First of all, we express our sincere thanks and gratitude to Almighty Allah for His divine blessings which enabled us to complete this project successfully. Our supervisor's deep knowledge and great interest in the field of IoT influenced us to carry out this project. His endless patience, expert guidance, constant encouragement, constant and energetic supervision, constructive criticism, valuable advice, reading many poor drafts and correcting them at every stage made this project possible to complete.
Fahad Faisal, Assistant Professor, Department of CSE, Daffodil International University, for their kind support in completing our project and also other faculty members and staff of CSE Department, Daffodil International University. We would like to thank our course participants at Daffodil International University who participated in the discussions during the course. We see the IoT as billions of smart, connected “things” (a kind of “universal global neural network” in the cloud) that will encompass all aspects of our lives, and its foundation is the intelligence provided by embedded processing Keeping these phenomena in mind that they are the authors of this project took the initiative to make the school/college/university environment smart.
This project focuses primarily on Daffodil International University, but can be implemented in different places and environments. The following thesis is a comprehensive reference to the capabilities, usability, applications and evolution of the Internet of Things. This project is a cool circuit and opens up a wide range of different projects, from using it as an attendance system to detecting student information.
Besides our future plan is to convert this project to attendance system, send parents notification about their child information.
Objective
Expected outcomes
Report Layout
Background
- Introduction
- Literature review
- Comparison
- Scope of problem
- Challenges
Below is a summary of the articles: Smart Locks: Lessons for Securing Standard Internet of Things Devices. Idea: Authors investigated the security of smart home locks that can be controlled electronically by mobile devices or remote servers of the lock manufacturer. Idea: When the RFID reader detects the ID card, it sends the unique card to the microcontroller via a serial terminal.
With the help of proper programming, we have to compare the received card number with the numbers already stored in the microcontroller or some database. Since, if any of these numbers match the card number received, the corresponding name stored in that number will be registered. in the system and the attendance for the name stored in the corresponding number will also be noted [6]. In our country there is a project like this called "Smart ID Card" which was recently started by Cambrian School. Both this project is based on the theory of RFID smart cards, but there is a difference between them.
Some complex things are present to activate the Cambrian Smart Card and a bit complicated for some parents. On the other hand, we try to keep this ID card as simple as possible and keep all the operations on our side. The student simply carries the ID card as usual and comes to school, and after class he will return home.
The RFID will record him coming to school and going back home and store information. The detector module is not only for educational institutions; it can also be implemented elsewhere. If the student enters the school far from the RFID reader, some RFID modules will not register the student because many RFIDs have the lowest distance limit.
When we try to build the system, we have to think about the cost of the hardware requirements. The benefits of using RFID are only when the student is confident that the data being transmitted will not be misused. When an RFID tag is associated with a student card, it contains the unique identification number associated with any type of personal information such as student name, ID.
Requirements for Proposed System
- Business Processing Model
- Requirement Analysis
- Use case modeling
- Design Requirements
- Offline Front-end
- Back-end Design
5. Other equipment used here is the element connection board, heatsink to cool the raspberry pi, male and female wires, charger to power the Raspberry pi. The Raspberry Pi is a series of small single-board computers developed by the Raspberry Pi Foundation in the UK to promote basic computing teaching in schools and developing countries. Raspberry pi 3 B+ has a 1.4 GHz 64-bit quad-core processor, dual-band wireless LAN, Bluetooth 4.2/BLE, faster Ethernet and Power-over-Ethernet support. Raspbian is a suggested framework for regular use on the Raspberry Pi.
The RFID RC522 is a very low cost RFID reader and writer based on the MFRC522 microcontroller. Make sure the tags we buy for the wer RFID RC522 operate at 13.56MHz, otherwise we won't read them. Connecting the RFID cables to the Raspberry pi 3 is simple, all it takes is connecting the 7 Raspberry pi pins directly to the RC522 RFID reader.
A Linux shell will appear on the screen asking students to swipe their ID cards over the RFID reader to detect students and collect student information. In Figure 4.1, when we write that script, it means we create a new folder and start writing our Write.py Python script. In Figure 4.2, this code will basically ask us for the content we need to enter and then type that content into the RFID tag.
So other imports in our SimpleMFRC522 library, usually what we really need to talk to the RFID RC522, it streamlines dealing with the chip incredibly compared to the base MFRC522 library. In Figure 4.3, when we write python script, they asked us to write, enter the data, after it asked for RFID tag to write data to RFID tag. In Figure 4.4, this script will basically sit and wait until we put our RFID tag on the RFID RC522 reader, at which point it will output the information it reads from the tag.
We use the print() function to print the information we received from the RFID tag. In Figure 4.5, in this script we need to place our RFID tag on the RFID reader. And Python script detects the RFID tag or data and successfully displays the data previously set in the RFID tag.
As described above, we used PHP, MySQL and apache in the backend to run on the Raspberry Pi for the online server and Python programs. On the other hand, the Raspberry Pi runs some Python scripts to write and read.
Implementation and Testing
Testing implementation
Test result
Conclusion and Limitation
- Advantage of RFID
- Future Scope
- Limitations
- Discussion and Conclusion
This report proves that this project is very promising in types of public and private institutions. Raspberry Pi revolutionizes the world of IoT Based on this system, we can provide new types of services to students and the consumers to make our life easier.
Appendix A: Hardware Configuration
Appendix B: Software Configuration