RFID
RFID
Submitted by:
MATEO, RUDOLF ERIC R.
BERO, JHON EMILSON B.
BOHOL, KENNETH P.
ORTINERO, MICHAEL B.
CAMPOS, JOHN EARL P.
GEOCA, KIEL IVAN D.
TOLORIO, JUDE
OÑIDO, JEROME I.
Intructor Name:
MR. RANDY VILLANUEVA
Date of Submission:
NOVEMBER 28 2024
1. Project Overview
1.1 Project Tittle
ARDUINO RFID ATTENDANCE WITH GOOGLE SHEETS
1.3 Objectives
State the main objectives of the project. Example:
Develop a functional prototype using Arduino.
Easily access student time when you enter inside the room
Predefined Variables
Setup Function
2.Card Validation:
DATA LOGGING:
2. Hardware-Software Interaction
Ethernet Shield:
Google Sheets:
Hardware:
o The Arduino Uno connects to the MFRC522 RFID reader for card scanning and
to the Ethernet shield for internet connectivity.
o Jumper wires are used to connect the RFID module and Ethernet shield to the
Arduino.
Software:
o The RFID reader and Ethernet shield are initialized in the setup() function.
o The Ethernet shield connects the Arduino to the internet using either DHCP or a
static IP address.
The UID is compared against a predefined list of valid card IDs stored in the Arduino
code.
5. System Reset
· Compares scanned RFID card IDs with a list of authorized IDs for accurate validation.
· Ethernet Connectivity
· Uses the Ethernet shield for stable and reliable internet communication.
· Error Handling
·
Efficient Design
· Minimal hardware setup with an Arduino Uno, RFID reader (MFRC522), and Ethernet shield.
· Scalable System
· Low-Cost Solution
Validation Process
1. The scanned UID is compared with a predefined list of authorized IDs in the
Arduino code.
2. The system determines whether the card is valid or invalid.
1. For Valid Cards: Displays the UID and a "Valid Person" message.
2. For Invalid Cards: Displays the UID and a "Not a Valid Person" message.
1. Attendance data (valid/invalid status and card UID) is sent to Google Sheets.
2. Users or administrators can remotely check attendance logs.
4. Testing and Results
4.1 Testing Process
Objective: Test the Arduino's ability to send and receive data via the serial monitor.
Expected Outcome: Messages appear correctly in the serial monitor.
Objective: Verify that the RFID reader, Ethernet shield, and Arduino work together as expected.
Expected Outcome: The system identifies valid and invalid cards, and logs attendance data in
Google Sheets.
Debugging:
o Use the serial monitor to track potential issues during testing (e.g., incorrect wiring,
failed internet connection, or misread card UIDs).
Optimization:
o Fine-tune delay times, UID validation logic, and data transmission code to improve
performance and reliability.
Educational Institutions: This system can replace manual roll-calls and attendance sheets
in schools or universities, saving time for teachers and administrators while reducing
human error.
Workplace Attendance: In office or industrial environments, this system can be used for
employee attendance tracking, improving workforce management and data accuracy.
Event Management: For large-scale events or conferences, this project can automate
attendee check-ins, allowing for efficient crowd management and data collection.
Security Applications: The system could be expanded for use in access control systems,
allowing only authorized personnel to enter certain areas by scanning their RFID badges.
Improvement: Develop a simple web interface or a mobile app for administrators to view
attendance data, manage users, and configure settings.
Impact: This would make it easier for administrators to interact with the system, monitor
attendance in real-time, and manage user access.
Improvement: Expand the system to handle multiple cards for each user (e.g., a student can
use multiple cards like a student ID, library card, or employee badge).
Impact: This would allow greater flexibility, enabling users to use different cards for attendance,
access control, or other functionalities.
Improvement: Implement notifications via email, SMS, or app notifications for various
events (e.g., when someone attempts to use an invalid card or when a user scans in).
Impact: This would provide real-time feedback to administrators, helping to monitor system
activity and detect potential security breaches quickly.
Improvement: Implement SSL/TLS encryption for secure data transmission between the
system and the cloud (Google Sheets or a database).
Impact: This would make the system more secure, ensuring that sensitive data such as
employee or student IDs is transmitted safely.
7. References
RFID Systems: