E-security Through RFID

Authors

  • Amutha K Dept. of Computer Science, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli-12, Tamilnadu, India
  • Vallinayagi V Dept. of Computer Science, Sri Sarada College For Women, Tirunelveli, India

Keywords:

RFID, Attendance,, Active tag, Reader, face recognition

Abstract

Nowadays numerous applications based on Radio Frequency Identification (RFID) systems are developed and also applied to different areas such as building system, health, agriculture, hospitals industry and educational institution. RFID technology means Radio Frequency Identification include automatic wireless identification using electronic tags such as passive and active readers. In this paper, we try to solve the attendance problem in educational sector using this technology. The purpose of this function is to monitor the student attendance to eliminate the waste of time instead of manual attendance process. Therefore they capture the face to face recognition and also allocate the suitable attendance scores for further process

References

[1]Chitresh, S and Amit K (2010),”An efficient Automatic Attendance Using Fingerprint Verification Techniquee” ”,International Journal on ComputerScience and Engineering (IJCSE),Vol 2 No.pp 264-269

[2]Henry.SS. Arivazhagan and Ganesan(2003),Fingerprint verifiationsusing wavlet Transform ,International Conference on computational and Multimedia Applications, 2003.[3]

[3][Maltoni D, D. Maio, A. K. Jain, S. Prabhaker (2003), “Handbook of Fingerprint Recognition”, Springer, New York,Pp 13-20.

[4] Victor S, Jonathan M,Reece J,and Lemire(2003),”StudentWolfpackClub TrackingSystem”, North Carolina State University. USA.

[5] Nambiar A.N. (2009),” A supply chain perspective of RFID Systems”, World Academy of Science, Engineering and Technology Journal, Volume 6,pp1-5.

[6] Mohamed A.B, Abdel-Hamid A and Mohammed K.Y.,(2009), ”Implementation of an Improved secure system detection for E passport by using EPC RFID tags”, World Academy of Science, Engineering and Technology Journal, Volume 6,pp1-5.

[7]Dawes A.T. (2004),”Is RFIDRight for Your Library”, Journal of Access Services, Volume 2(4), pp 7-13.

Longe O.O.(2009),”Implementation of Student Attendance System using RFID Technology”, B. Tech Project Report, Ladoke Akintola University of Technology, Ogbomoso, Nigeria

[8]Liu C.M. and chen L.S.(2009),”Applications of RFID technology for improving production efficiency in an Integrated –circuit packaging house,”International Journal ofProduction Research, vol47,no.8,pp.2203-2216.

[9]RFID SensNet Lab(2005), A white paper on Automatic attendance System Texas A&M University, Texas, USA

[10]Bardaki, C.Kourouthanassis, P. and Pramatari,K,(2012), Deploying RFID-Enabled Services in the Retail Supply Chain:Lessons toward the Internet of Things, Information Systems Management, Vol.29:no.3,pp 233-245.

[11]Stockman, H. (1948). Communication by Means of Reflected Power, Proceedings of the Institute of Radio Engineers, 36(10) 1196-1204.

[12]Strassner, B. & Chang, K. (2003). Integrated antenna system for wireless RFID tag in monitoring oil drill pipe, Proceedings of the International Symposium on Antennas and Propagation Society, IEEE, 1 208-211.

[13]Terez, T.J. (1992), Bar codes move into maintenance management, Hydraulics & Pneumatics, 45(4) 36.

[14]Domdouzis, K., Kumar, B. & Anumba, C. (2007). Radio-Frequency Identification (RFID) applications: A brief introduction, Advanced Engineering Informatics, 21(4) 350-355.

[15]Fontelera, J. (2005), RFID exploration, Converting Magazine, 23(9) 28-32.

[16]Hunt, V.D., Puglia, A.& Puglia, M. (2007), RFID-A Guide to Radio Frequency Identification, Wiley-Interscience.

[18]. Ko, C.H. & Wang, S.F. (2007), Overcoming difficulties in weekly work planning. Research Journal of Applied Sciences, 2(7) 823-827.

Downloads

Published

2025-11-25

How to Cite

[1]
K. Amutha and V. Vallinayagi, “E-security Through RFID”, Int. J. Comp. Sci. Eng., vol. 7, no. 8, pp. 75–78, Nov. 2025.