Sie sind auf Seite 1von 29

CHAPTER 2

2.1 Related Literature


2.1.1 Student Faculty Literature
2.1.1.1 Student - Faculty Conversation
Good faculty-student relationships begin with conversations. There are several conversation
starters that advisors can use in order to ease the student into making a connection with faculty members.
However, students tell their advisors that they have not engaged their teachers in meaningful
conversations outside the classroom. When advisors help facilitate conversations between students and
faculty members, they help the institution as a whole. When students feel connected to the campus
community, they are more often retained and excel academically, creating a winning situation for
everyone. A sense of connection with teachers helps students feel like they belong at the institution.
Advisors can aid in building this connection by helping students understand that they should get to know
their professors, if only so that faculty can teach them better. Faculty members who understand the
learning needs and interests of their students can appropriately tailor assignments, expectations, and
conversations. Advisors can facilitate conversations between students and faculty members by reminding
students that their teachers were once students themselves. Encouraging students to share their concerns
with faculty members can give students a different 'take' on a problem. For example, because faculty must
balance teaching, research, service, and busy personal lives, they are well-equipped to work with students
on time management issues. Advisors can help these conversations occur not only by pointing out their
tangible benefits, but also by explaining that most faculty members enjoy working one-on-one with
students. [1]

2.1.1.2 Building Student - Faculty Relationships


The relationships that teachers develop with their students have an important role in a students
academic growth. Improving students' relationships with teachers has important, positive and long-lasting
implications for both students' academic and social development. Solely improving students' relationships
with their teachers will not produce gains in achievement. However, those students who have close,
positive and supportive relationships with their teachers will attain higher levels of achievement than
those students with more conflict in their relationships. Teachers who experience close relationships with
students reported that their students were less likely to avoid school, appeared more self-directed, more
cooperative and more engaged in learning. The quality of early teacher-student relationships has a longlasting impact. [2]
Even when college students aren't inventing deceased relatives to save their grade point averages,
interactions with professors can be more complicated than the age-old strategy of leaving an apple on a
teacher's desk in elementary or high school. Students who need to address academic issues with their
professors must navigate generational gaps and power discrepancieseach of which could be
intimidating. Keeping these five guidelines in mind can help students maximize their chances of resolving
challenges that arise. [3]

2.1.1.3 The Faculty Room


The teachers lounge or faculty room is one of the most important rooms in a school building for
some teachers. It is an oasis from the stress, a place to blow off steam. It is a social room for faculty. It is
the virtual water cooler where those types of conversations take place. It is a place where teachers can
voice opinions about education with colleagues. A place where students can communicate with their
teachers outside classroom. [4]

2.1.2 Technical Literature


2.1.2.1 RFID
Radio Frequency Identification (RFID) uses electromagnetic fields to automatically identify and
track tags attached to objects. The tags contain electronically stored information. Passive tags collect
energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source
such as a battery and may operate at hundreds of meters from the RFID reader. Unlike a barcode, the tag
need not be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is
one method for Automatic Identification and Data Capture (AIDC). [5]
It is a technology that incorporates the use of electromagnetic or electrostatic coupling in the
radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or
person. [2] In a basic RFID system, tags are attached to all items that are to be tracked. These tags are
made from a tiny tag-chip, sometimes called an integrated circuit (IC) that is connected to an antenna that
can be built into many different kinds of tags including apparel hang tags, labels, and security tags, as
well as a wide variety of industrial asset tags. The tag chip contains memory which stores the product's
electronic product code (EPC) and other variable information so that it can be read and tracked by RFID
readers anywhere. [5]

2.1.2.2 RFID Tags


An RFID tag is comprised of an integrated circuit (called an IC or chip) attached to an antenna
that has been printed, etched, stamped or vapor-deposited onto a mount which is often a paper substrate or

Polyethylene Terephthalate (PET). The chip and antenna combo, called an inlay, is then converted or
sandwiched between a printed label and its adhesive backing or inserted into a more durable structure.
The tag's chip or integrated circuit (IC) delivers performance, memory and extended features to
the tag. The chip is pre-programmed with a tag identifier (TID), a unique serial number assigned by the
chip manufacturer, and includes a memory bank to store the items' unique tracking identifier (called an
electronic product code or EPC). Tag antennas collect energy and channel it to the chip to turn it on.
Generally, the larger the tag antenna's area, the more energy it will be able to collect and channel toward
the tag chip, and the further read range the tag will have. [6]

2.1.2.3 RFID Reader


An RFID reader, also known as an interrogator, is a device that provides the connection between
the tag data and the enterprise system software that needs the information. The reader communicates with
tags that are within its field of operation, performing any number of tasks including simple continuous
inventorying, filtering (searching for tags that meet certain criteria), writing to selected tags, etc.
The reader uses an attached antenna to capture data from tags. It then passes the data to a
computer for processing. Just like RFID tags, there are many different sizes and types of RFID readers. It
can be affixed in a stationary position in a store or factory, or integrated into a mobile device such as a
portable, handheld scanner. Readers can also be embedded in electronic equipment or devices, and in
vehicles. RFID readers and reader antennas work together to read tags. Reader antennas convert electrical
current into electromagnetic waves that are then radiated into space where they can be received by a tag
antenna and converted back to electrical current. Just like tag antennas, there is a large variety of reader
antennas and optimal antenna selection varies according to the solution's specific application and
environment.

RFID technology has the capability to both greatly enhance and protect the lives of consumers,
and also revolutionize the way companies do business. As the most flexible auto-identification
technology, RFID can be used to track and monitor the physical world automatically and with accuracy.
RFID use is increasing rapidly with the capability to tag any item with an inexpensive communications
chip and then read that tag with a reader. Endless applications range from supply chain management to
asset tracking to authentication of frequently counterfeited pharmaceuticals. Applications are limited, in
fact, only by the imagination of the user. [7]

2.1.2.4 Operating Frequency


Operating frequency is also important in determining the physical dimension of an RFID tag.
Different sizes and shapes of antenna will operate at different frequencies.
Table 2.1 List of standard frequencies and their respective passive read distances.

Table 2.1 Common RFID Operating Frequency


Frequency Range
Low Frequency (LF)
High Frequency (HF)
Ultra-High Frequency (UHF)
Microwave
Ultra-Wide Band (UWB)

Frequency
120 - 140 KHz
13.56 MHz
868 - 928 MHz
2.45 & 5.8 GHz
3.1 10.6 GHz

Passive Read Distance


10 20 cm
10 20 cm
3 meters
3 meters
10 meters

2.1.2.5 MCU (Microcontroller)


Microcontroller is a small computer on a single integrated circuit containing a processor core,
memory, and programmable input/output peripherals. Microcontrollers are designed for embedded

applications, in contrast to the microprocessors used in personal computers or other general purpose
applications consisting of various discrete chips. A microcontroller is usually used for sensing input from
the real world and controlling devices based on that input. Most electronic devices you use today have a
microcontroller in them of some form or another. Microcontrollers are easy to use with simple sensors
and output devices, and they can communicate with desktop computers fairly simply as well. Theyre also
very useful for when youre designing a simple interactive device that doesnt need the full power of a
desktop computer, but does need to be smaller or cheaper.
There are several different levels of microcontrollers and microcontroller systems. Some are very
small, chip-size devices to which you have to connect your own electronics. Others are larger, composed
of several components and ports for input output, ready to plug right into other devices. Higher level
microcontrollers will have a simple hardware interface to other devices, usually a plug or a couple of
wires, and a simpler programming language, if at all. A lower level microcontrollers will require more
work, both in terms of hardware connections and in terms of programming. However, lower level
processors are generally cheapest and most flexible in terms of what you can make them do. [8]
The first microprocessor was the 4-bit Intel 4004 released in 1971, with the Intel 8008 and other
more capable microprocessors becoming available over the next several years. However, both processors
required external chips to implement a working system, raising total system cost, and making it
impossible to economically computerize appliances. The Smithsonian Institution credits TI engineers
Gary Boone and Michael Cochran with the successful creation of the first microcontroller in 1971.It
combined read-only memory, read/write memory, processor and clock on one chip and was targeted at
embedded systems. [9] In 1993, the introduction of EEPROM memory allowed microcontrollers to be
electrically erased quickly without an expensive package as required for EPROM, allowing both rapid
prototyping. The same year, Atmel introduced the first microcontroller using Flash memory, a special type
of EEPROM. Nowadays microcontrollers are cheap and readily available for hobbyists, with large online
communities around certain processors. [10]

2.1.2.6 Arduino
Arduino is an open-source electronics platform based on easy-to-use hardware and
software. Arduino boards are able to read inputs - light on a sensor or a finger on a button - and turn it
into an output - activating a motor, turning on an LED, publishing something online. It can tell your board
what to do by sending a set of instructions to the microcontroller on the board. To do so it uses
the Arduino programming language, and the Arduino Software (IDE), based on Processing.
Over the years, Arduino has been the brain of thousands of projects, from everyday objects to
complex scientific instruments. A worldwide community of makers - students, hobbyists, artists,
programmers, and professionals - has gathered around this open-source platform, their contributions have
added up to an incredible amount of accessible knowledge that can be of great help to novices and experts
alike.
Arduino was born at the Ivrea Interaction Design Institute as an easy tool for fast prototyping,
aimed at students without a background in electronics and programming. As soon as it reached a wider
community, the Arduino board started changing to adapt to new needs and challenges, differentiating its
offer from simple 8-bit boards to products for IoT applications, wearable, 3D printing, and embedded
environments. All Arduino boards are completely open-source, empowering users to build them
independently and eventually adapt them to their particular needs. The software, too, is open-source, and
it is growing through the contributions of users worldwide. [11]

2.1.2.7 RFID with Wireless Sensing Network

The basic idea of integration of RFID with wireless sensing network is to connect the RFID
reader to an RF transceiver, which has routing function and can forward information to and from other
readers. Users are able to read tags from distance 100-200m that is well beyond normal range of readers.
Integration of RFID and wireless sensing network can provide RFID to work in multi-hop to extend
application of RFID to operate in a wider area. The integrated wireless sensing network node consists of
an RFID reader, an RF transceiver, and micro-controller that coordinate different components in the node.
The micro-controller is also used to control the RFID reader and other components which go to sleep
mode when they are idle. Integrated tags with wireless sensing network can communicate with other tags
and form a multiple loop network. Each integrated node transmits not only its unique ID number but also
details of its sensed data to all other nodes. The integrated tag listens to the RFID reader radio of
neighboring nodes. If some channel activity is detected, the tag awakes the sensor to listen to the channel
and then receive data through the RF sensor radio, otherwise nodes can stay in sleeping status. To wake
up the node, a wakeup signal is sent. RFID radio uses much less energy than the RF sensor radio. RFID
tags features can be added or integrated with sensor nodes.
Combining RFID reader enabled cell phones and RFID sensor tags in a cellular network or the
Internet, the consumers will be able to read any RFID sensor tag in almost any application. Information of
RFID tag can be downloaded to cell phone from a remote database for some applications. When you stroll
around a super market with RFID reader enabled mobile phone, you can receive information about any
product and buy only what you need. RFID Technology enables mobile phone handsets to make payment
once credit card information is embedded into cell phone. [12]

2.1.2.8 Wi-Fi
Wi-Fi is a low power wireless communication that is used by various electronic devices like
smart phones, laptops, etc. In this setup, a router works as a communication hub wirelessly. These

networks allow users to connect only within close proximity to a router. Wi-Fi is a technology that allows
electronic devices to connect to a wireless land area network (WLAN), mainly using the 2.4 gigahertz
(12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Wi-Fi works with no physical wired
connection between sender and receiver by using radio frequency (RF) technology -- a frequency within
the electromagnetic spectrum associated with radio wave propagation. When an RF current is supplied to
an antenna, an electromagnetic field is created that then is able to propagate through space.
Wi-Fi is a trademark of the Wi-Fi Alliance. The "Wi-Fi Certified" trademark can only be used by
Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing. Devices
which can use Wi-Fi technology include personal computers, video-game consoles, smart phones, digital
cameras, tablet computers, digital audio players and modern printers. Wi-Fi compatible devices can
connect to the Internet via a WLAN network and a wireless access point. Such an access point
(or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Wi-Fi is less
secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical
connection. Web pages that use TLS are secure, but unencrypted Internet access can easily be detected by
intruders. Because of this, Wi-Fi has adopted various encryption technologies. [13]

2.1.2.9 Wi-Fi Router


A wireless router is a device in a wireless local area network (WLAN) that determines the next
network point to which a packet should be forwarded toward its destination. A wireless router works in
the same way as the router in a hard-wired home or business local area network (LAN), but allows greater
mobility for notebook or portable computers. The individual computers are equipped with small
wireless transceivers that can be plugged into either a Universal Serial Bus (USB) port or a PC card slot.

For home and business computer users who have high-speed Internet connections, a wireless
router can also act as a hardware firewall. This is true even if the home or business has only one
computer. Many engineers believe that the use of a router provides superior protection against hacking
because individual computer IP addresses are not directly exposed to the Internet. A wireless router also
does not consume computer resources as a firewall program does.
Wireless router technology has improved in recent years, providing more bandwidth and allowing
for the connection of more computers to a WLAN. The newer wireless routers use the 802.11g
specification, a standard that offers transmission over short distances at up to 54 megabits per seconds
(Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard. [14]

2.3.2.10 LCD
LCD (liquid crystal display) is the technology used for displays in notebook and other smaller
computers. Like light-emitting diode (LED) and gas-plasma technologies, LCDs allow displays to be
much thinner than cathode ray tube (CRT) technology. LCDs consume much less power than LED and
gas-display displays because they work on the principle of blocking light rather than emitting it. A liquidcrystal display is a flat-panel display or other electronic visual display that uses the light-modulating
properties of liquid crystals. Liquid crystals do not emit light directly. LCDs are available to display
arbitrary image or fixed images with low information content, which can be displayed or hidden, such as
preset words, digits, and 7-segmentdisplays, as in a digital clock.
LCDs are used in a wide range of applications including computer monitors, televisions,
instrument, panels, aircraft cockpit displays, and indoor and outdoor signage. Small LCD screens are
common in portable consumer devices such as digital cameras, watches, calculators, and mobile
telephones, including smart phones. [15] An LCD is made with either a passive matrix or an active matrix

display grid. The active matrix LCD is also known as a thin film transistor (TFT) display. The passive
matrix LCD has a grid of conductors with pixels located at each intersection in the grid. A current is sent
across two conductors on the grid to control the light for any pixel. An active matrix has
a transistor located at each pixel intersection, requiring less current to control the luminance of a pixel.
[16]

2.3.2.11 RFID Sensor


The current RFID technology status and the growth it is experiencing have revived interest in
long-range passive sensors. While temperature-monitoring sensors have always been the typical models
introducedprimarily due to the RF IC and the temperature sensor sharing the same complementary
metal-oxide semiconductor (CMOS) manufacturing technologythere are new battery-free sensors
available, such as pressure sensors, orientation sensors (using a three-axis accelerometer) or switches.
One company focused on battery-free sensor tag solutions is Farsens, where I work. Farsens has
developed

battery-free UHF RFID sensor tags

that

are

compatible

with

commercial EPC Gen

2 RFID readers and can provide read ranges in excess of 1.5 meters (5 feet). Currently, my firm offers
four

types

of sensor tagstemperature,

pressure,

orientation and

switchesin

variety

of antenna designs and sizes, to adapt performance to a particular application. They can also be
encapsulated in an IP67 or IP68 casing for usage within harsh environments.
The main advantage of such sensors is that they operate without batteries, thereby allowing for a wide
range of opportunities using different sensor types in applications for which accessibility is restricted, or
in which the use of batteries is not recommended. Typical examples of applications per sensor type
include:

Temperature sensor: switchgears and cold chain monitoring.


Pressure sensor: gas piping systems and container liquid level.
Three-axis accelerometer: "this way up" applications and movement detection. [17]

2.1.2.12 Pyroelectric Infrared


With the advancement of sensor and actuator technologies, our indoor environment, such as
buildings, has been instrumented with various sensors, including temperature, humidity, illumination,
CO2 and occupancy sensor, and, thus, can be aware of changes in the user's state and surrounding, finally
controlling building utilities to adapt their services and resources to the user's context, e.g., automatic
lighting control, heating, ventilation and air-conditioning (HVAC) system adjustment, electrical outlet
turn-off, unusual behavior detection and home invasion prevention. Such context-aware systems have
deployed occupant location as the principal form of the user's context. Accordingly, indoor tracking and
localization is one of the key technologies for providing activity-aware services in a smart environment.
Pyroelectric infrared (PIR) sensors are well-known occupancy detectors. They have been widely
employed for human tracking systems, due to their low cost and power consumption, small form factor
and unobtrusive and privacy-preserving interaction. In particular, a dense array of PIR sensors having
digital output and the modulated visibility of Fresnel lenses can provide capabilities for tracking human
motion, idengifying walking subject and counting people entering or leaving the entrance of a room or
building. However, the analog output signal of PIR sensors involves more aspects beyond simple people
presence, including the distance of the body from the PIR sensor, the velocity of the movement (i.e.,
direction and speed), body shape and gait (i.e., a particular way or manner of walking). Thus, we can
leverage discriminative features of the analog output signal of PIR sensors in order to develop various
applications for indoor human tracking and localization. [19]

2.1.2.13 Human Gait Characterization


The system detected humans in walking by extracting double helical signatures (DHS) from
surveillance video sequences. They found that DHS is robust to size, viewing angles, camera motion and
severe occlusion for simultaneous segmentation of humans in periodic motion and labeling of body parts
in cluttered scenes. They used the change in DHS symmetry for detecting humans in normal walking,
carrying an object with one hand, holding an object in both hands, attaching an object to the upper body
and attaching an object to the legs. Although DHS is independent of silhouettes or landmark tracking, it is
ineffective when the target walks toward the camera as the DHS degenerates into ribbon and no strong
symmetry can be observed. They used the area-based image similarity technique to address this issue and
detected the motion of a person who was walking at approximately 25 offset the camera's image plane
from a static camera. They segmented the motion and track objects in the foreground. Each object was
then aligned along the temporal axis (using the object's tracking results), and the object's self-similarity
was computed as it evolves in time. For periodic motions, the self-similarity metric is periodic, and they
apply time-frequency analysis to detect and characterize the periodicity. [20]

2.1.2.14 Pedestrian Detection


Pedestrian detection is another important application of human detection. It describes a pedestrian
detection system that integrates image intensity information with motion information. Their detector was
built over two consecutive frames of a video sequence and was based on motion direction filters, motion
shear filters, motion magnitude filters and appearance filters. Their system detected pedestrians from a
variety of viewpoints with a low false positive rate using multiple classifiers with cascade architecture. A
pedestrian could also be detected by extracting regions of interest (ROI) from an image and then sending
it to a classification module for detection. However, ROIs must fulfill the pedestrian size constraints, i.e.
the aspect ratio, size and position, to be considered to contain a pedestrian. [20]

2.1.2.15 Omron Sensor


In recent years the demand for human presence sensors has been growing in tandem with the
demand for energy-efficient "smart home" and "smart office" environments in which lighting, heating,
etc. is automatically controlled according to where people are.
Since conventional pyroelectric human presence sensors (motion sensors) are only able to detect
people when they are in motion, they are not as suitable for detecting the number of people in a certain
space or their relative positions as Omron's new thermal sensor.
MEMS non-contact thermal sensors measure temperature by converting infrared energy radiated
from target objects into heat with MEMS thermopiles and then measuring the thermo-electromotive force
resulting from temperature differences that occur across the contact points of two different types of metal.
However, up till now it has not been possible to create large temperature differences across the metal
contact points because much of the heat generated by the thermopiles dissipates into the surrounding air,
meaning that the resulting thermo-electromotive force is reduced thereby limiting sensitivity. Omron has
solved this heat dissipation problem by vacuum sealing the thermopiles inside the chip - the first time this
has been achieved. The reduction in heat dissipation leads to a greater temperature difference across the
metal contacts thereby increasing sensitivity. [21]

Figure 2.1 OMRON Sensor

2.1.2.16 iGlove
The researchers created the iGlove in 2003 as part of our first effort to track object use with
RFID. While the early prototype was too crude for true long-term deployment, it was usable and durable
enough that we were able to enlist 14 volunteers to wear it while conducting a range of daily household
tasks, averaging approximately 45 minutes per user. By tracking the objects they grasped, we were
generally able to figure out which activities they performed and when. For next test of the concept, they
set number of users to wear it while performing a true workplace task. Collaborating with the University
of Washington Medical School, they enlisted seven faculty volunteers to use their simulation lab to

perform test procedures while wearing iGloves. All reported the form factor to be acceptable, and they
were able to collect a good set of sensor data. [22]

Figure 2.2 Medical iGlove

2.1.2.17 iBracelet
iBracelet are aesthetically and ergonomically much preferred to gloves. They needed to extend
the read range from the 12 cm of a palm antenna to the 1015 cm of a bracelet while staying lightweight,
low power, and within regulatory limits on exposure to electromagnetic fields. We have been able to
achieve these goals by using a tuned circular loop antenna worn coaxially around the arm.. The iBracelet
is evolving into something truly wearable by a larger population. The iBracelet retains the desirable
features of the iGlove while moving to a less-obtrusive, more broadly acceptable form factor.[22]

Figure 2.3 iBracelet

2.1.2.18 Human-Implanted RFID Chips

On 31st of July 1997, the United States Patent and Trademark Office granted to a patent for
Personal tracking and recovery system. the apparatus was made for tracking and recovering humans
utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to
remain implanted and functional for years without maintenance. The patented device can be used as a
safeguard against kidnapping and to facilitate prompt medical dispatch in the event of heart attack or
similar medical emergency. The patent was an indicator for the approaching application of humanimplanted RFID chips.
The transponder implanted into the hands. For example, by using the transponder, it was able to
open doors that previously required smart card access. It was also able to turn on lights simply by entering
into the room. In the patent, it was stated that in future experiments, the implants needs to be placed
nearer to the brain into the spinal cord or onto the optic nerve, where there is a more powerful setup for
transmitting and receiving specific complex sensory signals. [23]

Figure 2.4 RFID Chip

Glove.
our
first
We
effort
created
to
track
the
object
iGlove
use
in
2003
as
RFID.
part
of
ue
early
prototype
was
too
crude
for
tr
deployment,
we
were
able
it
to
was
enlist
usable
14
volunteers
and
durable
to
wear
enough
it
while
that
conducting
ing
approximately
a
range
of
minutes
daily
household
per
user.
tasks,
By
tracking
averagthe
ure
objects
out
which
they
activities
grasped,
they
we
performed
were
generally
and
when
able
to
[7].
figusers
For
our
to
next
wear
test
it
while
of
the
performing
concept,
we
a
true
wanted
workplace
a
set
of
task.
ton
with
enlisted
the
University
seven
faculty
of
Washingvolunteers
procedures
wearing
simulation
iGloves
lab
to
(see
perform
Figure
test
1,
left).
All
epor
ted
be
acceptable,
and
wcrude
RFID.
usable
While
and
durable
the
early
enough
prototype
that
was
we
were
too
able
to
for
enlist
true
long-term
14
volunteers
deployment,
to
wear
itit task.
was
while
minutes
conducting
per
user.
a45
By
range
tracking
of
daily
the
household
objects
they
tasks,
grasped,
averaging
we
were
approximately
generally
able
45
to
figure
concept,
out
we
which
wanted
activities
a
set
of
they
users
performed
and
it
while
when
performing
[7].
For
our
a to
true
next
workplace
test
of
the
Collaborating
faculty
volunteers
with
to
use
University
their
simulation
of
Washington
lab
to
perform
Medical
School,
test
procedures
we
enlisted
while
seven
wearing
and
we
iGloves
(see
Figure
1,
left).
All
reported
the
form
factor
be
acceptable,
track
object
iGlove
use
in
2003
with
as
RFID.
part
While
of
too
crude
for
tr
enlist
usable
14
volunteers
and
durable
to
wear
enough
it
while
that
minutes
daily
household
per
user.
tasks,
By
tracking
averagactivities
grasped,
they
we
performed
were
generally
and
when
able
to
[7].
figperforming
concept,
we
awith
true
wanted
workplace
aWhile
set
of
Medical
Collaborating
with
we
enlisted
the
University
seven
faculty
of
Washingvolunto
use
while
their
wearing
simulation
iGloves
lab
to
(see
perform
Figure
test
1,
left).
rlong-term
the
form
factor
to
be
acceptable,
and
w
G
our
love.
first
We
effort
created
to
track
the
object
iGlove
use
in
2003
with
as
RFID.
part
While
of
ue
long-term
early
prototype
was
too
crude
for
tr
deployment,
we
were
able
it
to
was
enlist
usable
14
volunteers
and
durable
to
wear
enough
it
while
that
conducting
ing
approximately
aSchool,
range
45
of
minutes
daily
household
per
user.
tasks,
By
tracking
averagthe
ure
objects
out
which
they
activities
grasped,
they
we
performed
were
generally
and
when
able
to
[7].
figFor
users
our
to
next
wear
test
it
while
of
the
performing
concept,
we
a
true
wanted
workplace
a
set
of
task.
ton
with
enlisted
the
University
seven
faculty
of
Washingvolunteers
procedures
wearing
simulation
iGloves
lab
to
(see
perform
Figure
test
1,
left).
All
epor
ted
e
be
acceptable,
and
w
2.2 Related Studies
2.2.1 Foreign Studies
2.2.1.1 A Human Object Interaction Detection System Based on Passive UHF RFID
In order to enable unobtrusive human object interaction detection, we propose a minimalistic
approach to instrumenting everyday objects with passive (i.e. battery-free) UHF RFID tags. By measuring
the changes in the physical layer of the communication channel between the RFID tag and reader (such as
RSSI, RF phase, and read rate) we are able to classify, in real-time, tag/object motion events along with
two types of touch events.
They have demonstrated the versatility of their system; first an interactive storytelling scenario
was demonstrated where toys were tagged so that they could be augmented by digital media. Second, they
showed for the first time that low-cost, commercially available RFID tags could be used to infer daily
activities in a home setting without the need to wear a reader. Lastly, they showed that implementing the
system in a retail scenario can enable the identification of real-time shopping behaviors. Ultimately, the

system makes sensing human interaction with everyday objects easy and unobtrusive, by minimally
augmenting objects with low-cost and long-lived RFID tags. [24]

2.2.1.2 Human Activity Tracking using RFID Tags


Human activity tracking using RFID tags is attractive for many applications since it allows
unobtrusive and passive estimation of peoples activities. The research focuses on how to customize
commonly available RFID technology to obtain orientation estimates of human activity in the field of
RFID emitter coils. This enables the accurate estimation of human activity tracking for application
domains such as retail, home-care, work place-safety, military, manufacturing and others. The researchers
found out that by displaying a composite power spectrum on a host computer for different tags and
selecting the signal of interest from spectral display will make the system to calculate the angle of arrival
of the signal from different tags moving in different direction. Based on the angle of arrival of the signal
from a particular tag, one can track the human activity very accurately. [25]

2.2.1.3 Indoor Location Tracking System Using RFID Technology


Radio frequency identification (RFID) is a rapidly growing technology that has the potential to
make great impacts on economic of many industries. There are more recent advancements in chip
manufacturing technology that makes RFID practical for new applications and settings. At its most basic,
RFID systems consist of small tags, attached to staff\student. When wirelessly interrogated by RFID
transceivers, tags, readers, respond with some identifying information that may be associated with
arbitrary data records. Thus, RFID systems are one type of automatic identification system, similar to
optical bar codes. And hence using this simple & efficient method, we can track the location of

staff/student by just staying in a particular place and without wasting human power & time. RFID tags
may soon become the most pervasive microchip in history.
This study has identified and explained the nature of RFID technology evolution with respect to
RFID applications. RFID applications could reduce the number of errors by tagging an individual and by
tracking the location in a timely manner. RFID based timely information about the location of a person
would increase the efficiency and effectiveness of the tracking system. RFID technology will open new
doors to organizations & companies to make them more secure, reliable, and accurate. The system
enables the integration and optimization of resources while improving accuracy and minimizing time
leading to improvements in tracking the location. [26]

2.2.1.4 Unobtrusive Long-Range Detection of Passive RFID Tag Motion


The researchers present a method for detecting the motion of passive radio-frequencyidentification (RFID) tags within the field of a detecting antenna which allows the unobtrusive detection
of human interactions with RFID-tagged objects without requiring any modifications to existing
communications protocols or RFID hardware. The researchers use the response rate (a metric in lieu of
the true received RF-signal intensity) at the reader to study the impact of tag translation, rotation, and
coupling, as well as environmental effects. It was improved by introducing the idea of multiple
tags/readers. Movement-detection algorithms are developed and integrated into the RFID monitoring
system, and verified by experiments that demonstrate excellent results.The researchers found out the
method does not require add-on hardware or communication-protocol modification and works by
analyzing changes in an easily detective approximation of signal-intensity leveland the systems
performance is greatly improved by introducing a multi-tag reader configuration. Also, experiments
verified the validity of this cost-effective response rate-based passive RFID system as a sensor network
for movement direction. [27]

2.2.1.5 Internet of Things (IOT) based Attendance and Intrusion Detection System
The researchers developed an attendance maintenance system for schools, colleges and well as
organizations which also has the provision to detect any form of intrusion in restricted areas and report it
immediately. The research is understood using a RFID reader to confirm the identity of the person in
room. The proposed research concluded that RFID scans for identification of the person within the given
time frame, identity of the person is identified using the tag in his card, his attendance is registered.
However, if the tag of the card is not identified by the RFID from its registered database, a picture of the
room is sent with an unauthorized access alarm. Also, if no tag is read by the RFID in the given time
frame, a picture of the room is sent with an intrusion alarm. [9]

2.2.2 Local Studies


2.2.2.1 Student Monitoring System with the use of Low Frequency Radio Frequency Identification
(RFID) and Short Messaging Service (SMS)
This study aimed to develop a Student Monitoring System using low frequency Radio Frequency
Identification (RFID) and Short Messaging Service (SMS) in order to keep track of the students within
the school premises. A computer program is to be developed to interact with the system. A series of tests
was conducted to prove the accuracy of the entire system. With the aid of Chi-square test, the researcher
determined the significant difference between the observed and expected data. The developed software
can capture and record the name, entry and exit time of the students. Moreover, the developed software
can monitor the entry and exit time, account balance and schedules of current classes of the student thru
Short Messaging Service (SMS). Future studies related to the topic may focus on the use of high
frequency radio frequency (RF) reader instead of low frequency radio frequency (RF) reader. This will

facilitate convenience to the students by just wearing or hanging the identification card with RF tag every
time the student enters and exits the school premises. [29]

2.2.2.2 Polytechnic University of the Philippines Student Monitoring using RFID with SMS
Advisory
The purpose of the system is to monitor the arrival and departure of Polytechnic University of the
Philippines students. The students will use their RFID card to enter in the school premises. The RFID
reader will detect if the RFID card is registered on the database of the school. The function of SMS
advisory is it will give the parents the information regarding the time of the arrival and departure of their
children in the PUP campus even though they are at home. [30]

2.2.2.3 Christ the King College of Science and Technology - Student Monitoring System with RFID
Technology
This paper describes the development of a student logging monitoring system based on RFID
technology. The existing traditional student monitoring system requires students to be manually
monitored by the guards at the gate every time they attend a class and checked by their teachers using
their class records. As common as it seems, such system lacks of automation, where a number of
problems may arise, this include the time unnecessarily consumed by the students as they are being
monitored by the guards and checked their identification cards, and the attendance sheet mat got lost.
The paper concluded the functionality and the usability of the system. It also shows the
improvements that they applied to their system. Its recommendation is to put online attendance viewing
so it will be easy for them to go to the website and to download the daily attendance report. [31]

2.2.2.4 User Monitoring System for the LPU-Laguna Library


The researchers developed a computer program that monitors the library users by means of
capturing their attendance through radio frequency identification (RFID). A Radio Frequency (RF) reader,
RF tag, web camera and computer were utilized to develop and perform the systems operation. The
researcher used developmental method to fulfill its objectives. The system was able to capture the
attendance of the library users with the aid of their identification card.
The development of computer program that were able to record the users of the library was
successfully done. The system was acceptable based on the test and evaluation of students and the
implementation of the system in the library. Several recommendations in connection with the tapping of
identification card, the full utilization of capturing device, database update, client-server application,
interface design and display of unreturned books. [32]

2.2.2.5 University of San Jose-Recoletos Main Campus Access Control


After three years of enjoying a fully automated data capture and analysis system provided by
Ezware IT Computing Solutions, the University of San Jose Recoletos has expanded the use of the
Radio Frequency Identification (RFID) System to its Basak Campus that holds the preschool, grade
school, high school, and select college courses. The school recognized the capability of RFID to enhance
its security feature by tracking students and personnel in real-time. A combination of devices from the
EzLogger, to monitors, to thin clients that boot up from servers - enables tag reading even few inches
away without physical contact. By tapping Student ID to the EzLogger, unlike the swiping requirements
of the magnetic cards and the read-only feature of the barcode, students and personnel get to enjoy the
stability of such technology and at the same time its evolution to cater to more services. Information
could be sent via mobile phones of recipients, say guardians of students, so they will be informed whether
their children have really reported to school or not.

Moreover, the system allows alerts as a last recourse for people often called up to report to a
particular office. After a series of written communication and still the person refuses to be summoned,
upon tapping at the EzLogger of the entry area, a flasher will be displayed on an overhead monitor. The
security guard on-duty now takes cue to escort him/her to that specific office that demands his/her
presence. [33]

2.3 Conceptual Framework

INPUT

Conceptualization
of
the
structure
Research, gathering data, and
related studies and theories
Finalizing the device
Checking availability and
buying the needed components

PROCESS

OUTPUT

Professors
Presence
Detection System via RFID
and Sensor Technology

Figure 2.1 Conceptual Framework

Evaluating the circuit


Designing the system
layout and device casing
Etching, soldering and
assembling the device
Programming
Testing of the device
Troubleshooting

The figure shows a flow chart of minimized step by step conceptualized project activities. It
contains input which provides the conceptual ideas and information needed to start the actual project.
Process that contains gradual method on conducting the implementation of the project and the output
which is the completed system to be implemented.

2.4 Definition of Terms

Electromagnetism a type of physical interaction that occurs between electrically charged particles.
EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is a type of nonvolatile memory used in computers and other electronic devices to store relatively small amounts of data
but allowing individual bytes to be erased and reprogrammed.
EPROM stands for erasable programmable read-only memory, is a type of memory chip that retains its
data when its power supply is switched off.
GPS stands for Global Positioning System, is a global navigation satellite system (GNSS) that provides
location and time information in all weather conditions, anywhere on or near the Earth where there is an
unobstructed line of sight to four or more GPS satellites
Ethernet is a family of computer networking technologies commonly used in local area
networks (LANs) and metropolitan area networks (MANs).

Notes in Chapter 2

[1] Building Student Faculty Relationship,Adam Duberstein, 2009,


http://www.nacada.ksu.edu/Resources/Academic-Advising-Today/View-Articles/Building-Student-FacultyRelationships.aspx
[2] Improving Students' Relationships with Teachers to Provide Essential Supports for Learning, Sara
Rimm-Kaufman, PhD, et. al., 2016, http://www.apa.org/education/k12/relationships.aspx
[3] 5 Guidelines for College Student-Professor Interactions, Menachem Wecker, September 2012,
http://www.usnews.com/education/best-colleges/articles/2012/09/17/5-guidelines-for-college-studentprofessor-interactions
[4] Teacher Lounge PD, Tom Whitby, 2010, https://tomwhitby.wordpress.com/2010/05/13/teacherlounge-pd/
[5] Automatic Identification and Data Collection (AIDC), MHI, 2014,
http://www.mhi.org/fundamentals/automatic-identification
[6] RFID (radio frequency identification), RSS, 2014,
http://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification
[7] How Do RFID System Works?, IMPINJI, 2012 http://www.impinj.com/resources/about-rfid/howdo-rfid-systems-work/
[8] All About Microcontrollers, Dan OSullivan, 2012, http://www.tigoe.com/pcomp/code/controllers/allabout-microcontrollers/

[9] The Most Widely Used Computer on a Chip: The TMS 1000. State of the Art: A Photographic History
of the Integrated Circuit, Augarten, New York, 1983,
http://www.computerhistory.org/siliconengine/general-purpose-microcontroller-family-is-announced/
[10]Atmel's Self-Programming Flash Microcontrollers, Odd Jostein Svendsli, 2003,
http://www.atmel.com/images/doc1644.pdf
[11] Arduino, Arduino.cc, https://www.arduino.cc/en/Guide/Introduction#
[12] RFID and Wireless Sensor Networks, K.P.Vijaygopalan, 2012,
http://www.paredox.com/foswiki/pub/Luichart/RFIDandWirelessSensorNetworks/RFID_and_Wireless_Se
nsor_Networks.pdf
[13]Brute forcing Wi-Fi Protected Setup, https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
[14] Wireless Router, Margaret Rouse, 2005,
http://searchmobilecomputing.techtarget.com/definition/wireless-router
[15]LCD Image Persistence, 2011, http://www.revolvy.com/main/index.php?s=LCD
%20Screen&item_type=topic
[16] LCD (liquid crystal display), Margaret Rouse , September 2015,
http://whatis.techtarget.com/definition/LCD-liquid-crystal-display
[17] Passive UHF Tags will Help Drive RFID Growth, Michael Choperena, 2011,
http://www.rfidjournal.com/articles/view?10784/2
[18]
[19] Human Movement Detection and Idengification Using Pyroelectric Infrared Sensors, Jaeseok Yun,
May 2014, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4063065/

[20] Human detection in surveillance videos and its applications - a review, Manoranjan Paul,
November 2013, http://asp.eurasipjournals.springeropen.com/articles/10.1186/1687-6180-2013-176
[21] OMRON Develops the World's First* 16x16 Element MEMS Non-Contact Thermal Sensor for Use
in Human Presence Sensors Utilizing Wafer-Level Vacuum Packaging Technology, Omron, May 2013,
http://www.omron.com/media/press/2013/05/e0529.html
[22] Rfid-Based Techniques For Human-Activity Detection, Joshua R. Smith, et. al., 2005,
https://www.researchgate.net/publication/220426408_RFID-based_techniques_for_humanactivity_detection
[23]Human Implanted RFID chips, Daniel Dimov, 2014, http://resources.infosecinstitute.com/humanimplanted-rfid-chips/
[24]IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID, Hanchuan Li,
et.al., 2007, https://s3-us-west-1.amazonaws.com/disneyresearch/wpcontent/uploads/20150406214909/IDSense-A-Human-Object-Interaction-Detection-System-Based-onPassive-UHF-RFID-Paper.pdf
[25] Human Activity Tracking using RFID Tags, S Srinivasa Rao, et. al., January 2009,
http://paper.ijcsns.org/07_book/200901/20090154.pdf
[26] Indoor Location Tracking System Using RFID Technology,P.Karthika, et.al., 2015,
file:///C:/Users/Fujitsu/Downloads/Indoor%20Location%20Tracking%20System%20Using%20RFID
%20Technology-1082.pdf
[27] Unobtrusive Long-Range Detection of Passive RFID Tag Motion, Bing Jiang, et. al., February 2006,
http://ieeexplore.ieee.org/document/1583880/
[28] Internet of Things (IOT) based Attendance and Intrusion Detection System, Karthikeyan B, et. al.,
March 2016, http://www.ijircce.com/upload/2016/march/55_Internet_NEW.pdf

[29] Student Monitoring System with the Use of Low Frequency Radio Frequency Identification (RFID)
and Short Messaging Service (SMS), Rhowell M. Dellosa, Lyceum of the Philippines, 2011,
http://ejournals.ph/article.php?id=6683
[30] Polytechnic University of the Philippines Student Monitoring using RFID with SMS Advisory,
Rommel Del Rosario, 2012, https://www.behance.net/gallery/4271023/PUP-Student-Monitoring-UsingRFID-with-SMS-Technology
[31] CKSM Student Attendance Monitoring System with RFID Technology, Christian B. Espiritu, et.al.,
March 2016, https://www.scribd.com/doc/314128975/Student-Monitong-using-RFID-Technology-withSMS-Notification-system-and-wireles-online-viewing
[32] Developing a User Monitoring System for the LPU-Laguna Library, Elinor Hemedes, Lyceum of the
Philippines, 2014, http://www.iosrjen.org/Papers/vol4_issue6%20(part-2)/A04620109.pdf
[33] Access Control, Maria Eleoner E. Valeros, 2013, http://www.philstar.com/cebulifestyle/2013/07/28/1023531/access-control

Das könnte Ihnen auch gefallen