toward separating a whole framework into representative into organization/association and keeps up
subsystems is known as modularization or decay. The participation of worker.
diverse modules are: Tracking: This module is utilized to track specific
Add New Employee: This task is performed when new representative and gives stream which is utilized to take
worker should be added to the framework. For instance, after by worker for the duration of the day in the
when organization enrols new workers, their entrance is organization.
embedded in the representative database. Authentication of representative: When worker passes
Manage Log: Employee goes from entryway his data is utilizing RFID-labels through entryways utilizing RFID
get recovered in database and log of whole day will be reader he/she should be verified by sing catching picture
of representative. On the off chance that any worker is
IJISRT18AG42 www.ijisrt.com 151
Volume 3, Issue 8, August – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
doing intermediary of any one it can be effortlessly system detection for E passport by using EPC RFID
distinguish be director and following move must be tags”, World Academy of Science, Engineering and
made on that representative. Technology Journal, Volume 6.
Provide intuitive GUI: This gives client straightforward [9]. Nambiar A.N. (2009),” A supply chain perspective of
cooperation through the framework. RFID Systems”, World Academy of Science,
Administrator Login: It gives validation for executive for Engineering and Technology Journal, Volume 6.
framework. [10]. RFID Journal,‖http://www.rfidjournal.com/RFID.
[11]. RFIDSensNet Lab (2005), A white paper on Automatic
V. CONCLUSION Attendance System. Texas A & M University, Texas,
USA.
This system is design to automate the development of [12]. SEEED RFID Reader Manual, www.seeedstudio.com.
specialists in different division in an organization. For which [13]. Stevan Preradovic and Nemai C. Karmakar (2006).
we are presenting another idea that each labourer ought to RFID reader: a review. Monash University, Australia.
have RF Device fitted with his/her character card. The RF
Reading gadget is put at each passage of all office which
will read the ID card subtle elements, and consequently
approves the owner details. If any mismatch found the
system will automatically send alerts to the specific
department. If no mismatch the departmental Administrator
can see the worker position. With this framework, it will be
considerably simpler to discover the situation of each
worker inside the organization premises; it tracks
effortlessly representative's sign in and out. It sees worker
points of interest and their exercises and furthermore
decreases the multifaceted nature of representative detail
support.
Recommendation
This investigation is prescribed to each association,
which will enable them to screen and deal with their
workforce at record-breaking. It will likewise add to wipe
out time squandered amid manual hunt.
REFERENCE
[1]. Amirjan Bin Nawabjan (2009). Automated attendance
management software. University of Technology,
Malaysia: Degree Thesis.
[2]. Carlos .C. Murphy (2005). Automated attendance
systems. Argentina: Javier Press.
[3]. Daniel M. Dobkin and Steven M. Weigand (2010).
Environmental effects on RFID tag antennas. California:
Bulis Press.
[4]. Gordon .N. Withtaker (2002). Introduction to biometrics
technology. Dint and sons Limited.
[5]. Julia Case and Anita .C. Millspaugh (2005).
Programming in visual basic NET. Sao Paulo: Mcgraw
Press.
[6]. Liu C.M and Chen L.S (2009), "Applications of RFID
technology for improving production efficiency in an
Integrated-circuit packaging house," International
Journal of Production Research, vol 47.
[7]. Mohd Firdaus Bin Mahyidin (2008). Students’
attendance system using RFID technology. Malaysia.
[8]. Mohamed A.B, Abdel-Hamid A and Mohammed
K.Y.,(2009), ”Implementation of an Improved secure
IJISRT18AG42 www.ijisrt.com 152