SlideShare a Scribd company logo
1 of 28
Download to read offline
MULTIMEDIA UNIVERSITY OF KENYA
P. O. BOX 15653 – 00503, NAIROBI, KENYA. MAGADI ROAD.
TEL. +254 20 2071 391/2/3, Fax: +254 20 2017 247
FACULTY OF ENGINEERING & TECHNOLOGY
ELECTRICAL AND COMMUNICATIONS DEPARTMENT
TITLE: ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD
PROJECT PROPOSAL BY:
BRIAN NYAMWAYA OMBONGI – ENG-211-069/2012
MARTIN WACHIYE WAFULA – ENG-211-075/2012
SUPERVISOR
Mr. KIPYEGON E. KOECH
DECEMBER 2016
“This proposal submitted in partial fulfillment for the degree of Bachelor of Science in
Telecommunication and Information Engineering in the department of Electrical and
Communication Engineering of the Multimedia University of Kenya”
i
Declaration
“This research proposal is our original work and has never been submitted to any other University
for any award. All material that have been referenced have been clearly acknowledged in this
proposal”
Signature………………………………………………………….........
Admission No.…………………………………………………………
Date ……………………………………………………………………
Signature………………………………………………………….........
Admission No.…………………………………………………………
Date ……………………………………………………………………
Certification
It is certified that the above students’ information given are correct to the best of my knowledge
and belief.
SUPERVISOR SIGNATURE DATE
………………………. …………………………... ……………………
ii
Table of Contents
Certification ...................................................................................................................................................i
List of figures............................................................................................................................................... iii
List of Tables ............................................................................................................................................... iii
ABSTRACT................................................................................................................................................. iv
ACKNOWLEDGEMENT ........................................................................................................................... iv
Abbreviations and Acronyms ....................................................................................................................... v
Chapter 1: INTRODUCTION.....................................................................................................................1
1.1 General Introduction...............................................................................................................................1
1.2 Problem Statement............................................................................................................................2
1.3 Objectives ...............................................................................................................................................2
1.3.1 General Objective .........................................................................................................................2
1.3.2 Specific Objectives ..............................................................................................................................2
1.4 Justification.............................................................................................................................................2
1.5 Significance.............................................................................................................................................3
1.6 Project Limitations..................................................................................................................................3
CHAPTER 2 .................................................................................................................................................4
LITERATURE REVIEW .............................................................................................................................4
2.1 Case 1: RFID Based Security and Access Control System.....................................................................5
2.2 Case 2: Automatic Identification & Access Control System..................................................................5
2.3 Case 3: The Electracka System at Multimedia University of Kenya......................................................6
2.4 Case 4: Student Tracking Using Passive RFID Devices...................................................................6
2.5 Case 6: RFID and Libraries ....................................................................................................................7
2.6 Case 7: GSM/GPRS Based Security System ..........................................................................................7
CHAPTER 3: METHODOLOGY ................................................................................................................9
3.1 Introduction of the Design ......................................................................................................................9
3.2 Description of the Design Process ..........................................................................................................9
3.2.1 Hardware Design .................................................................................................................................9
3.2.2 Software Design.................................................................................................................................10
3.3 Equipment and Tools............................................................................................................................10
3.3.1 Hardware............................................................................................................................................10
3.3.1.1 Microcontroller ...............................................................................................................................10
iii
3.3.1.2 RFID Reader/ Antenna....................................................................................................................12
3.3.1.3 RFID Tags/Chips ............................................................................................................................13
3.3.2 Software.............................................................................................................................................14
3.3.2.1 USSD ..............................................................................................................................................14
3.3.2.2 Database..........................................................................................................................................15
3.3.2.3 Web Application/ GUI....................................................................................................................15
3.4 FLOWCHARTS OF THE TWO TERMINALS ..............................................................................................15
3.4 Expected Results...................................................................................................................................19
TIMELINE..................................................................................................................................................20
BUDGET ....................................................................................................................................................20
REFERENCES ...........................................................................................................................................21
List of figures
FIGURE 1 ARDUINO UNO MICROCONTROLLER ................................................................ 11
FIGURE 2: RFID READER AND ANTENNA............................................................................ 12
FIGURE 3: RFID - TAG READER SYSTEM.............................................................................. 14
FIGURE 4: REPRESENTATION OF THE USSD AND DATABASE PLATFORM ................. 15
FIGURE 5: GENERAL BLOCK DIAGRAM OF THE ENTIRE SYSTEM ................................ 18
List of Tables
TABLE 1: WORK PLAN ............................................................................................................. 20
TABLE 2: BUDGET..................................................................................................................... 20
iv
ABSTRACT
Electronic theft is a major predicament in this country and especially in institutions of higher
learning. Several methods are being used to alleviate the situation, but they also suffer from
several limitations. In Multimedia University of Kenya, Electracka system is used to monitor
laptop movement in and out of the institution, but even this smart system is faced with key
complexities in both tracking and reporting mechanisms. This project proposal describes the
possible management of electronics by using RFID chips embedded on electronic devices and on
user ID’s and a USSD platform for quick reporting and management. The proposed system is
implemented on both hardware and software components. The hardware comprises of RFID
passive tags -programmed with owner details, RFID module reader and a server hosting the
application and database. The software component consists of an application programming
interface necessary to interface the hardware subsystem with a PC to achieve the automated
system, a graphical user interface, database as well as USSD platform that is implemented at
individual user level.
ACKNOWLEDGEMENT
First and foremost, we would like to acknowledge our able parents for supporting us all through
our childhood up to this level. Our sincere thanks also to the entire department of Electrical and
Communication Engineering, Multimedia University of Kenya especially to the Chairman of the
department for both his role to our mentored stay in the institution and for accepting to be our
supervisor in this project. We also thank the entire faculty of engineering staff for the knowledge
imparted on us to be able to do this final year project.
Finally, all praise be to God for the gift of life.
v
Abbreviations and Acronyms
USSD ……………………………….............Unstructured Supplementary Service Data
RFID …………………………….……..........Radio Frequency Identification
MMU ..............................................................Multimedia University of Kenya
GSM ...............................................................Global System for Mobile Communication
PC …………………………….………. ........Personal Computer
HTML …………………………………........ Hypertext Markup Language
CSS ……………………………………........ Cascading Style Sheets
RFID ……………………………….….......... Radio Frequency Identification
API ……………………………………......... Application Programming Interface
MMU …………………………………. .........Multimedia University of Kenya
LoS ……………………………………...........Line of Sight
GSM …………………………………........... Global System for Mobile Communication
GPMS ……………………………..................Gate Pass Management System
GPRS ...............................................................General Packet Radio Service
RAM ................................................................ Random Access Memory
EEPROM ........................................................Electronically Programmable Read Only Memory
AVR ................................................................Aboriginal Voices Radio
1
Chapter 1: INTRODUCTION
1.1 General Introduction
Electronic equipment theft is perhaps the most common and prevalent case of theft among
offices, organizations, homes and even institutions of higher learning. Of this, electronics and
more specifically laptops are one of most targeted because of both their market value as well as
social value. Internationally, in 2004 the Computer crime and security survey In the United states
of America reported that 600,000 PCs were stolen in the year 2003 of which 97% of these were
never recovered. [1] Kensington infographic statistics indicate that one laptop is stolen every 53
seconds while 80% of the cost of stolen laptops results in data breaches. [2] Locally, in
Multimedia University alone, an approximate ten laptops are stolen within a period of three
months, with a startling 14 students in the telecommunication and information class of 2017
having lost their PCs within a five year period.
Several methods have been proposed to deal with the rampant cases, and in Multimedia
University, manual serial number checking and entry into a logbook has been replaced by a
smarter approach, the Electracka system [3]. This system however is faced with several such as
the long check time at the gate terminal which has resulted in confrontations between the student
body and the security guards mandated with the inspection of the electronics. There is also no
record of laptop movement available, while it’s also easy to conceal a laptop from being
checked. The reporting mechanism is also largely done manually, where an individual goes to
report to the security guards of a stolen laptop, a period in which the thief would have managed
to smuggle the device out. It is no surprise then that of the 14, fifth year engineering students
mentioned above, none has ever managed to recover the stolen laptop by this system, or by any
means.
In this proposal, a better solution is being suggested in which RFID chips are implanted in both
an individual pate pass and equipment which are programmed with the user details and his
particulars which are then cross referenced with a record existing on a database for analysis and
monitoring purposes. Additionally, USSD Is used to provide a user both instant theft reporting
and access granting to another individual to use/pass with the equipment and the gate checkpoint.
2
1.2 Problem Statement
Laptop theft in MMU, other institutions, and the country at large, has become a serious problem,
and attempts to mitigate it have become almost futile. Current systems are inefficient and time
consuming given that they require human involvement which causes a lot of time delay. Our
project intends to solve this by having automatic authentication of electronics equipment and
faster way of reporting loss.
1.3 Objectives
1.3.1 General Objective
To design and implement an automatic electronic equipment management system.
1.3.2 Specific Objectives
1. To design and implement a hardware Subsystem, based on RFID technology.
2. To design and implement a Software Subsystem comprising of database, GUI and USSD.
3. To interface the hardware and software subsystems.
1.4 Justification
A smarter way of monitoring equipment based on RFID and USSD platforms is necessary to
eliminate the long waits associated with manual monitoring systems and therefore also
eliminating the human to human conflict that arises during the entire process. This is because
RFIDs don’t require a LoS communication as compared to bar code scanning which is most
commonly used at the moment.
3
Automatic alerting of users via text immediately a reported stolen laptop is recovered, much like
the Automated Teller Machine transactions that are immediately followed up by an SMS to user,
will eliminate any possible aiding and abetting by the security guards.
The USSD platform, which is based on GSM is more reliable way of reporting and giving access
to another party to use/move with your equipment, as opposed to manually going to security
office to do the same, or even texting or online methods which require internet access, which
may not always be available especially to users with no smartphones.
We project that the final system will both alleviate stress among student who may fall victim of
laptop theft as this system increases confidence levels of recovery of a stolen electronic
equipment.
1.5 Significance
This project is in line with world trends and statistics that estimate that there will be 273 million
shipments of tablets and laptops worldwide by 2019 [4] which present a need for better tracking
to ensure loss (both financial and data) and high levels of cyber security are maintained.
1.6 Project Limitations
The frequency range allocation for RFID i.e. at 125-135Khz for LF,13.56MHz for HF, 868,902-
915 for UHF and at 2.54Ghz for Microwave limits the actual implementation distance i.e.
distance from reader to tagged user, with distance increasing with increase in frequency up to a
maximum of 20M at microwave frequencies but with a tradeoff of increase in probability of
being blocked by certain objects e.g. water.
4
CHAPTER 2
LITERATURE REVIEW
Radio frequency identification is an identification method, relying on storing and remotely
retrieving data using devices called RFID tags or transponders. An RFID tag can be incorporated
or attached onto a product, animal or person for the purpose of identification using radio waves.
Passive RFID tags require no internal power source whereas active tags require a power source
[5].
Some areas where RFID has been applied include: (a)Automotive: used for anti-theft
immobilizers and passive entry system, (b)Animal tracking: used by ranchers and livestock
producers to meet export requirements and optimize livestock value. Also RFID has been used
for tracking wild animals in ecological studies and tagging pets to return to owners, (c)Asset
tracking: RFID used in the library to limit theft and keep books in circulation more efficiently.
Smart tickets in sports and entertainment also apply this technology, (d)Contactless commerce as
in the case of MasterCard, (e)In supply chain to keep inventories at optimal level, reduce out-of-
stock losses and limit shop lifting [6] and (f)Applied in access control to restricted areas or
buildings [6].
As opposed to barcode, RFID do not need a line of sight and scanning can be done at greater
distances for example, high frequency RFID systems (850 – 950 MHz, 2.4 – 2.5 GHz) offer
transmission ranges more than 90 feet [5]. Other benefits offered by RFID include:
identification without visual contact, read/write capabilities, cluster reading, secure
communication, withstanding harsh industrial environment, reliability and speed, reusability and
data storage at point-of-origin. The frequency of operation of RFID tags is categorized as follows
[6]:Low frequency (30KHz to 500KHz), Mid-frequency (900KHz to 1500KHz) and High-
frequency (2.4GHz to 2.5GHz).
5
2.1 Case 1: RFID Based Security and Access Control System
This system was used for security and provision of access in Punjab University premises. It
combined RFID and biometrics to accomplish required task. RFID reader installed at the
entrance of the hostel detects a number, system captures image and scans the database for a
match. For a match is granted, otherwise an alarm goes on and system makes an emergency call
to the security van through the GSM modem.
The use of biometric is expensive and will consume much time at the entry points while
authenticating students. This is avoided in our design for efficiency.
2.2 Case 2: Automatic Identification & Access Control System
In this project RFID and biometrics are used. When this RFID is installed at hotel entrance, it
detects and verifies for a match where the image of the user is registered. If it matches, then
access is granted otherwise an alarm turns on & the suspect can be caught.
This system consists of 2 phases: Registration phase & recognition phase. RFID gets user no,
image of the users is captured and passed to neural network for recognition. If match is found,
access is granted for user. User authenticity is checked at 3 phases; hostel entrance, exits and
mess entrance.
Entrance and exit module use RFID and face recognition for identification while mess module
uses RFID with a password to grant permission. These modules communicate with computer
system through main controller. The computer system after processing these interrupts, issues
commands to these modules through main controllers.
The involvement of biometric & facial recognition would be inconvenient in a setting of a big
university. Time will be consumed while having one student’s image being processed at a time to
grand entry. This method does not grand security of electronic equipment and still needs human
involvement [7].
6
2.3 Case 3: The Electracka System at Multimedia University of Kenya
Due to frustrations received from theft of laptops, a student at MMU developed a system called
Electracka to curb theft of laptops and other devices. The online system gives users the ability to
create an account and register their electronic devices using their passport photo, Identification
Number and device serial number. All these details are unique to a person. This system also
allows companies to create electronics asset register account. The innovator says that the
registration gives you online ownership of the device and is a prove of the device ownership [8].
The main objective of this system was to achieve significant reduction or even eliminate property
crime on electronic devices across institutions that use the system. This also differentiates
Electracka with other systems that could not be used across institutions. The system was
designed to use a bar code reader to read the serial number of the device. If the device was stolen
from institution A and one tries to register it at institution B which uses the same system, an e-
mail and SMS notification is sent to the owner. The free use and exit with stolen devices is
therefore restricted in institutions using the system.
This project uses barcodes to implement. Barcodes have the liability of requiring a line of sight
for their operation. The laptop has to be physically removed from the bag for it to be scanned.
This is time-consuming. Alternatively, is the use of biometrics which is far more expensive to
implement and it depends heavily on the physiological characteristics of the owner.
2.4 Case 4: Student Tracking Using Passive RFID Devices
Ensuring the safety of each and every student in a university has been a challenging factor all
throughout the world. This idea of Monitoring Systems by students of Satra University in India,
was used to strengthen the safety aspects of students in a university. Students bypass university
rules by finding loopholes in the system. The students were tracked using passive Radio
Frequency Identification Devices(RFID) which were placed in the students’ ID card. A radio
wave transceiver was used to emit and receive radio waves. A transceiver transmits a common
7
radio wave which is received by the RFID in the ID card. This radio wave is modified by the
RFID’s coils and resent to the receiver. The transceiver can be placed along with the modems of
internet [9]. Position of the student can be tracked: to know the movements of student throughout
the day, to trace the students if he is missing in campus or to contact him easily, to reduce time
spent on taking attendance, to know the number of seminars and workshops attended by students
and to control the misbehavior of students while attendance.
2.5 Case 6: RFID and Libraries
RFID has been used in library circulation operations and theft detection systems. RFID-based
systems move beyond security to become tracking systems that combine security with more
efficient tracking of materials throughout the library, including easier and faster charge and
discharge, inventorying, and materials handling.
This technology has helped librarians reduce valuable staff time spent scanning barcodes while
charging and discharging items. RFID is a combination of radio -frequency-based technology
and microchip technology. The information contained on microchips in the tags are fixed to
library materials is read using radio frequency technology, regardless of item orientation or
alignment. The RFID gates at the library exit(s) can be as wide as four feet because the tags can
be read at a distance of up to two feet by each of two parallel exit gate sensors [10].
2.6 Case 7: GSM/GPRS Based Security System
Zhao developed a low cost GSM/GPRS based wireless home security system which includes
wireless security sensor nodes and a GSM/GPRS gateway. It has the following features
compared to Wi-Fi ones; low cost, low power consumption, simple installation, fast response,
simple user interface. GSM modem acts interface between user and sensor nodes. Sensor nodes
supplied in the [11]system were three types; door security nodes, infrared sensor nodes and fire
alarm nodes. Architecture included facilities e.g. filters, amplifiers, ADC and communication
interfaces,
The limitations this system is that it involved many sensors which increase its cost and the
complexity of design and implementation.
8
Our system minimizes the complexity of hardware design by only having RFID tags, readers and
antennas embedded in the system.
Data obtained is analyzed using computer software and output automatically e.g. buzzer sound if
the laptop serial number does not match the student registration details in the system.
9
CHAPTER 3: METHODOLOGY
3.1 Introduction of the Design
The RFID-based Equipment Tracking System is an integrated system that offers an effective
solution of managing items especially for large scale environment. It combines the RFID
technology and security devices to ensure the items are always being monitored and secured. The
system enables a university for instance to give admission/exit to selected individuals who
satisfy exit/entry conditions that this system proposes to offer. The user also gets the chance
through USSD to grant someone else access to pass through the checkpoints with his/her
electronic equipment.
Programmed RFIDs containing laptop serial number, and Student ID tags are scanned by RFID
antennae reader at a point of exit, the data collected compared to a database of records and match
or mismatch displayed at a web application manned by a security guard.
The master server contains the database which is used to store all data collected from RFID
reader where user can read or change information in the database. The RFID tags contain
antennas to enable the receiving and transferring data. The passive RFID tag creates power from
magnetic field and uses it to energize the circuits of the RFID chip and sends information back to
the reader in the form of radio-frequency waves.
Elsewhere USSD enables a user to remotely communicate with the main server using a series of
authentications to grant access to a friend or report stolen devices.
3.2 Description of the Design Process
The design process is composed of both hardware and software implementations.
3.2.1 Hardware Design
This comprises of designing the sensor nodes(RFIDs) to carry information that is to be captured
by an antennae reader. Arduino Microcontroller will be used to program the passive RFID tags
with serial numbers as well as turning on the alarm system in case a mismatch arises from the
software side - (that uses data from the hardware side. The hardware side is designed to be
installed at the gate and it is to interface with software to complete the project objective.
10
Its proposed hardware implementation flowchart is as shown in figure 1 below.
3.2.2 Software Design
The software implementation consists of the following:
 Web Application that will be used to display the collected data: this will be accomplished
using JavaScript, html and CSS.
 Database: Which will be used to store user credentials as well as RFID tag information.
 USSD: Which will act as a link between the remote user and the database/backend and
Mobile subscriber. This will be achieved using Africa’s-talking API.
The proposed software implementation flowchart is shown in figure 2 below.
3.3 Equipment and Tools
3.3.1 Hardware
3.3.1.1 Microcontroller
A microcontroller is a single on chip computer which includes number of peripherals like RAM,
EEPROM, Timers etc., required to perform some predefined task. There are different
microcontroller families including: 8051, PIC (Programmable Interface Controller) and AVR.
Microcontrollers are used in digital applications as control units. Some microcontrollers come
with them in-build circuits like Analog to digital convertors or digital to analog convertors.
Microcontrollers are mostly programmed using assembly language but in recent years high level
languages like C, C++ PASCAL and java have been used. High level programming of
microcontrollers brings the advantage of not having a different program for each microcontroller
manufacturer. High level programming is also neat, easy to document and maintain and user
friendly.
In this project, Arduino Uno microcontroller board is used which belongs to Atmega328P. The
choice of the microcontroller is mainly because of the following reasons:
11
 Availability and there being a wide open source community in case of troubleshooting
needs.
 Convenient power management and built in voltage regulation: It can be plugged into the
USB port of a computer without any external power. This is essentially important
because our application hardware programming doesn’t necessarily require a lot of
power.
 32 KB of flash memory which is just enough to program a code to identify electronics.
Other technical specifications include:
 Operating voltage of 5V
 Recommended input voltage 7-12V
 14 Digital I/0 pins – 6 which provide PWM output
 6 Analog input pins
 32KB flash memory
 2KB ATmega328P 16RAM
 1KB ATmega328P EEPROM
 16MHz Clock Speed
FIGURE 1 ARDUINO UNO MICROCONTROLLER
12
3.3.1.2 RFID Reader/ Antenna
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the
conduits between the tag and the transceiver, which controls the system's data acquisition and
communication. Antennas are available in a variety of shapes and sizes; they can be built into a
door frame to receive tag data from persons or things passing through the door, or mounted on an
interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field
produced by an antenna can be constantly present when multiple tags are expected continually. If
constant interrogation is not required, a sensor device can activate the field.
The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,
depending upon its power output and the radio frequency used.
When an RFID tag passes through the electromagnetic zone, it detects the reader's activation
signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the
data is passed to the host computer for processing.
FIGURE 2: RFID READER AND ANTENNA
13
3.3.1.3 RFID Tags/Chips
The tags contain transponders that emit messages readable by specialized RFID readers. Most
RFID tags store some sort of identification number. A reader retrieves information about the ID
number from a database, and acts upon it accordingly. RFID tags can also contain writable
memory, which can store information for transfer to various RFID readers in different locations.
This information can track the movement of the tagged item, making that information available
to each reader.
This tags can be read only or read and write.
Types of Tags: RFID tags can be classified as, active and passive, depending on their source of
electrical power. Active RFID tags contain their own power source, usually an on-board battery.
Passive tags obtain power from the signal of an external reader. RFID readers also come in
active and passive varieties, depending on the type of tag they read.
For our project we settled on passive tags because of the following ADVANTAGES over active:
 The tag functions without a battery; these tags have a useful life of twenty years or
more.
 The tag is typically much less expensive to manufacture
 The tag is much smaller (some tags are the size of a grain of rice). These tags have
almost unlimited applications in consumer goods and other areas.
However passive tags have the disadvantage of having a short read distance as compared to
active, but for our project we need approximately 3-7 Meters of read distance, which conforms to
the structure of the gate terminal and also within the range of passive tags.
14
FIGURE 3: RFID - TAG READER SYSTEM
3.3.2 Software
3.3.2.1 USSD
This is a menu driven interactive services such as mobile account balance checking, account top
up etc. Also called Quick codes, this is a protocol used by GSM cellular telephones to
communicate with the service provider’s computers.
Our choice for USSD is based on its availability and its real time/instantaneous application as
compared to perhaps the internet which is a limitation that in its own way as earlier explained in
the problem statement. The USSD connection also remains open during the USSD session
allowing a two-way exchange of a sequence of data. This makes it more responsive than SMS.
Ruby on rails will be used to program the USSD backend platform while the USSD API will be
obtained from Africa’s talking. The API will be used to interlink between the backend platform
and a Telecom company service provider, Safaricom in our case.
The USSD flowchart is shown In figure 2 below:
15
3.3.2.2 Database
This is a data storage platform that will be used to store information on:
 Student details i.e. Admission number/ID number, Student name and
picture.
 Electronic equipment details; which is the serial number of the
equipment.
This will be also developed using Ruby on Rails.
FIGURE 4: REPRESENTATION OF THE USSD AND DATABASE PLATFORM
3.3.2.3 Web Application/ GUI
This is a visual platform that will be used to display the results of data comparison between the
received data from the RFIDs and the data in databases and also act as an alert platform in case
of any reports, e.g. stolen laptop complaint, and mismatch results and any other relevant
information as pertains to identification. This will be developed using JavaScript, HTML and
CSS.
3.4 Flowcharts of the two terminals
16
GATE TERMINAL FLOWCHART
NO NO
YES
YES
NO
YES
NO
YES
NO NO YES
YES
START
RFID STANDBY
MODE
USER
DATA
ONLY?
COMPARE USER
AND EQUIPMENT
DATA
WAIT FOR USER
DATA
DISPLAY
EQUIPMENT
DETAILS
GET DATA
WAIT FOR
EQUIPMENT DATA
RFID
SIGNAL
?
MATCH?
END
NO
EQUIPMENT
DATA
ONLY?
USER AND
EQUIPMENT
DATA
DISPLAY USER
DETAILS
EQUIP
DATA?
?
USER
DATA?
?
USE ALTERNATIVE
IDENTIFICATION
RAISE ALARM ALLOW PASSAGE
YES
17
2
1
USSD PLATFORM FLOWCHART
BEGIN
ENTER USSD
ENTER PIN
PRESS
1 OR 2
ENTER SERIAL
NUMBER
ENTER ID
NUMBER
ENTER ID
NUMBER
ENTER SERIAL
NUMBER
ENTER FRIEND’S
ID NUMBER
REPORT LOST
EQUIPMENT
GRANT ACCESS
END
18
.
.
.
.
.
TAGGED USER
FIGURE 5: GENERAL BLOCK DIAGRAM OF THE ENTIRE SYSTEM
TAGGED
USER
TAGGED
LAPTOP
TAGGED
USER
TAGGED
LAPTOP
TAGGED
USER
TAGGED
LAPTOP
TAGGED
USER
TAGGED
LAPTOP
ELECTROMAGNETIC
WAVES
ELECTROMAGNETI
C WAVES
•DATABASE
RFID ANTENNA
READER
.
.
.
OBSERVATION POINT
REMOTE USER
19
3.4 Expected Results
Based on the flowcharts and simple modelling, we expect the following results.
a) That the RFID tags will be read with no tag collision at the gate terminal and that this
information will be sent successfully to the database for comparison purposes.
b) The USSD platform will send the required information, for instance report a stolen
laptop with no time delay to the main database for comparison purposes.
c) Comparison will be done by the database and displayed with little time delay and results
displayed/or sent back to user to ensure real time equipment management.
20
TIMELINE
ACTIVITY FIFTH YEAR
SEMESTER 1, 2016 SEMESTER 2, 2017
MONTH Sept Oct Nov Dec Jan Feb Mar April
Research and Proposal Writing
Project Design
System Development and
Integration
Testing and Implementation
Project Presentation
Final Report Writing
Documentation
TABLE 1: WORK PLAN
BUDGET
COMPONENT QUANTITY EACH COST(Ksh)
RFID Tags 6 100 600
Arduino kit 1 4000 4000
USSD Shared Testbed (1 1 34,000 34000
RFID reader 1 500 500
Miscellaneous 900
TOTAL 40,100
TABLE 2: BUDGET
21
REFERENCES
[1] "The Statistics - DataLocker.com," DataLocker, 2016. [Online]. Available: https/datalocker.com.
[Accessed Wednesday November 2016].
[2] H. E, "Mobile Device Security: Startling Statistics," Kensington Infograhic, 2006. [Online]. Available:
http://www.chanelpronetwork.com. [Accessed 3 November 2016].
[3] "Welcome to Electraka," ELECTRAKA SYSTEMS, 2016. [Online]. Available:
http://www.electraka.com. [Accessed 3 November 2016].
[4] "Statista," STATISTA, 2016. [Online]. Available: https://www.statista.com/statistics/272595/global-
shipments-forecast-for-tablets. [Accessed 3 November 2016].
[5] V. K. Garg, Wireless Communication and Networking, Morgan Kaufmann Publishers, 2007, p. 707.
[6] M. M. N. M. G. P. &. N. D. M. Abdalla M. M., Information and Communication Technologies
Engineering: Smart Road System, Universita Telematica Internazonale Unnettuno, UTIU, 2011.
[7] A. S., D. S. and &. Sudeepkumar, "Automatic Identification and Access Control System,"
International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), vol.
5, no. 10, 10 May 2016.
[8] MMU, "Student develops electronic tracking system," Multimedia University of Kenya, [Online].
Available: www.mmu.ac.ke/index.php/more-links/item/235-student-develops-electronic-tracking-
system. [Accessed 2 December 2016].
[9] N. Gudla and S. K. P. &. R. V. Satya, "Tracking Students using passive RFID devices," Tamilnadu-
613401, India.
[10] Ayre and L. Bowen, "RFID and Libraries," The Galecia Group (August 2004) Position paper, August
2004.
[11] Zhao and &. Z. Ye, "A low cost GSM/GPRS Based Wireless Home Security System," International
Journal of Smart Home, vol. 54, no. 2, 2008.
[12] AMRITA VISHWA VIDYAPEETHAM UNIVERSITY, "Gate Pass Management System at Coimbatore
Campus," AMRITA VISHWA VIDYAPEETHAM UNIVERSITY, [Online]. Available:
https://www.amrita.edu/campus/coimbatore/gate-pass-management-system. [Accessed 2
December 2016].
[13] R. Kilel, "Crime in Campus," Standard Media Group, 28 April 2015. [Online]. Available:
http://www.standardmedia.co.ke/ureport/story/2000160166/crime-in-campus. [Accessed 3
December 2016].
22
[14] N. T, "11 suspects arrested over theft of laptops in Juja," The Star, 19 October 2016. [Online].
Available: https://www.the-star.co.ke/news/2016/10/19/11-suspects-arrested-over-theft-of-
laptops-in-Juja_c1440129. [Accessed 3 December 2016].
[15] Nevon Projects, "Projects," Nevon Projects, [Online]. Available:
http://nevonprojects.com/security-access-control-using-rfid-project/y. [Accessed December
2016].
[16] F. Umar, H. Mahmood, A. Muhammad, H. Athar and A. Usman, "RFID Based Security and Access
Control System," LACSIT International Journal of Engineering and Technology , vol. 6, no. 4, 2014.

More Related Content

What's hot

FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE
FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCEFINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE
FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE
FairulAiman1
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
TELKOMNIKA JOURNAL
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
 

What's hot (20)

IRJET- Student Portal
IRJET-  	  Student PortalIRJET-  	  Student Portal
IRJET- Student Portal
 
FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE
FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCEFINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE
FINGERPRINT AUTHENTICATION SYSTEM FOR EXAMINATION ATTENDANCE
 
RFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verificationRFID Based Smart Class Attendance System with Absentees using Face verification
RFID Based Smart Class Attendance System with Absentees using Face verification
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
Biometric Electronic Voting Machine
Biometric Electronic Voting MachineBiometric Electronic Voting Machine
Biometric Electronic Voting Machine
 
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBE...
 
Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...Secured e-payment system based on automated authentication data and iterated ...
Secured e-payment system based on automated authentication data and iterated ...
 
IRJET- Vehicle Attendance and Monitoring System
IRJET- Vehicle Attendance and Monitoring SystemIRJET- Vehicle Attendance and Monitoring System
IRJET- Vehicle Attendance and Monitoring System
 
Dormitory management system project report
Dormitory management system project reportDormitory management system project report
Dormitory management system project report
 
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...IRJET-  	  Improvisation in the Attendance Supervision Method through RFID ba...
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
Interactive Voice Response System for College automation
Interactive Voice Response System for College automationInteractive Voice Response System for College automation
Interactive Voice Response System for College automation
 
Impressive smart card based electronic voting system
Impressive smart card based electronic voting systemImpressive smart card based electronic voting system
Impressive smart card based electronic voting system
 
IRJET- Smart Voting System
IRJET- Smart Voting SystemIRJET- Smart Voting System
IRJET- Smart Voting System
 
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter AnalysisIRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
IRJET- Deployment of Nanosat at Low Altitude for Atmospheric Parameter Analysis
 
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
IRJET- Energy Conservation and Digital Security Notice Board for Smart Class ...
 
IRJET- A Smart Classroom
IRJET- A Smart ClassroomIRJET- A Smart Classroom
IRJET- A Smart Classroom
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 

Similar to ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD

OBD2 Scanner-Final Year Project Report
OBD2 Scanner-Final Year Project ReportOBD2 Scanner-Final Year Project Report
OBD2 Scanner-Final Year Project Report
Kokila Surasinghe
 
RAPA Project Documentaion
RAPA Project DocumentaionRAPA Project Documentaion
RAPA Project Documentaion
Khaled El Sawy
 
final-year-project-latest
final-year-project-latestfinal-year-project-latest
final-year-project-latest
Lasitha Konara
 
11321043, 12121059, 13210001, 13121101_EEE.pdf
11321043, 12121059, 13210001, 13121101_EEE.pdf11321043, 12121059, 13210001, 13121101_EEE.pdf
11321043, 12121059, 13210001, 13121101_EEE.pdf
endryaszewdu
 
11321043, 12121059, 13210001, 13121101_EEE (1).pdf
11321043, 12121059, 13210001, 13121101_EEE (1).pdf11321043, 12121059, 13210001, 13121101_EEE (1).pdf
11321043, 12121059, 13210001, 13121101_EEE (1).pdf
endryaszewdu
 
Fingerprint based exam attendance system
Fingerprint based exam attendance systemFingerprint based exam attendance system
Fingerprint based exam attendance system
VrushabhDhote2
 

Similar to ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD (20)

Avinash thesis final
Avinash thesis finalAvinash thesis final
Avinash thesis final
 
Accident detection and notification system
Accident detection and notification systemAccident detection and notification system
Accident detection and notification system
 
⭐⭐⭐⭐⭐ CV Victor Asanza
⭐⭐⭐⭐⭐ CV Victor Asanza⭐⭐⭐⭐⭐ CV Victor Asanza
⭐⭐⭐⭐⭐ CV Victor Asanza
 
The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...
 
OBD2 Scanner-Final Year Project Report
OBD2 Scanner-Final Year Project ReportOBD2 Scanner-Final Year Project Report
OBD2 Scanner-Final Year Project Report
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
 
ML for blind people.pptx
ML for blind people.pptxML for blind people.pptx
ML for blind people.pptx
 
RAPA Project Documentaion
RAPA Project DocumentaionRAPA Project Documentaion
RAPA Project Documentaion
 
IoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEMIoT BASED ATTENDANCE MONITORING SYSTEM
IoT BASED ATTENDANCE MONITORING SYSTEM
 
Iot attendance system using fingerprint module
Iot attendance system using fingerprint module Iot attendance system using fingerprint module
Iot attendance system using fingerprint module
 
final-year-project-latest
final-year-project-latestfinal-year-project-latest
final-year-project-latest
 
IoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google SheetIoT Based Smart Attendance System Using RFID and Google Sheet
IoT Based Smart Attendance System Using RFID and Google Sheet
 
11321043, 12121059, 13210001, 13121101_EEE.pdf
11321043, 12121059, 13210001, 13121101_EEE.pdf11321043, 12121059, 13210001, 13121101_EEE.pdf
11321043, 12121059, 13210001, 13121101_EEE.pdf
 
11321043, 12121059, 13210001, 13121101_EEE (1).pdf
11321043, 12121059, 13210001, 13121101_EEE (1).pdf11321043, 12121059, 13210001, 13121101_EEE (1).pdf
11321043, 12121059, 13210001, 13121101_EEE (1).pdf
 
Fingerprint based exam attendance system
Fingerprint based exam attendance systemFingerprint based exam attendance system
Fingerprint based exam attendance system
 
IJSRED-V2I1P37
IJSRED-V2I1P37IJSRED-V2I1P37
IJSRED-V2I1P37
 
Department of electronics and communication engineering
Department of electronics and communication engineeringDepartment of electronics and communication engineering
Department of electronics and communication engineering
 
Electroma Department of Electronics and communication Engineering
Electroma Department of Electronics and communication EngineeringElectroma Department of Electronics and communication Engineering
Electroma Department of Electronics and communication Engineering
 
Preprint-EAI ICNGWN2023 - 19-20 Oct 2023.pdf
Preprint-EAI ICNGWN2023 - 19-20 Oct 2023.pdfPreprint-EAI ICNGWN2023 - 19-20 Oct 2023.pdf
Preprint-EAI ICNGWN2023 - 19-20 Oct 2023.pdf
 
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSORAUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
AUTOMATIC ATTENDANCE SYSTEM MANAGEMENT USING RASPBERRY PI WITH ULTRASONIC SENSOR
 

More from Martin Wachiye Wafula

More from Martin Wachiye Wafula (11)

Introduction to information theory
Introduction to information theoryIntroduction to information theory
Introduction to information theory
 
Intelligent reflecting surfaces (IRS)
Intelligent reflecting surfaces  (IRS)Intelligent reflecting surfaces  (IRS)
Intelligent reflecting surfaces (IRS)
 
Disruptive technologies and market place
Disruptive technologies and market placeDisruptive technologies and market place
Disruptive technologies and market place
 
5G: LET'S DEMYSTIFY IT, 5G Technology Update
5G: LET'S DEMYSTIFY IT, 5G Technology Update5G: LET'S DEMYSTIFY IT, 5G Technology Update
5G: LET'S DEMYSTIFY IT, 5G Technology Update
 
Analog filters matlab_examples
Analog filters matlab_examplesAnalog filters matlab_examples
Analog filters matlab_examples
 
Matlab task1
Matlab task1Matlab task1
Matlab task1
 
Matlab problems
Matlab problemsMatlab problems
Matlab problems
 
Discrete time signals on MATLAB
Discrete time signals on MATLABDiscrete time signals on MATLAB
Discrete time signals on MATLAB
 
Discrete time signals on MATLAB
Discrete time signals on MATLABDiscrete time signals on MATLAB
Discrete time signals on MATLAB
 
DIGITAL SIGNAL PROCESSING: Sampling and Reconstruction on MATLAB
DIGITAL SIGNAL PROCESSING: Sampling and Reconstruction on MATLABDIGITAL SIGNAL PROCESSING: Sampling and Reconstruction on MATLAB
DIGITAL SIGNAL PROCESSING: Sampling and Reconstruction on MATLAB
 
Unity in diversity
Unity in diversityUnity in diversity
Unity in diversity
 

Recently uploaded

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD

  • 1. MULTIMEDIA UNIVERSITY OF KENYA P. O. BOX 15653 – 00503, NAIROBI, KENYA. MAGADI ROAD. TEL. +254 20 2071 391/2/3, Fax: +254 20 2017 247 FACULTY OF ENGINEERING & TECHNOLOGY ELECTRICAL AND COMMUNICATIONS DEPARTMENT TITLE: ELECTRONIC MANAGEMENT SYSTEM BASED ON RFID AND USSD PROJECT PROPOSAL BY: BRIAN NYAMWAYA OMBONGI – ENG-211-069/2012 MARTIN WACHIYE WAFULA – ENG-211-075/2012 SUPERVISOR Mr. KIPYEGON E. KOECH DECEMBER 2016 “This proposal submitted in partial fulfillment for the degree of Bachelor of Science in Telecommunication and Information Engineering in the department of Electrical and Communication Engineering of the Multimedia University of Kenya”
  • 2. i Declaration “This research proposal is our original work and has never been submitted to any other University for any award. All material that have been referenced have been clearly acknowledged in this proposal” Signature…………………………………………………………......... Admission No.………………………………………………………… Date …………………………………………………………………… Signature…………………………………………………………......... Admission No.………………………………………………………… Date …………………………………………………………………… Certification It is certified that the above students’ information given are correct to the best of my knowledge and belief. SUPERVISOR SIGNATURE DATE ………………………. …………………………... ……………………
  • 3. ii Table of Contents Certification ...................................................................................................................................................i List of figures............................................................................................................................................... iii List of Tables ............................................................................................................................................... iii ABSTRACT................................................................................................................................................. iv ACKNOWLEDGEMENT ........................................................................................................................... iv Abbreviations and Acronyms ....................................................................................................................... v Chapter 1: INTRODUCTION.....................................................................................................................1 1.1 General Introduction...............................................................................................................................1 1.2 Problem Statement............................................................................................................................2 1.3 Objectives ...............................................................................................................................................2 1.3.1 General Objective .........................................................................................................................2 1.3.2 Specific Objectives ..............................................................................................................................2 1.4 Justification.............................................................................................................................................2 1.5 Significance.............................................................................................................................................3 1.6 Project Limitations..................................................................................................................................3 CHAPTER 2 .................................................................................................................................................4 LITERATURE REVIEW .............................................................................................................................4 2.1 Case 1: RFID Based Security and Access Control System.....................................................................5 2.2 Case 2: Automatic Identification & Access Control System..................................................................5 2.3 Case 3: The Electracka System at Multimedia University of Kenya......................................................6 2.4 Case 4: Student Tracking Using Passive RFID Devices...................................................................6 2.5 Case 6: RFID and Libraries ....................................................................................................................7 2.6 Case 7: GSM/GPRS Based Security System ..........................................................................................7 CHAPTER 3: METHODOLOGY ................................................................................................................9 3.1 Introduction of the Design ......................................................................................................................9 3.2 Description of the Design Process ..........................................................................................................9 3.2.1 Hardware Design .................................................................................................................................9 3.2.2 Software Design.................................................................................................................................10 3.3 Equipment and Tools............................................................................................................................10 3.3.1 Hardware............................................................................................................................................10 3.3.1.1 Microcontroller ...............................................................................................................................10
  • 4. iii 3.3.1.2 RFID Reader/ Antenna....................................................................................................................12 3.3.1.3 RFID Tags/Chips ............................................................................................................................13 3.3.2 Software.............................................................................................................................................14 3.3.2.1 USSD ..............................................................................................................................................14 3.3.2.2 Database..........................................................................................................................................15 3.3.2.3 Web Application/ GUI....................................................................................................................15 3.4 FLOWCHARTS OF THE TWO TERMINALS ..............................................................................................15 3.4 Expected Results...................................................................................................................................19 TIMELINE..................................................................................................................................................20 BUDGET ....................................................................................................................................................20 REFERENCES ...........................................................................................................................................21 List of figures FIGURE 1 ARDUINO UNO MICROCONTROLLER ................................................................ 11 FIGURE 2: RFID READER AND ANTENNA............................................................................ 12 FIGURE 3: RFID - TAG READER SYSTEM.............................................................................. 14 FIGURE 4: REPRESENTATION OF THE USSD AND DATABASE PLATFORM ................. 15 FIGURE 5: GENERAL BLOCK DIAGRAM OF THE ENTIRE SYSTEM ................................ 18 List of Tables TABLE 1: WORK PLAN ............................................................................................................. 20 TABLE 2: BUDGET..................................................................................................................... 20
  • 5. iv ABSTRACT Electronic theft is a major predicament in this country and especially in institutions of higher learning. Several methods are being used to alleviate the situation, but they also suffer from several limitations. In Multimedia University of Kenya, Electracka system is used to monitor laptop movement in and out of the institution, but even this smart system is faced with key complexities in both tracking and reporting mechanisms. This project proposal describes the possible management of electronics by using RFID chips embedded on electronic devices and on user ID’s and a USSD platform for quick reporting and management. The proposed system is implemented on both hardware and software components. The hardware comprises of RFID passive tags -programmed with owner details, RFID module reader and a server hosting the application and database. The software component consists of an application programming interface necessary to interface the hardware subsystem with a PC to achieve the automated system, a graphical user interface, database as well as USSD platform that is implemented at individual user level. ACKNOWLEDGEMENT First and foremost, we would like to acknowledge our able parents for supporting us all through our childhood up to this level. Our sincere thanks also to the entire department of Electrical and Communication Engineering, Multimedia University of Kenya especially to the Chairman of the department for both his role to our mentored stay in the institution and for accepting to be our supervisor in this project. We also thank the entire faculty of engineering staff for the knowledge imparted on us to be able to do this final year project. Finally, all praise be to God for the gift of life.
  • 6. v Abbreviations and Acronyms USSD ……………………………….............Unstructured Supplementary Service Data RFID …………………………….……..........Radio Frequency Identification MMU ..............................................................Multimedia University of Kenya GSM ...............................................................Global System for Mobile Communication PC …………………………….………. ........Personal Computer HTML …………………………………........ Hypertext Markup Language CSS ……………………………………........ Cascading Style Sheets RFID ……………………………….….......... Radio Frequency Identification API ……………………………………......... Application Programming Interface MMU …………………………………. .........Multimedia University of Kenya LoS ……………………………………...........Line of Sight GSM …………………………………........... Global System for Mobile Communication GPMS ……………………………..................Gate Pass Management System GPRS ...............................................................General Packet Radio Service RAM ................................................................ Random Access Memory EEPROM ........................................................Electronically Programmable Read Only Memory AVR ................................................................Aboriginal Voices Radio
  • 7. 1 Chapter 1: INTRODUCTION 1.1 General Introduction Electronic equipment theft is perhaps the most common and prevalent case of theft among offices, organizations, homes and even institutions of higher learning. Of this, electronics and more specifically laptops are one of most targeted because of both their market value as well as social value. Internationally, in 2004 the Computer crime and security survey In the United states of America reported that 600,000 PCs were stolen in the year 2003 of which 97% of these were never recovered. [1] Kensington infographic statistics indicate that one laptop is stolen every 53 seconds while 80% of the cost of stolen laptops results in data breaches. [2] Locally, in Multimedia University alone, an approximate ten laptops are stolen within a period of three months, with a startling 14 students in the telecommunication and information class of 2017 having lost their PCs within a five year period. Several methods have been proposed to deal with the rampant cases, and in Multimedia University, manual serial number checking and entry into a logbook has been replaced by a smarter approach, the Electracka system [3]. This system however is faced with several such as the long check time at the gate terminal which has resulted in confrontations between the student body and the security guards mandated with the inspection of the electronics. There is also no record of laptop movement available, while it’s also easy to conceal a laptop from being checked. The reporting mechanism is also largely done manually, where an individual goes to report to the security guards of a stolen laptop, a period in which the thief would have managed to smuggle the device out. It is no surprise then that of the 14, fifth year engineering students mentioned above, none has ever managed to recover the stolen laptop by this system, or by any means. In this proposal, a better solution is being suggested in which RFID chips are implanted in both an individual pate pass and equipment which are programmed with the user details and his particulars which are then cross referenced with a record existing on a database for analysis and monitoring purposes. Additionally, USSD Is used to provide a user both instant theft reporting and access granting to another individual to use/pass with the equipment and the gate checkpoint.
  • 8. 2 1.2 Problem Statement Laptop theft in MMU, other institutions, and the country at large, has become a serious problem, and attempts to mitigate it have become almost futile. Current systems are inefficient and time consuming given that they require human involvement which causes a lot of time delay. Our project intends to solve this by having automatic authentication of electronics equipment and faster way of reporting loss. 1.3 Objectives 1.3.1 General Objective To design and implement an automatic electronic equipment management system. 1.3.2 Specific Objectives 1. To design and implement a hardware Subsystem, based on RFID technology. 2. To design and implement a Software Subsystem comprising of database, GUI and USSD. 3. To interface the hardware and software subsystems. 1.4 Justification A smarter way of monitoring equipment based on RFID and USSD platforms is necessary to eliminate the long waits associated with manual monitoring systems and therefore also eliminating the human to human conflict that arises during the entire process. This is because RFIDs don’t require a LoS communication as compared to bar code scanning which is most commonly used at the moment.
  • 9. 3 Automatic alerting of users via text immediately a reported stolen laptop is recovered, much like the Automated Teller Machine transactions that are immediately followed up by an SMS to user, will eliminate any possible aiding and abetting by the security guards. The USSD platform, which is based on GSM is more reliable way of reporting and giving access to another party to use/move with your equipment, as opposed to manually going to security office to do the same, or even texting or online methods which require internet access, which may not always be available especially to users with no smartphones. We project that the final system will both alleviate stress among student who may fall victim of laptop theft as this system increases confidence levels of recovery of a stolen electronic equipment. 1.5 Significance This project is in line with world trends and statistics that estimate that there will be 273 million shipments of tablets and laptops worldwide by 2019 [4] which present a need for better tracking to ensure loss (both financial and data) and high levels of cyber security are maintained. 1.6 Project Limitations The frequency range allocation for RFID i.e. at 125-135Khz for LF,13.56MHz for HF, 868,902- 915 for UHF and at 2.54Ghz for Microwave limits the actual implementation distance i.e. distance from reader to tagged user, with distance increasing with increase in frequency up to a maximum of 20M at microwave frequencies but with a tradeoff of increase in probability of being blocked by certain objects e.g. water.
  • 10. 4 CHAPTER 2 LITERATURE REVIEW Radio frequency identification is an identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag can be incorporated or attached onto a product, animal or person for the purpose of identification using radio waves. Passive RFID tags require no internal power source whereas active tags require a power source [5]. Some areas where RFID has been applied include: (a)Automotive: used for anti-theft immobilizers and passive entry system, (b)Animal tracking: used by ranchers and livestock producers to meet export requirements and optimize livestock value. Also RFID has been used for tracking wild animals in ecological studies and tagging pets to return to owners, (c)Asset tracking: RFID used in the library to limit theft and keep books in circulation more efficiently. Smart tickets in sports and entertainment also apply this technology, (d)Contactless commerce as in the case of MasterCard, (e)In supply chain to keep inventories at optimal level, reduce out-of- stock losses and limit shop lifting [6] and (f)Applied in access control to restricted areas or buildings [6]. As opposed to barcode, RFID do not need a line of sight and scanning can be done at greater distances for example, high frequency RFID systems (850 – 950 MHz, 2.4 – 2.5 GHz) offer transmission ranges more than 90 feet [5]. Other benefits offered by RFID include: identification without visual contact, read/write capabilities, cluster reading, secure communication, withstanding harsh industrial environment, reliability and speed, reusability and data storage at point-of-origin. The frequency of operation of RFID tags is categorized as follows [6]:Low frequency (30KHz to 500KHz), Mid-frequency (900KHz to 1500KHz) and High- frequency (2.4GHz to 2.5GHz).
  • 11. 5 2.1 Case 1: RFID Based Security and Access Control System This system was used for security and provision of access in Punjab University premises. It combined RFID and biometrics to accomplish required task. RFID reader installed at the entrance of the hostel detects a number, system captures image and scans the database for a match. For a match is granted, otherwise an alarm goes on and system makes an emergency call to the security van through the GSM modem. The use of biometric is expensive and will consume much time at the entry points while authenticating students. This is avoided in our design for efficiency. 2.2 Case 2: Automatic Identification & Access Control System In this project RFID and biometrics are used. When this RFID is installed at hotel entrance, it detects and verifies for a match where the image of the user is registered. If it matches, then access is granted otherwise an alarm turns on & the suspect can be caught. This system consists of 2 phases: Registration phase & recognition phase. RFID gets user no, image of the users is captured and passed to neural network for recognition. If match is found, access is granted for user. User authenticity is checked at 3 phases; hostel entrance, exits and mess entrance. Entrance and exit module use RFID and face recognition for identification while mess module uses RFID with a password to grant permission. These modules communicate with computer system through main controller. The computer system after processing these interrupts, issues commands to these modules through main controllers. The involvement of biometric & facial recognition would be inconvenient in a setting of a big university. Time will be consumed while having one student’s image being processed at a time to grand entry. This method does not grand security of electronic equipment and still needs human involvement [7].
  • 12. 6 2.3 Case 3: The Electracka System at Multimedia University of Kenya Due to frustrations received from theft of laptops, a student at MMU developed a system called Electracka to curb theft of laptops and other devices. The online system gives users the ability to create an account and register their electronic devices using their passport photo, Identification Number and device serial number. All these details are unique to a person. This system also allows companies to create electronics asset register account. The innovator says that the registration gives you online ownership of the device and is a prove of the device ownership [8]. The main objective of this system was to achieve significant reduction or even eliminate property crime on electronic devices across institutions that use the system. This also differentiates Electracka with other systems that could not be used across institutions. The system was designed to use a bar code reader to read the serial number of the device. If the device was stolen from institution A and one tries to register it at institution B which uses the same system, an e- mail and SMS notification is sent to the owner. The free use and exit with stolen devices is therefore restricted in institutions using the system. This project uses barcodes to implement. Barcodes have the liability of requiring a line of sight for their operation. The laptop has to be physically removed from the bag for it to be scanned. This is time-consuming. Alternatively, is the use of biometrics which is far more expensive to implement and it depends heavily on the physiological characteristics of the owner. 2.4 Case 4: Student Tracking Using Passive RFID Devices Ensuring the safety of each and every student in a university has been a challenging factor all throughout the world. This idea of Monitoring Systems by students of Satra University in India, was used to strengthen the safety aspects of students in a university. Students bypass university rules by finding loopholes in the system. The students were tracked using passive Radio Frequency Identification Devices(RFID) which were placed in the students’ ID card. A radio wave transceiver was used to emit and receive radio waves. A transceiver transmits a common
  • 13. 7 radio wave which is received by the RFID in the ID card. This radio wave is modified by the RFID’s coils and resent to the receiver. The transceiver can be placed along with the modems of internet [9]. Position of the student can be tracked: to know the movements of student throughout the day, to trace the students if he is missing in campus or to contact him easily, to reduce time spent on taking attendance, to know the number of seminars and workshops attended by students and to control the misbehavior of students while attendance. 2.5 Case 6: RFID and Libraries RFID has been used in library circulation operations and theft detection systems. RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling. This technology has helped librarians reduce valuable staff time spent scanning barcodes while charging and discharging items. RFID is a combination of radio -frequency-based technology and microchip technology. The information contained on microchips in the tags are fixed to library materials is read using radio frequency technology, regardless of item orientation or alignment. The RFID gates at the library exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit gate sensors [10]. 2.6 Case 7: GSM/GPRS Based Security System Zhao developed a low cost GSM/GPRS based wireless home security system which includes wireless security sensor nodes and a GSM/GPRS gateway. It has the following features compared to Wi-Fi ones; low cost, low power consumption, simple installation, fast response, simple user interface. GSM modem acts interface between user and sensor nodes. Sensor nodes supplied in the [11]system were three types; door security nodes, infrared sensor nodes and fire alarm nodes. Architecture included facilities e.g. filters, amplifiers, ADC and communication interfaces, The limitations this system is that it involved many sensors which increase its cost and the complexity of design and implementation.
  • 14. 8 Our system minimizes the complexity of hardware design by only having RFID tags, readers and antennas embedded in the system. Data obtained is analyzed using computer software and output automatically e.g. buzzer sound if the laptop serial number does not match the student registration details in the system.
  • 15. 9 CHAPTER 3: METHODOLOGY 3.1 Introduction of the Design The RFID-based Equipment Tracking System is an integrated system that offers an effective solution of managing items especially for large scale environment. It combines the RFID technology and security devices to ensure the items are always being monitored and secured. The system enables a university for instance to give admission/exit to selected individuals who satisfy exit/entry conditions that this system proposes to offer. The user also gets the chance through USSD to grant someone else access to pass through the checkpoints with his/her electronic equipment. Programmed RFIDs containing laptop serial number, and Student ID tags are scanned by RFID antennae reader at a point of exit, the data collected compared to a database of records and match or mismatch displayed at a web application manned by a security guard. The master server contains the database which is used to store all data collected from RFID reader where user can read or change information in the database. The RFID tags contain antennas to enable the receiving and transferring data. The passive RFID tag creates power from magnetic field and uses it to energize the circuits of the RFID chip and sends information back to the reader in the form of radio-frequency waves. Elsewhere USSD enables a user to remotely communicate with the main server using a series of authentications to grant access to a friend or report stolen devices. 3.2 Description of the Design Process The design process is composed of both hardware and software implementations. 3.2.1 Hardware Design This comprises of designing the sensor nodes(RFIDs) to carry information that is to be captured by an antennae reader. Arduino Microcontroller will be used to program the passive RFID tags with serial numbers as well as turning on the alarm system in case a mismatch arises from the software side - (that uses data from the hardware side. The hardware side is designed to be installed at the gate and it is to interface with software to complete the project objective.
  • 16. 10 Its proposed hardware implementation flowchart is as shown in figure 1 below. 3.2.2 Software Design The software implementation consists of the following:  Web Application that will be used to display the collected data: this will be accomplished using JavaScript, html and CSS.  Database: Which will be used to store user credentials as well as RFID tag information.  USSD: Which will act as a link between the remote user and the database/backend and Mobile subscriber. This will be achieved using Africa’s-talking API. The proposed software implementation flowchart is shown in figure 2 below. 3.3 Equipment and Tools 3.3.1 Hardware 3.3.1.1 Microcontroller A microcontroller is a single on chip computer which includes number of peripherals like RAM, EEPROM, Timers etc., required to perform some predefined task. There are different microcontroller families including: 8051, PIC (Programmable Interface Controller) and AVR. Microcontrollers are used in digital applications as control units. Some microcontrollers come with them in-build circuits like Analog to digital convertors or digital to analog convertors. Microcontrollers are mostly programmed using assembly language but in recent years high level languages like C, C++ PASCAL and java have been used. High level programming of microcontrollers brings the advantage of not having a different program for each microcontroller manufacturer. High level programming is also neat, easy to document and maintain and user friendly. In this project, Arduino Uno microcontroller board is used which belongs to Atmega328P. The choice of the microcontroller is mainly because of the following reasons:
  • 17. 11  Availability and there being a wide open source community in case of troubleshooting needs.  Convenient power management and built in voltage regulation: It can be plugged into the USB port of a computer without any external power. This is essentially important because our application hardware programming doesn’t necessarily require a lot of power.  32 KB of flash memory which is just enough to program a code to identify electronics. Other technical specifications include:  Operating voltage of 5V  Recommended input voltage 7-12V  14 Digital I/0 pins – 6 which provide PWM output  6 Analog input pins  32KB flash memory  2KB ATmega328P 16RAM  1KB ATmega328P EEPROM  16MHz Clock Speed FIGURE 1 ARDUINO UNO MICROCONTROLLER
  • 18. 12 3.3.1.2 RFID Reader/ Antenna The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the conduits between the tag and the transceiver, which controls the system's data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built into a door frame to receive tag data from persons or things passing through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. If constant interrogation is not required, a sensor device can activate the field. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. FIGURE 2: RFID READER AND ANTENNA
  • 19. 13 3.3.1.3 RFID Tags/Chips The tags contain transponders that emit messages readable by specialized RFID readers. Most RFID tags store some sort of identification number. A reader retrieves information about the ID number from a database, and acts upon it accordingly. RFID tags can also contain writable memory, which can store information for transfer to various RFID readers in different locations. This information can track the movement of the tagged item, making that information available to each reader. This tags can be read only or read and write. Types of Tags: RFID tags can be classified as, active and passive, depending on their source of electrical power. Active RFID tags contain their own power source, usually an on-board battery. Passive tags obtain power from the signal of an external reader. RFID readers also come in active and passive varieties, depending on the type of tag they read. For our project we settled on passive tags because of the following ADVANTAGES over active:  The tag functions without a battery; these tags have a useful life of twenty years or more.  The tag is typically much less expensive to manufacture  The tag is much smaller (some tags are the size of a grain of rice). These tags have almost unlimited applications in consumer goods and other areas. However passive tags have the disadvantage of having a short read distance as compared to active, but for our project we need approximately 3-7 Meters of read distance, which conforms to the structure of the gate terminal and also within the range of passive tags.
  • 20. 14 FIGURE 3: RFID - TAG READER SYSTEM 3.3.2 Software 3.3.2.1 USSD This is a menu driven interactive services such as mobile account balance checking, account top up etc. Also called Quick codes, this is a protocol used by GSM cellular telephones to communicate with the service provider’s computers. Our choice for USSD is based on its availability and its real time/instantaneous application as compared to perhaps the internet which is a limitation that in its own way as earlier explained in the problem statement. The USSD connection also remains open during the USSD session allowing a two-way exchange of a sequence of data. This makes it more responsive than SMS. Ruby on rails will be used to program the USSD backend platform while the USSD API will be obtained from Africa’s talking. The API will be used to interlink between the backend platform and a Telecom company service provider, Safaricom in our case. The USSD flowchart is shown In figure 2 below:
  • 21. 15 3.3.2.2 Database This is a data storage platform that will be used to store information on:  Student details i.e. Admission number/ID number, Student name and picture.  Electronic equipment details; which is the serial number of the equipment. This will be also developed using Ruby on Rails. FIGURE 4: REPRESENTATION OF THE USSD AND DATABASE PLATFORM 3.3.2.3 Web Application/ GUI This is a visual platform that will be used to display the results of data comparison between the received data from the RFIDs and the data in databases and also act as an alert platform in case of any reports, e.g. stolen laptop complaint, and mismatch results and any other relevant information as pertains to identification. This will be developed using JavaScript, HTML and CSS. 3.4 Flowcharts of the two terminals
  • 22. 16 GATE TERMINAL FLOWCHART NO NO YES YES NO YES NO YES NO NO YES YES START RFID STANDBY MODE USER DATA ONLY? COMPARE USER AND EQUIPMENT DATA WAIT FOR USER DATA DISPLAY EQUIPMENT DETAILS GET DATA WAIT FOR EQUIPMENT DATA RFID SIGNAL ? MATCH? END NO EQUIPMENT DATA ONLY? USER AND EQUIPMENT DATA DISPLAY USER DETAILS EQUIP DATA? ? USER DATA? ? USE ALTERNATIVE IDENTIFICATION RAISE ALARM ALLOW PASSAGE YES
  • 23. 17 2 1 USSD PLATFORM FLOWCHART BEGIN ENTER USSD ENTER PIN PRESS 1 OR 2 ENTER SERIAL NUMBER ENTER ID NUMBER ENTER ID NUMBER ENTER SERIAL NUMBER ENTER FRIEND’S ID NUMBER REPORT LOST EQUIPMENT GRANT ACCESS END
  • 24. 18 . . . . . TAGGED USER FIGURE 5: GENERAL BLOCK DIAGRAM OF THE ENTIRE SYSTEM TAGGED USER TAGGED LAPTOP TAGGED USER TAGGED LAPTOP TAGGED USER TAGGED LAPTOP TAGGED USER TAGGED LAPTOP ELECTROMAGNETIC WAVES ELECTROMAGNETI C WAVES •DATABASE RFID ANTENNA READER . . . OBSERVATION POINT REMOTE USER
  • 25. 19 3.4 Expected Results Based on the flowcharts and simple modelling, we expect the following results. a) That the RFID tags will be read with no tag collision at the gate terminal and that this information will be sent successfully to the database for comparison purposes. b) The USSD platform will send the required information, for instance report a stolen laptop with no time delay to the main database for comparison purposes. c) Comparison will be done by the database and displayed with little time delay and results displayed/or sent back to user to ensure real time equipment management.
  • 26. 20 TIMELINE ACTIVITY FIFTH YEAR SEMESTER 1, 2016 SEMESTER 2, 2017 MONTH Sept Oct Nov Dec Jan Feb Mar April Research and Proposal Writing Project Design System Development and Integration Testing and Implementation Project Presentation Final Report Writing Documentation TABLE 1: WORK PLAN BUDGET COMPONENT QUANTITY EACH COST(Ksh) RFID Tags 6 100 600 Arduino kit 1 4000 4000 USSD Shared Testbed (1 1 34,000 34000 RFID reader 1 500 500 Miscellaneous 900 TOTAL 40,100 TABLE 2: BUDGET
  • 27. 21 REFERENCES [1] "The Statistics - DataLocker.com," DataLocker, 2016. [Online]. Available: https/datalocker.com. [Accessed Wednesday November 2016]. [2] H. E, "Mobile Device Security: Startling Statistics," Kensington Infograhic, 2006. [Online]. Available: http://www.chanelpronetwork.com. [Accessed 3 November 2016]. [3] "Welcome to Electraka," ELECTRAKA SYSTEMS, 2016. [Online]. Available: http://www.electraka.com. [Accessed 3 November 2016]. [4] "Statista," STATISTA, 2016. [Online]. Available: https://www.statista.com/statistics/272595/global- shipments-forecast-for-tablets. [Accessed 3 November 2016]. [5] V. K. Garg, Wireless Communication and Networking, Morgan Kaufmann Publishers, 2007, p. 707. [6] M. M. N. M. G. P. &. N. D. M. Abdalla M. M., Information and Communication Technologies Engineering: Smart Road System, Universita Telematica Internazonale Unnettuno, UTIU, 2011. [7] A. S., D. S. and &. Sudeepkumar, "Automatic Identification and Access Control System," International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), vol. 5, no. 10, 10 May 2016. [8] MMU, "Student develops electronic tracking system," Multimedia University of Kenya, [Online]. Available: www.mmu.ac.ke/index.php/more-links/item/235-student-develops-electronic-tracking- system. [Accessed 2 December 2016]. [9] N. Gudla and S. K. P. &. R. V. Satya, "Tracking Students using passive RFID devices," Tamilnadu- 613401, India. [10] Ayre and L. Bowen, "RFID and Libraries," The Galecia Group (August 2004) Position paper, August 2004. [11] Zhao and &. Z. Ye, "A low cost GSM/GPRS Based Wireless Home Security System," International Journal of Smart Home, vol. 54, no. 2, 2008. [12] AMRITA VISHWA VIDYAPEETHAM UNIVERSITY, "Gate Pass Management System at Coimbatore Campus," AMRITA VISHWA VIDYAPEETHAM UNIVERSITY, [Online]. Available: https://www.amrita.edu/campus/coimbatore/gate-pass-management-system. [Accessed 2 December 2016]. [13] R. Kilel, "Crime in Campus," Standard Media Group, 28 April 2015. [Online]. Available: http://www.standardmedia.co.ke/ureport/story/2000160166/crime-in-campus. [Accessed 3 December 2016].
  • 28. 22 [14] N. T, "11 suspects arrested over theft of laptops in Juja," The Star, 19 October 2016. [Online]. Available: https://www.the-star.co.ke/news/2016/10/19/11-suspects-arrested-over-theft-of- laptops-in-Juja_c1440129. [Accessed 3 December 2016]. [15] Nevon Projects, "Projects," Nevon Projects, [Online]. Available: http://nevonprojects.com/security-access-control-using-rfid-project/y. [Accessed December 2016]. [16] F. Umar, H. Mahmood, A. Muhammad, H. Athar and A. Usman, "RFID Based Security and Access Control System," LACSIT International Journal of Engineering and Technology , vol. 6, no. 4, 2014.