A Project Report on
RFID AUTHENTICATION SYSTEM
FOR SMART CAMPUS
Submitted by
Lakshmi K
Register No: 95580219
In partial fulfillment for the award of the degree of
MASTER OF COMPUTER APPLICATIONS
from
Cochin University of Science and Technology
Under the Esteemed Guidance of
Mr.Anish Ms.Sunitha Cheriyan
Project Guide Lecturer
KOKOTHAMANGALAM P.O, CHERTHALA
DEPARTMENT OF COMPUTER APPLICATION
CHERTHALA
MARCH 2011
BONAFIDE CERTIFICATE
Certified that this project report RFID AUTHENTICATION SYSTEM FOR SMART
CAMPUS & ARTIFICIAL INTELLIGENCE GAMING is the bonafide work of
LAKSHMI K (Register No: 95580219) who carried out the project work under my guidance
……………………………… ……………………………..
Pro.SAJEEV B.U Ms.SUNITHA CHERIYAN
Director of MCA Lecturer
MSc,MCA,MTech(Phd) MCA
Dept.Computer Application Dept. Computer Application
KVM CE& IT,Cherthala KVM CE&IT,Cherthala
………………………………… ……………………………
INTERNAL EXAMINER EXTERNAL EXAMINER
DECLARATION
I hereby declare that this project work entitled “ RFID AUTHENTICATION SYSTEM FOR
SMART CAMPUS & ARTIFICIAL INTELLIGENCE GAMING ” is a record of original
work done by me under the guidance of Ms. Sunitha Cheriyan, Lecturer, Department of
Computer Applications, KVM College of Engineering & IT, Cherthala.
Place : Cherthala LAKSHMI K
Date :
ACKNOWLEDGEMENT
At the very outset,I would like to give the first honors to God who gave the wisdom and
knowledge to complete this project.
I express my heart-felt gratitude to Prof. K.N James, our Principal KVM College of
Engineering &IT, Cherthala for having given me the opportunity to complete this project
successfully.
I take this opportunity to express my sincere gratitude and thanks to Mr.Sajeev B.U , the
Director of Dept. of Computer Application, KVM College of Engineering & IT, Cherthala, for
his able leadership and guidance in all the official matter regarding the project.
I wish to extend my sincere thanks to my Guide Ms.Sunitha Cheriyan, Lecturer, Dept. of
Computer Application, KVM College of Engineering & IT, Cherthala, for her valuable guidance
and support. I thank her for timely suggestions and constant encouragement that led to the
accomplishment of this project.
Last but not least I thank my parents, friends and all my well wishers who had supported me
directly or indirectly during the project.
ABSTRACT
RFID Authentication system is specialized in specific automation
requirements of an institution and in the application of automation techniques for the
comfort and security of the students . Each student is identified and authorized using their
RFID identification. There will be RFID Authentication Module at the entrance and exit
of each and every room of the institution. If student has to enter a room, it is necessary
that they should be authenticated using the RFID Authentication system.. The access to
the class room and lab will be given only if student has the permissions provided by the
Administrator. If correct access occurs, the code of the student entering the room will be
stored into the database of the main server. When a student enters a room the RFID
code of the student will be stored to a server machine which accesses this data and stores
the student code in a corresponding table for that particular room. If any student is to be
located ,then by giving the student code , the room in which the student is ,can be known.
It also helps in virtual class room environment too, where there is no need of a particular
staff to monitor the students in and out. With this project we can keep track of the student
attended the class without any manual help, ie each student get in time and out time from
a class or from any section.
Bar codes on membership cards in library could be replaced with RFID
Authentication system. The RFID Authentication system holds the promise of allowing
patrons to check out all their materials at once by swiping the pile of books over an
electronic reader. By increasing self check-out, library management believes it can boost
staff efficiency and dedicate more time to serving patrons away from checkout lines.
RFID system emits a low-range radio frequency that can be picked up by a specially
designed scanner. The scanner can only read the code for the library material. To connect
the code to the actual book title, the code would have to be cross-referenced with the
library’s catalog.
TABLE OF CONTENTS
Chapter No. Title Page No.
1. INTRODUCTION 1
1.1 Project Profile 1
2. ABOUT THE DEVELOPING TOOLS 4
2.1 Introduction to JAVA 4
2.2 Features of Language 5
2.3 Java Swing 8
2.4 My SQL 12
2.5 Operating System 14
3. SYSTEM ANALYSIS 16
3.1 Introduction 16
3.2 Existing system 17
3.2.1 Limitation of Existing System 17
3.3 Feasibility Study 17
3.4 Fact Find Techniques 19
3.5 Proposed System 19
3.5.1 Advantages of Proposed System 20
4. SYSTEM SPECIFICATION 21
4.1 Software Specification 21
4.2 Hardware Specification 21
5. SYSTEM DESIGN 22
5.1 Introduction to System Design 22
5.2 Input Design 23
5.3 Output Design 26
5.4 Database Design 27
5.5 Hierarchical Chart 37
5.6 Data Flow Diagram 38
5.6.1 Introduction to DFD 38
5.6.2 Data Flow Diagrams 40
6. SYSTEM TESTING 48
6.1 Introduction to System Testing 48
6.2 Unit Testing 49
6.3 Integration Testing 50
6.4 Validation Testing 50
6.5 Alpha Testing 51
6.6 Beta Testing 51
6.7 Test Cases 51
7. SYSTEM IMPLEMENTATION 52
7.1 Introduction to System Implementation 52
7.2 Training 53
7.3 Post Implementation Review 53
7.4 System Maintenance 53
8. SYSTEM EVALUATION 54
9. CONCLUSION 55
10. APPENDIX 56
10.1 APPENDIX A 56
10.1.1 Screen Shots 56
10.2 APPENDIX B 73
10.2.1 Bibliography 73