0% found this document useful (0 votes)
75 views

Rfid Authentication System For Smart Campus: Master of Computer Applications

This document is a project report for an RFID Authentication System for a smart campus. It describes developing an RFID-based system to authenticate students and track their locations on campus, such as which classrooms they enter. The system will replace barcodes with RFID to allow more efficient checkout of library materials. It provides an introduction, background on tools like Java and MySQL, system analysis, design, testing, implementation, and conclusions sections.

Uploaded by

Anoop Nc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

Rfid Authentication System For Smart Campus: Master of Computer Applications

This document is a project report for an RFID Authentication System for a smart campus. It describes developing an RFID-based system to authenticate students and track their locations on campus, such as which classrooms they enter. The system will replace barcodes with RFID to allow more efficient checkout of library materials. It provides an introduction, background on tools like Java and MySQL, system analysis, design, testing, implementation, and conclusions sections.

Uploaded by

Anoop Nc
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

A Project Report on

RFID AUTHENTICATION SYSTEM


FOR SMART CAMPUS

Submitted by

Lakshmi K
Register No: 95580219

In partial fulfillment for the award of the degree of

MASTER OF COMPUTER APPLICATIONS


from
Cochin University of Science and Technology

Under the Esteemed Guidance of

Mr.Anish Ms.Sunitha Cheriyan


Project Guide Lecturer

KOKOTHAMANGALAM P.O, CHERTHALA

DEPARTMENT OF COMPUTER APPLICATION


CHERTHALA
MARCH 2011
BONAFIDE CERTIFICATE

Certified that this project report RFID AUTHENTICATION SYSTEM FOR SMART
CAMPUS & ARTIFICIAL INTELLIGENCE GAMING is the bonafide work of
LAKSHMI K (Register No: 95580219) who carried out the project work under my guidance

……………………………… ……………………………..

Pro.SAJEEV B.U Ms.SUNITHA CHERIYAN

Director of MCA Lecturer


MSc,MCA,MTech(Phd) MCA
Dept.Computer Application Dept. Computer Application
KVM CE& IT,Cherthala KVM CE&IT,Cherthala

………………………………… ……………………………

INTERNAL EXAMINER EXTERNAL EXAMINER


DECLARATION

I hereby declare that this project work entitled “ RFID AUTHENTICATION SYSTEM FOR
SMART CAMPUS & ARTIFICIAL INTELLIGENCE GAMING ” is a record of original
work done by me under the guidance of Ms. Sunitha Cheriyan, Lecturer, Department of
Computer Applications, KVM College of Engineering & IT, Cherthala.

Place : Cherthala LAKSHMI K

Date :
ACKNOWLEDGEMENT

At the very outset,I would like to give the first honors to God who gave the wisdom and
knowledge to complete this project.

I express my heart-felt gratitude to Prof. K.N James, our Principal KVM College of
Engineering &IT, Cherthala for having given me the opportunity to complete this project
successfully.

I take this opportunity to express my sincere gratitude and thanks to Mr.Sajeev B.U , the
Director of Dept. of Computer Application, KVM College of Engineering & IT, Cherthala, for
his able leadership and guidance in all the official matter regarding the project.

I wish to extend my sincere thanks to my Guide Ms.Sunitha Cheriyan, Lecturer, Dept. of


Computer Application, KVM College of Engineering & IT, Cherthala, for her valuable guidance
and support. I thank her for timely suggestions and constant encouragement that led to the
accomplishment of this project.

Last but not least I thank my parents, friends and all my well wishers who had supported me
directly or indirectly during the project.
ABSTRACT

RFID Authentication system is specialized in specific automation


requirements of an institution and in the application of automation techniques for the
comfort and security of the students . Each student is identified and authorized using their
RFID identification. There will be RFID Authentication Module at the entrance and exit
of each and every room of the institution. If student has to enter a room, it is necessary
that they should be authenticated using the RFID Authentication system.. The access to
the class room and lab will be given only if student has the permissions provided by the
Administrator. If correct access occurs, the code of the student entering the room will be
stored into the database of the main server. When a student enters a room the RFID
code of the student will be stored to a server machine which accesses this data and stores
the student code in a corresponding table for that particular room. If any student is to be
located ,then by giving the student code , the room in which the student is ,can be known.
It also helps in virtual class room environment too, where there is no need of a particular
staff to monitor the students in and out. With this project we can keep track of the student
attended the class without any manual help, ie each student get in time and out time from
a class or from any section.

Bar codes on membership cards in library could be replaced with RFID


Authentication system. The RFID Authentication system holds the promise of allowing
patrons to check out all their materials at once by swiping the pile of books over an
electronic reader. By increasing self check-out, library management believes it can boost
staff efficiency and dedicate more time to serving patrons away from checkout lines.
RFID system emits a low-range radio frequency that can be picked up by a specially
designed scanner. The scanner can only read the code for the library material. To connect
the code to the actual book title, the code would have to be cross-referenced with the
library’s catalog.
TABLE OF CONTENTS

Chapter No. Title Page No.

1. INTRODUCTION 1
1.1 Project Profile 1
2. ABOUT THE DEVELOPING TOOLS 4
2.1 Introduction to JAVA 4
2.2 Features of Language 5
2.3 Java Swing 8
2.4 My SQL 12
2.5 Operating System 14
3. SYSTEM ANALYSIS 16
3.1 Introduction 16
3.2 Existing system 17
3.2.1 Limitation of Existing System 17
3.3 Feasibility Study 17
3.4 Fact Find Techniques 19
3.5 Proposed System 19
3.5.1 Advantages of Proposed System 20
4. SYSTEM SPECIFICATION 21
4.1 Software Specification 21
4.2 Hardware Specification 21
5. SYSTEM DESIGN 22
5.1 Introduction to System Design 22
5.2 Input Design 23
5.3 Output Design 26
5.4 Database Design 27
5.5 Hierarchical Chart 37
5.6 Data Flow Diagram 38
5.6.1 Introduction to DFD 38
5.6.2 Data Flow Diagrams 40
6. SYSTEM TESTING 48
6.1 Introduction to System Testing 48
6.2 Unit Testing 49
6.3 Integration Testing 50
6.4 Validation Testing 50
6.5 Alpha Testing 51
6.6 Beta Testing 51
6.7 Test Cases 51
7. SYSTEM IMPLEMENTATION 52
7.1 Introduction to System Implementation 52
7.2 Training 53
7.3 Post Implementation Review 53
7.4 System Maintenance 53
8. SYSTEM EVALUATION 54
9. CONCLUSION 55
10. APPENDIX 56
10.1 APPENDIX A 56

10.1.1 Screen Shots 56

10.2 APPENDIX B 73

10.2.1 Bibliography 73

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy