Intern
ati
o
n
a
l
Journ
a
l of
Re
con
f
igur
able
and Embe
dded
Sys
t
ems
(I
JRES)
V
o
l.
1, N
o
. 3
,
N
o
v
e
m
b
er
2
012
, pp
. 10
3
~
10
7
I
S
SN
: 208
9-4
8
6
4
1
03
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJRES
Real Ti
me Attendance Logging
With Multi Node Embedded
System
Connect
ed Vi
a Wifi
Mohammed B
ilal*
* Student, Dep
a
r
t
ement of
Electr
onics & Commu
nicati
on, PG Stu
d
ies,
T John Institute Of
Techno
log
y
Article Info
A
B
STRAC
T
Article histo
r
y:
Received
J
u
n 23, 2012
Rev
i
sed
Sep
29
, 20
12
Accepted Oct 17, 2012
In the present age, we are in need of fully
automated attendan
ce logging
s
y
stem. The design of Remote Attendan
ce Loggin
g
Sy
stem and its control is
a ch
all
e
nging p
a
rt.
RF
ID read
er
reads
th
e RF
ID t
a
g,
and th
e d
e
ta
i
l
s
of the
t
a
g
is logged
in
the
embedded s
y
s
t
em. Th
e Web bas
e
d distr
i
buted
measurement
and con
t
rol
is slowly
replacing
para
llel ar
chitectures du
e to
its non-crate
archi
t
ec
ture wh
ich reduc
es co
m
p
lexities
.
A new kind of expandab
l
e
,
distributed
larg
e attendan
ce
lo
gging s
y
stem b
a
sed on ARM Cortex M3
boards has been
investig
ated
an
d develo
p
e
d in
this paper
,
whose hardwar
e
boards use 32-bit RISC processor with wi
fi dong
le attached
to its
USB port,
and software platform use Keil MDK-
AR
M fo
r firmware and
HTML for
m
a
n m
achine in
terfa
ce
.
[1
]
This
s
y
stem
can d
i
spla
y da
te and
tim
e of log in
and log out of a
person. The d
a
ta can
be display
e
d on web
pages at diff
eren
t
geographi
cal
loc
a
tions
,
and at
th
e s
a
m
e
tim
e can
be trans
m
itt
ed t
o
a Rem
o
te
Data Acquisitio
n S
y
stem b
y
using HTTP
protocol. Th
e embedd
ed board can
act
as
a
centr
al
CP
U to com
m
unica
te b
e
twe
e
n w
e
b s
e
rve
r
s
autom
a
ti
cal
l
y
.
Keyword:
Real Tim
e
At
t
e
nda
nce Lo
ggi
ng
Et
her
n
et
C
o
nt
r
o
l
Wi
f
i
Mu
ltin
od
e
Copyright ©
201
2 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
Co
rresp
ond
i
ng
Autho
r
:
Mo
h
a
mm
ed
Bi
lal,
Depa
rtem
ent of Elecctr
onics
& Comm
unication,
T John
In
stitu
t
e
Of Tech
no
log
y
,
#
8
6
/
1,
Kamm
n
a
h
a
lli, Go
ttig
ere, Bann
ergh
atta
Ro
ad
Bang
al
o
r
e, Karn
atak
a 5
6
0
08
3,Ind
i
a.
Em
a
il: m
d
b
ilal
@
ou
tloo
k
.co
m
1.
INTRODUCTION
At
t
e
nda
nce l
o
ggi
ng sy
st
em
s are necessary
i
n
al
l ki
nd
of establishm
ents such as schools, colleges
,
facto
r
ies, h
o
spitals, co
n
s
tructio
n
sites an
d
so
on
. In
m
a
n
y
cases it
is d
i
fficu
lt to
m
a
n
a
g
e
th
e lo
g
i
n
d
a
ta fro
m
rem
o
te si
tes. Th
e syste
m
p
r
op
o
s
ed
in
th
is pap
e
r can
store
atten
d
a
nce d
e
tails an
d
u
p
d
a
te it
to
th
e web
serv
er.
Em
bedded
W
e
b bas
e
d ac
q
u
i
si
t
i
on an
d co
nt
r
o
l
sy
st
em
can ada
p
t
t
o
t
h
e st
ri
ct
re
qui
rem
e
nt
s of t
h
e dat
a
acq
u
i
sition
syste
m
, su
ch
as th
e fun
c
tio
n, reliab
ility, co
st
, si
ze, p
o
wer con
s
u
m
p
tio
n
,
and
so
on
. RFID tags are
issu
ed
t
o
Perso
n
n
e
l, th
e tag
d
e
tails ar
e p
r
e
-
st
o
r
ed i
n
t
h
e
serve
r
[
1
]
.
I
n
t
h
i
s
pa
per
,
a
new
ki
n
d
of
r
e
m
o
t
e
di
st
ri
b
u
t
e
d at
t
e
nda
nce l
o
g
g
i
n
g sy
st
em
based o
n
em
bedde
d
W
e
b se
rve
r
has be
en i
nves
t
i
g
at
ed an
d de
vel
o
pe
d
,
whi
c
h can l
og
t
h
e at
t
e
nda
nce
and ca
n
be di
s
p
l
a
y
e
d t
h
ro
u
g
h
web
pa
ges f
r
o
m
t
h
e server
, a
nd at
t
h
e sam
e
t
i
m
e
can
be acq
ui
r
e
d at
di
ffe
rent
geo
g
r
ap
hi
cal
l
o
cat
i
ons t
h
r
o
ug
h i
n
t
e
rnet
.
The sy
st
em
has t
h
e
dual
re
du
n
d
ant
n
e
two
r
k
and
g
l
o
b
a
l co
mm
u
n
i
catio
n
fun
c
tion, wh
ich
can
ensu
re th
e d
i
st
u
r
b
rej
ecti
o
n
capab
ility an
d
reliab
ility
o
f
t
h
e co
mm
u
n
icatio
n
n
e
twork. Th
e attend
an
ce is
u
p
d
a
te
d
in
a rem
o
te serv
er, b
y
t
h
e embedde
d
system. The
wifi access
to t
h
e em
bedde
d
s
y
ste
m
enables
the
em
bedde
d
syste
m
to upda
te it on t
h
e se
rver.
Thi
s
pa
pe
r i
s
st
ruct
ure
d
as f
o
l
l
o
ws:
We de
si
g
n
t
h
e sy
st
em
i
n
sect
i
on 2
.
I
n
S
ect
i
on 3
we
di
scuss a
b
o
u
t
t
h
e har
d
ware
d
e
si
gn
of t
h
e sy
st
em
, and i
n
s
ect
i
on 4
we el
abo
r
at
e u
p
o
n
wi
fi
com
m
uni
cat
i
on i
n
m
u
l
t
i
m
ode.
Sect
i
on
5 el
a
b
orat
es
o
n
t
h
e
si
m
u
l
a
t
i
on e
nvi
r
onm
ent
an
d t
h
e ex
peri
m
e
nt
al res
u
l
t
s
. I
n
Sec
t
i
on
6,
we
p
r
es
ent
o
u
r
concl
u
si
o
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:20
89-
486
4
I
J
RES
Vo
l. 1
,
N
o
. 3
,
No
v
e
m
b
er
201
2
:
103–
107
10
4
2.
SYSTE
M
DESIGN
Havi
ng a cl
ea
r defi
ni
t
i
on
o
f
t
h
e pr
o
p
ert
i
es and c
h
arac
t
e
ri
st
i
c
s of t
h
e
em
bedde
d sy
st
em
pri
o
r
to
startin
g
h
a
rdware and
software
d
e
v
e
l
o
pmen
t is essen
t
i
a
l to
ach
iev
e
fin
a
l resu
lt th
at
m
a
tch
e
s
its
t
a
rg
et
sp
ecification
s
. In th
is system
we are u
s
i
n
g th
e
80
2.11g
stand
a
rd. It
u
tilizes ex
istin
g elem
en
ts fro
m
th
e
o
r
i
g
in
al CCK-ODFM and
PBCC-2
2
propo
sals. Each
of
th
ese p
r
op
o
s
als
called
fo
r tru
e
8
0
2
.
11
a OFDM
ope
ration in the 2.4 GHz band as an
optional
m
ode
to the
prim
ary proposed m
odulation, eithe
r
CCK-OF
D
M
o
r
PBCC-2
2
.
Th
e
80
2.11g
draft stan
d
a
rd
mak
e
s OFDM
th
e m
a
n
d
a
tory tech
no
log
y
,
o
f
feri
n
g
802
.11
a
d
a
ta
rat
e
s i
n
t
h
e
2.
4
GHz
ba
nd
, re
qui
res m
a
ndat
o
ry
i
m
pl
em
entat
i
on o
f
80
2.
1
1b m
odes a
n
d
of
fers
o
p
t
i
onal
m
odes
o
f
CCK-OFDM and
PBCC-2
2
.
Th
is b
a
lan
ced co
m
p
ro
mise
o
f
fers a mu
ch clearer
b
r
i
d
g
e
b
e
t
w
een
80
2.11
a
an
d 802
.1
1b
, plu
s
is a st
r
a
igh
t
f
o
r
w
ard
m
ean
s to
d
e
v
e
l
o
p true m
u
lt
i-
m
o
d
e
W
L
A
N
Em
b
e
d
d
e
d Nod
e
s.
80
2.11g
ach
iev
e
s th
e
h
i
g
h
5
4
Mbp
s
d
a
ta rates o
f
80
2.1
1
a
in
th
e
2
.
4
GHz
b
a
nd
, th
ereb
y m
a
in
tain
i
n
g
co
m
p
atib
ilit
y with
i
n
st
al
l
e
d 80
2.
1
1b e
qui
pm
ent
.
Dem
onst
r
at
es t
h
at
t
h
e perf
o
r
m
a
nce of 80
2
.
1
1
g
,
i
n
t
e
rm
s
of b
o
t
h
dat
a
t
r
ansfe
r
sp
eed
s
an
d ran
g
e
, is
b
e
tter
th
an
an
y
o
f
t
h
e altern
ativ
es
th
at h
a
d
b
een
co
nsid
ered
earlier in
th
e
selectio
n
p
r
o
cess [2
].
Data tran
sm
issio
n
requ
ires a
b
r
ief
d
i
scu
ssion
of th
e OSI Mo
d
e
l, wh
ich
co
nsists
o
f
seven
layers
in
or
der
f
r
om
t
h
e t
o
p
l
a
y
e
r t
o
t
h
e
bot
t
o
m
l
a
yer:
com
put
er
’s
net
w
or
k
p
r
ot
ocol
st
ac
k c
o
n
s
i
s
t
s
of t
h
e m
o
d
u
l
e
s
i
n
v
o
l
v
e
d
wi
t
h
net
w
or
ki
n
g
. F
i
g.1 s
h
ows a
Net
w
or
k Pr
ot
o
c
ol
St
ack f
o
r a
com
put
er t
h
at
con
n
ect
s t
o
a WI
FI
net
w
or
k an
d sup
p
o
rt
s com
m
on I
n
t
e
r
n
et
pr
o
t
ocol
s. At
t
h
e bot
t
o
m
of the st
ack i
s
t
h
e hard
ware i
n
t
e
rface
t
o
t
h
e
wi
fi
m
o
d
u
l
e
.
He
re, L
P
C
1
7
6
8
boa
r
d
wi
t
h
a
wi
fi
m
odul
e c
o
nnect
e
d
t
h
r
o
u
g
h
SP
I i
s
pres
ent
.
At
t
h
e t
o
p
a
m
odule or
m
odules that provide data
to send on
the net
w
ork a
n
d use the
data received
from
the
net
w
or
k. I
n
t
h
e m
i
ddl
e t
h
er
e
m
a
y
be one
or m
o
re m
odul
es i
n
v
o
l
v
e
d
wi
t
h
add
r
essi
ng
,
err
o
r
-
chec
ki
n
g
, an
d
pr
o
v
i
d
i
n
g an
d
usi
n
g st
at
us and c
ont
rol
i
n
fo
rm
ati
on. I
n
t
r
ansm
i
t
t
i
ng, a
m
e
ssage t
r
avel
s do
w
n
t
h
e st
a
c
k f
r
om
the a
p
plication
layer t
h
at i
n
itiates the
message
to
t
h
e
network
interface that
places the
m
e
ssage
on
the network.
In recei
ving,
the
m
e
ssage travels up
the stack from the
network interface to the
application layer that uses the data in
th
e receive
d message. The
num
ber of layers a
m
e
ssage passes
th
ro
ugh
can
vary. Fo
r so
m
e
m
e
ssag
e
s th
at trav
el
on
ly
with
in
a lo
cal
n
e
twork, th
e
ap
p
lication
layer can
comm
unicate directly with
th
e w
i
f
i
d
r
iv
er [2
].
Fi
gu
re
1.
A
Ne
t
w
o
r
k
Pr
ot
oc
ol
St
ack
f
o
r a
co
m
put
er
In wifi net
w
orks
, a unique
ha
rdware address ide
n
tifie
s each
interfa
ce on the ne
twork. IP
addresses are
m
o
re flexible because
they aren’t specific to a
network type. A m
e
ssage that
uses IP can
t
r
avel
t
h
r
o
ug
h
di
ffe
rent
t
y
p
e
s
of
net
w
o
r
k
s
, i
n
cl
u
d
i
n
g
Et
her
n
et
,
t
o
ke
n-
ri
n
g
,
an
d
w
i
rel
e
ss net
w
o
r
ks,
as
l
o
n
g
as al
l of t
h
e net
w
o
r
ks su
pp
ort
IP
. A com
m
unicat
i
on i
n
a l
o
cal
net
w
o
r
k t
h
a
t
doesn
’t
use
TC
P or
UDP m
a
y n
o
t
requ
ire IP. Messag
e
s th
at trav
el o
n
th
e
In
te
rnet m
u
st use the Internet Protocol. Messa
ge
s that
use t
h
e
I
n
t
e
r
n
et
Prot
ocol
c
a
n al
s
o
use
t
h
e
User
D
a
t
a
gram
Prot
ocol
o
r
t
h
e
Tran
sm
i
ssi
on C
ont
rol
Pro
t
o
c
o
l
to
a
d
d
error ch
eck
i
ng
o
r
flow-co
n
t
ro
l cap
ab
ilities. Th
e LPC1
768
m
i
cro
c
o
n
t
ro
ller bo
ard
u
s
es
T
C
P
p
r
o
t
o
c
o
l
p
a
c
k
e
t
t
o
t
r
a
n
s
m
i
t
d
a
t
a
t
o
a
re
m
o
te com
puter, through a
W
i
-fi
m
o
du
le co
nn
ect to
SPI
o
f
t
h
e AR
M
Pr
oc
essor
.
TC
P p
r
o
t
ocol
i
s
on
e of
pr
ot
oc
ol
s i
n
t
h
e TC
P/
IP p
r
ot
o
c
ol
sui
t
e
t
h
at
i
s
used i
n
t
h
e pl
a
ce of
UDP wh
en
a reliab
l
e d
e
liv
ery is requ
ired.
Th
ere is m
o
re
pr
ocessi
ng of
TC
P
pac
k
et
s
t
h
an
t
h
e one o
f
UD
P. An
application often has a
user
interface t
h
at enables
use
r
s t
o
re
quest data
from
a co
m
puter
on t
h
e
network
APPL
ICATION
TCP
IP
80
2.
1
1
W
i
-fi
D
r
i
v
e
r
PHY
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
RES I
S
SN
:
208
9-4
8
6
4
Rea
l
Ti
me Atten
dan
ce Log
g
i
ng
With Mu
lti N
o
d
e
Emb
e
dd
ed S
y
stem... (Moh
ammed Bila
l)
10
5
or p
r
o
v
i
d
e da
t
a
t
o
send on
t
h
e net
w
or
k.
An appl
i
cat
i
on m
a
y use
a st
andar
d
pr
o
t
ocol
such as
t
h
e
hy
pe
rt
ext
t
r
an
sfer p
r
ot
oc
ol
(HT
T
P) f
o
r re
que
st
i
ng a
nd
sen
d
i
n
g
W
e
b page
s, t
h
e fi
l
e
t
r
ansfe
r
p
r
o
t
oco
l
(FTP
) f
o
r t
r
a
n
sfe
rri
ng
fi
l
e
s, or t
h
e si
m
p
l
e
m
a
i
l
t
r
ansfer
pr
ot
oc
ol
(SM
T
P
)
o
r
P
o
st
Of
fi
ce Pr
ot
oc
ol
(POP3)
for e-m
a
il
m
e
ssages. He
re FT
Pis c
h
ose
n
.
3.
HA
RD
WA
RE
STR
UCT
U
R
E
OF
REM
O
TE EMBED
D
E
D N
O
DE
The sy
st
em
mai
n
l
y
com
posed o
f
P
r
oc
esso
r
m
odul
e i
s
t
h
e
core
pa
rt
o
f
t
h
e desi
gn
, i
n
whi
c
h t
h
e
A
R
M ch
ip
LPC1
768
u
s
ed
. LPC176
8 is an
A
R
M-
b
a
se
d
micro
c
on
tro
ller fo
r ap
p
licatio
n
s
requ
iring
serial
com
m
uni
cat
i
ons f
o
r a va
ri
et
y
of pu
rp
os
es. Thi
s
m
i
cr
oco
n
t
r
ol
l
e
r i
n
cor
p
orat
e a 1
0
/
1
00 Et
her
n
e
t
M
A
C
(DP83
848
H),
USB 2
.
0
Fu
ll Sp
eed
in
terface, fou
r
UAR
Ts, two
C
A
N ch
ann
e
ls, an SPI in
terface, two
Syn
c
hro
nou
s Serial Ports (SSP),
th
ree I2
C
in
terfaces,
an
I2S in
terface,
On-ch
i
p
crystal o
s
cillato
r
ru
n
with an operati
ng ra
nge of 1 MHz to 24 MHz. A
W
i
-fi
mo
du
le is co
nn
ected
to
th
e LPC 1
7
6
8
conn
ected
to
the WLAN or internet.
T
h
e ARM
process
o
rs flash
m
e
m
o
ry is prelo
a
d
e
d with
t
h
e tab
l
e con
s
istin
g
o
f
RFID
Tag
ID and t
h
e personnel inform
ation.
The
RFID tag re
a
d
er, stores t
h
e
data which is
receive
d int
o
a
flash
me
m
o
ry, alo
ng with
t
h
e tim
e
an
d d
a
te
wh
ich is g
e
n
e
rated
with
th
e
h
e
lp of
Real Ti
m
e
Clo
c
k
[5
].
Fi
gu
re
2.
St
r
u
c
t
ure
of
R
e
m
o
t
e
At
t
e
n
d
ance
L
o
g
g
i
n
g
Sy
st
em
Once i
n
E
v
ery
ho
u
r
t
h
e em
bedde
d sy
st
em
, logs i
n
t
o
t
h
e fi
l
e
serve
r
m
a
ki
ng us
e o
f
FT
P p
r
ot
ocol
, a
n
d
u
p
d
a
tes t
h
e atten
d
a
n
ce l
o
g in
t
o
th
e rem
o
te serv
er.
Th
ese d
e
t
a
ils can
b
e
accessed
fro
m
th
e PC rem
o
tely.
Care h
a
s b
e
en
tak
e
n
to
en
sure th
at in
case o
f
in
tern
et d
i
scon
n
ectiv
ity, th
e
atten
d
a
nce lo
g
is sto
r
ed
in
the SD ca
rd or Flas
h m
e
m
o
ry available t
o
the
ARM
pr
o
cessor.
When
in
tern
et is av
ailab
l
e, t
h
e
re
m
o
te
database
updat
e
takes place.
The attendanc
e
log is stor
ed in CSV format which is
si
milar to that of SQL
dat
a
base
prese
n
t
i
n
t
h
e fi
l
e
serve
r
[
6
]
.
Th
e em
bedde
d s
y
st
em
m
a
kes
use t
h
e FTP l
i
nk st
o
r
ed i
n
i
t
,
t
o
connected to the File Server a
n
d the
file is
pasted
in th
e serv
er [3
].
4.
WIFI CO
M
M
UNI
C
A
TIO
N
In the
desi
gn of
network c
o
mm
unication,
we s
h
ould
ha
ndle TCP fram
e
accepting a
nd TCP
fram
e
transm
itting. According
to
the recei
ved
pa
cket type
, c
hoose
a
differe
n
t approach.
Da
ta
transm
ission over
the
WIFI m
e
dium
can be
segmente
d
in
t
o
three m
a
in
step
s [3
].
1
.
In
itializat
io
n of th
e SPI,
PHY an
d th
e C
P
U:
(a)
In
itialize SPI C
o
n
t
ro
l Reg
i
sters.
(b
) In
itialize PHY reg
i
sters.
(c) En
ab
le in
t
e
rru
p
t
s after settin
g
in
te
rru
p
t
h
a
nd
lers fo
r the SPI in
terru
p
t
s.
(d
) In
itialize RFID
Tag
tab
l
e
fro
m
th
e m
e
m
o
ry [6
]
REMOTE EM
BEDDED
NODE
RFID
READER
Lith
iu
m
-
i
on bat
t
e
ry
Wi
-
F
i
Mo
du
le
ARM
Co
rtex M3
LPC 176
8
S
P
I
Real
Tim
e
Clo
c
k
File
Server
REMOTE
COMPUTE
R
REMOTE
COMPUTE
R
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:20
89-
486
4
I
J
RES
Vo
l. 1
,
N
o
. 3
,
No
v
e
m
b
er
201
2
:
103–
107
10
6
2. RF
I
D
Ta
g
Read:
(a
) Create
a T
a
ble in C
S
V form
at
(b
) Store t
h
e
RFID Tag
d
e
tails alo
n
g
with
Ti
m
e
an
d
d
a
te
in
th
e
flash m
e
m
o
ry.
3.
U
pdat
e
o
f
dat
a
base
i
n
t
h
e
ser
v
er:
(a) T
h
e data in the flash m
e
mory is chec
ke
d
and c
o
m
p
ared
with
ex
isting
fi
le if th
ere is chan
g
e
i
n
file
size.
(b)
If t
h
ere
is a
cha
nge
in
file
size, connect
to
inte
rnet
a
n
d access
the files
e
rve
r
using FT
P.
(c)
Paste th
e up
d
a
ted
file in
t
h
e
fileserv
er.
(d)
If
atten
d
a
nce is log
g
e
d
wh
en
up
d
a
ti
n
g
th
e
rem
o
te serv
er, t
h
en
termin
ate th
e upd
ate, l
o
g th
e
at
t
e
ndan
ce a
n
d
rec
o
n
n
ect
a
f
t
e
r ra
n
dom
del
a
y
.
5.
RESULT
Fi
gu
re 3 i
n
di
ca
t
e
s t
h
e resul
t
whi
c
h i
s
achi
e
ved
.
The N
o
de
E3 and F
1
are
t
h
e no
des w
h
e
r
e pers
o
n
n
el
can swipe the
RFID tag.
Wh
en the details are captured
by the tag r
eader, it is stored in the
m
e
m
o
r
y
and
upl
oade
d t
o
a
f
i
l
e
server
. T
h
e
f
i
l
e
server
det
a
i
l
s
can
be
seen
f
r
om
any
we
b
b
r
o
w
ser
Fi
gu
re
3.
R
e
sul
t
of
t
h
e R
eal
Ti
m
e
At
t
e
nda
nce
Lo
g
g
i
n
g
6.
CO
NCL
USI
O
N
The system
de
veloped
will be very use
f
ul to incr
ea
se the
accuracy a
nd
make the attendance l
o
gging
a
u
t
o
m
a
t
e
d
.
W
i
-
f
i
i
s
m
o
s
t
m
a
t
u
r
e
a
n
d
w
i
d
e
l
y
u
s
e
d
t
e
c
h
n
o
l
o
g
y
f
o
r
I
n
t
e
r
n
e
t
,
t
h
e
s
c
h
e
m
e
p
r
o
p
o
s
e
d
i
n
t
h
i
s
paper n
o
t
onl
y
can b
e
used i
n
connect
i
n
g t
h
e em
bedde
d de
vi
ce t
o
W
L
A
N
, but
al
so s
u
pp
o
r
t
s
e
m
b
e
d
d
e
d
web syste
m
. Th
is s
y
ste
m
can
b
e
u
s
ed
widely in
t
h
e do
m
a
in
o
f
d
a
ta-acq
u
i
sition
an
d
rem
o
te
d
a
ta
tran
sp
ortatio
n,
security, attend
an
ce system
an
d indu
strial
on
-site
p
r
od
u
c
t in
vo
icin
g etc.
REFERE
NC
ES
[1]
Network Controlled Monitoring
S
y
stem
Using Arm 7 ,SharvariB.Bhosale,
Intern
ational Journal
Of Engineering
Scien
c
e
&
Adva
nced Technolog
y
, Volume-2, Issue-3, 577
– 5
8
0
[2]
IEEE 802.11g
New Draft Standard Clarif
ies Future of
W
i
reles
s
LAN by
W
illi
am
Carne
y
,Ma
r
keting Manag
e
r
,
Wire
le
ss Ne
tworking Busine
ss U
n
it, Te
xa
s Instrume
nts
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
RES I
S
SN
:
208
9-4
8
6
4
Rea
l
Ti
me Atten
dan
ce Log
g
i
ng
With Mu
lti N
o
d
e
Emb
e
dd
ed S
y
stem... (Moh
ammed Bila
l)
10
7
[3]
802.11g JELL AS
APPLICAT
ION M
OUNT
b
y
Mathhew B
Shoemake h
ttp://www.eetimes.com/electronics
-
news/4142144/IEEE-802-11g-Je
lls-As-Applicat
i
ons-Mount
[4]
An RFID Based Ecommerce
Solution For The Implem
entation Of Secured
Unattend
ed Stores. Journal O
f
Emerging Tr
end
s
In Computing
And Information
Scien
ces, Volu
me 2, No 8
,
Aug
u
st 2011.
[5]
User Manu
al
LPC 1768,ww
w.
nxp.com/docu
m
ents/user_manual/UM10360.p
d
f
[6]
Dev
e
lopment of
tools
to manage
embedded
SQL
ACM-SE '1
1 Proceedings o
f
the
49th
Annual Southeast Regio
nal
ConferencePages 358-359
[7]
W
h
it
e P
a
p
e
r
Common
RFID Implementation Issues:
10 Considerations forDeployment
BI
O
G
R
A
P
HY
OF
A
U
T
HO
R
Mohammed B
ilal
He di
d hi
s
B
a
chel
o
r
s Of En
gi
nee
r
i
n
g
i
n
E
l
ect
roni
cs A
n
d
C
o
m
m
uni
cat
ion
f
r
om
Vi
sves
va
ray
a
Tech
on
ol
o
g
i
c
a
l
Uni
v
ersi
t
y
.
C
u
r
r
ent
l
y
he
i
s
p
u
rs
ui
n
g
hi
s
M
a
st
ers
VLS
I
Desi
g
n
A
n
d
Em
bedde
d
Sy
st
em
fr
om
Vi
sve
r
va
ray
a
Tec
h
nol
ogi
cal
U
n
iv
er
sity H
e
h
a
s pr
esen
ted
v
a
r
i
o
u
s
r
e
sear
ch p
a
p
e
rs
in
th
e
f
i
eld
of
DDOS
p
r
ev
en
tio
n, and
o
n
rem
o
te d
a
ta acq
u
i
sition
an
d m
o
n
ito
ring
.
Evaluation Warning : The document was created with Spire.PDF for Python.