Indonesian J
ournal of Ele
c
trical Engin
eering and
Computer Sci
e
nce
Vol. 2, No. 2,
May 2016, pp
. 396 ~ 408
DOI: 10.115
9
1
/ijeecs.v2.i2.pp39
6-4
0
8
396
Re
cei
v
ed Fe
brua
ry 11, 20
15; Re
vised
Ap
ril 19, 201
6; Acce
pted
April 29, 201
6
RFID Pe
rsonnel Control System that can be Managed
via 4.5 G
Abdülk
a
dir Çakir
1
, Halil Ka
y
g
isiz
*
2
1
Departme
n
t of Electrical a
nd
Electron
ics En
gin
eeri
ng, F
a
cult
y
of
T
e
chnol
og
y, Sule
ym
an
Demire
l
Univers
i
t
y
, Isp
a
rta,
T
u
rke
y
.
2
Departme
n
t of Computer Pro
g
rammin
g
, Sen
i
rkent Vo
cati
on
al Scho
ol, Sul
e
yma
n
D
e
mirel
Univers
i
t
y
,
Isparta, T
u
rkey
.
*Corres
p
o
ndi
n
g
author, e-ma
i
l
: abdu
lka
d
irca
kir@sdu.e
du.tr
1
, halilka
y
g
i
siz
@
sdu.e
du.tr
2
A
b
st
r
a
ct
T
he curr
ent st
udy
ai
me
d to
r
e
vea
l
that
pers
onn
el
c
ontro
l b
y
the
e
m
pl
oyer
sho
u
ld
b
e
co
nducte
d
usin
g R
adi
o F
r
equ
ency Id
enti
f
ication
(RF
I
D) techn
o
lo
gy i
n
an
eas
ier
an
d
more
mod
u
lar
w
a
y. RF
ID is
a
techno
lo
gy e
n
s
urin
g that
id
e
n
tifiab
le
infor
m
ation
of
pe
op
l
e
o
r
ob
je
cts a
r
e tra
n
s
m
i
tte
d via
rad
i
o si
gn
al
s. It
has s
o
me s
i
mil
a
rities w
i
th
exi
s
ting s
m
art car
d
tech
nol
og
ies.
T
he
most i
m
p
o
rtant feat
ure
differenti
a
tin
g
t
h
e
RFID from the existing te
c
h
n
o
lo
gies
is th
at
it w
o
rks w
i
rele
ssly. T
he
hard
w
are use
d
i
n
t
he stu
d
y ca
n
b
e
ma
na
ged v
i
a
Ethernet p
o
rt. In this study, i
t
is ensure
d
th
at data b
e
transmitted via In
ternet by usi
n
g a
mo
bil
e
cell
ul
ar
commu
n
icati
o
n system. The control
of the set up system c
an be co
nduct
ed w
i
relessly v
i
a
any envir
o
nm
ent in whic
h an Internet c
onnection c
a
n be established.
Than
ks to t
h
e created system,
infor
m
ati
on ab
out arrival
and
departur
e
dat
es of the
place
s
to w
here the mob
ile p
e
rso
n
nel sh
oul
d go
ca
n
be
monitor
e
d
24/7 fro
m
any
w
here that
has
inter
net co
nn
ection. As
a r
e
sult of th
e test
s an
d a
p
p
licati
o
n
s
that have b
e
e
n
cond
ucted,
it
has be
en se
e
n
that
the data
could
not be t
r
ans
mi
tted i
n
a
radio-fre
q
u
e
n
c
y
envir
on
me
nt b
e
caus
e of the error caus
ed b
y
the RF
ID tag. As a result
of the calcul
atio
ns made
after th
e
app
licati
on, it h
a
s bee
n put for
w
ard
that the error mar
g
in is
7
±
1%.
Ke
y
w
ords
: Mo
bile C
e
l
l
ul
ar Co
mmu
n
icati
on S
ystem, Perso
n
nel C
ontrol Sys
t
em, RF
ID
Copy
right
©
2016 In
stitu
t
e o
f
Ad
van
ced
En
g
i
n
eerin
g and
Scien
ce. All
rig
h
t
s reser
ve
d
.
1. Introduc
tion
Institutions
and organi
zations p
r
ovi
de m
any job oppo
rtun
ities for e
m
ployee
s.
Supervi
sion
of
the emplo
y
ees by
the
employing
in
stitutions an
d
organi
zation
s i
s
req
u
ired
in
orde
r to
carry out the ne
ce
ssary work in a sh
orte
r time and m
o
re effici
ently. The re
quire
d
sup
e
rvisi
on can
b
e
con
d
u
c
ted by
the resp
on
sibl
e
in
dividual
s a
n
d
pe
rso
nnel
m
onitorin
g
syst
em
in only spe
c
ifi
c
wo
rkpla
c
e
s
, such as fa
ctorie
s.
Personn
el monitorin
g
syst
ems a
r
e software
prepa
re
d with the ai
m of controlli
ng the
employee
s, a
nd they can work a
s
integ
r
ated with
bio
m
etric ha
rd
ware. With the
s
e sy
stems, the
employee
s’
e
n
tran
ce/exit ti
mes of
work
can
be
dete
c
t
ed, an
d the
work effici
ency
ca
n b
e
g
r
e
a
tly
increa
sed
wit
h
a fair
sal
a
ry system. Pe
rso
nnel
monit
o
ring
syste
m
s can b
e
u
s
e
d
in work a
r
e
a
s,
as well. Whe
n
the employ
er want
s
the
person
nel
th
at wo
rk in
different a
r
e
a
s to be
controll
ed
from on
e cen
t
er, perso
nne
l monitorin
g
systems a
r
e
not s
u
ffic
i
ent in this
s
i
tuation. The exis
ting
person
nel m
onitorin
g
sy
stems e
n
sure t
he su
pe
rv
isio
n of the personnel in
situ
ations in
whi
c
h
workpl
aces
are fixed. Howeve
r, whe
n
the wo
rkpl
ace of the
person
nel
is not limited, the
employe
r
s
ca
nnot u
s
e th
e
s
e
syst
em
s a
nd have
difficulty in the su
pervisi
on
and
cont
rol of th
e
personnel.
With this study, t
he researchers
attempted to el
i
m
inate the i
n
capability of the
person
nel m
onitorin
g
sy
stems u
s
ing
RFID te
chn
o
l
ogy and m
obile cellula
r comm
uni
cat
i
on
sy
st
em
s.
2. Rese
arch
Metho
d
2.1. RFID Te
chnolog
y
Radi
o Freque
ncy Identifica
t
ion (RFID) te
chn
o
l
ogy defi
nes th
e sy
ste
m
that tran
smits the
identity of an
obje
c
t o
r
a li
ving bein
g
wi
rele
ssly
by u
s
ing
ra
dio
wa
ves [1]. RFI
D
tech
nology i
s
a
grou
p un
der the Automatic Ident
ification (Auto
-
ID) T
e
ch
nolo
g
ie
s. Autom
a
tic identificatio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 396 –
408
397
techn
o
logie
s
inclu
de
such biometri
c
te
chnolo
g
ies
as bar cod
e
s, smart
card
s,
o
p
tical cha
r
a
c
ter
identificatio
n system a
nd retina sc
an
nin
g
, identificatio
n with soun
d,
identification
with finge
rpri
nt.
Automatic ide
n
tification technolo
g
y is used to red
u
ce the wo
rk force and du
ratio
n
cau
s
e
d
by the
need of ente
r
i
ng data man
u
a
lly and to increa
se the correctn
ess of th
e data [2].
RFID is
an Automatic
Identific
a
tion Sys
t
em
con
s
i
s
ted
of a micro
c
hi
p (tag) e
n
wra
pped by
an ante
nna
a
nd a
rea
d
e
r
. Data a
n
d
en
ergy tra
n
sfe
r
are provid
ed without
a
n
y
contact
b
e
twe
e
n
tag and re
ad
er. Nee
d
ing
very low am
ount of ener
gy, the tags gene
rate en
e
r
gy by benefi
t
in
g
from the m
a
gnetic
area
betwe
en the
south
an
d
nor
th
pole
s
in the ai
r. T
herefo
r
e, the
y
contin
uou
sly
spread th
e inf
o
rmatio
n on t
hem fro
m
a radio fre
que
ncy [1-3]. An an
tenna, in
som
e
ca
se
s mo
re
than o
ne a
n
tenna, i
s
n
e
e
ded fo
r d
e
te
cting th
e spread
radi
o fre
q
uen
cie
s
. Th
e
antenn
as receive the elect
r
oma
gneti
c
waves sent by
the rea
der a
n
d
activate the
circuits o
n
the
tag. The ta
g
modulate
d
th
e wave
s
and
se
nt them
b
a
ck to the
re
ader,
and
the
rea
der conv
erts
the new
wave
into digital data. A sample
RFID sy
stem
is sho
w
n in F
i
gure 1.
Figure 1. A sample RFID system
Basic F
eatures an
d Com
p
onent
s of the RFID Te
ch
no
logy
Variou
s software an
d ha
rd
ware are nee
ded for
setting up a RFI
D
system. The
s
e are:
1) Ha
rd
wa
re required for
RFID:
a) RFI
D
tag,
b) RFI
D
ante
nna,
c) RFID
read
er.
2) Softwa
r
e a
nd interfa
c
e
s
managi
ng
the
system (inte
r
layer software)
2.1.1. RFID T
a
g
RFID tag
s
a
r
e co
nsi
s
ted
of a microchi
p co
ntaining
identificatio
n data and
an
antenn
a
transmitting these data to
a rea
der
wirelessly.
Mod
u
lated an
d sent by the RFID re
ade
r, RF
sign
al is dete
c
ted via ante
nna
s of
the tags. Capa
cit
o
r in the ta
g receive
s
the coming
signal
and
cha
r
ge
s itself
. The circuits
in the mi
crochip are a
c
tiva
ted by chargi
ng [4].
RFID tag in t
he Figu
re 2 that is used in
t
he study is the dimen
s
io
n
s
of 98.2 x 12.3 mm.
Usi
ng the Hig
g
s-3 chi
p
, Alien is the mo
st prefer
red UHF RFI
D
tag in its family. EPC Cla
ss 1 G
e
n
2 / ISO 180
0
0
-6
C
comp
atible this inlay
has an
ope
rating licen
ce
in the 8
6
0-9
60 M
H
z
glob
al
band [5].
Figure 2. RFI
D
tag
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
RFID Pe
rson
nel Co
ntrol S
ystem
That Can Be Mana
g
ed Via 4.5G
(Abdülkadi
r Çakir)
398
2.1.2. RFID Antenn
a
RFID a
n
tenn
as receive th
e data in the
chip
on the t
ag with the
el
ectro
m
ag
neti
c
waves
they relea
s
e
as a
re
sult of
the refle
c
tion
occurr
in
g on t
h
e ante
nna
s
on the tag, a
nd they tran
smit
these d
a
ta to the reade
r in
the system [6]. Ther
e a
r
e
variou
s mod
e
l
s of antenn
a
s
with re
ga
rd
to
the rea
d
ing
method (li
n
e
a
r, ci
rcul
ar)
and readi
ng
area
s (rem
ote are
a
re
a
d
ing, nea
r a
r
ea
readi
ng
). Tab
l
e 1 sho
w
s the feature
s
of the RFI
D
ante
n
na in the Fig
u
re 3 u
s
ed in
the study [5].
Table 1. Feat
ure
s
of the RFID Antenna
RF Signal sprea
d
ing angle of the
antenna
40
o
Gain of the Ant
e
nna (dBi)
5.73 dBi
Dimension
22 x 27
x 4
(cm)
Operating Frequ
enc
y
902-928 M
H
z
Polarization Circular
Weight 0.57
kg
Figure 3. RFI
D
Antenna
Antenna
gain
is the
po
we
r co
ncentratio
n
du
ring
the
passin
g
of dif
f
usion
(radiati
on)
with
polari
z
atio
n o
v
er the
ante
nna
while
si
g
nal sendi
ng
power
of the
RFID re
ade
r is fixed.
Wh
ile
cal
c
ulatin
g the effective radiation po
wer of t
he RFID system, the powe
r
of the transmitte
r is
adde
d by the antenna g
a
i
n
and the po
wer lo
st in th
e
tran
smissio
n
line is subt
racte
d
from t
h
is
sum. It creat
es a
n
influe
n
c
e a
r
e
a
a
r
ou
nd itself
whil
e ra
diating
wi
th antenn
as.
For m
a
ki
ng t
he
RFID tag
wo
rking, it is
req
u
ired to
be in
this
ra
diation
pattern. Fig
u
r
e 4
sho
w
s th
e 3-D ra
diatio
n
pattern of the
antenna u
s
e
d
in the har
d
w
are pa
rt of the study [7-8]
.
Figure 4. Rad
i
ation pattern
of the RFID a
n
tenna
Figure 5 sho
w
s th
e mathe
m
atical m
ode
l of the relati
onship bet
we
en the RFID
antenn
a
manag
ed by the rea
d
e
r
an
d spreadi
ng
RF and the a
n
tenna o
n
the
tag [9].
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 396 –
408
399
Figure 5. Interactio
n of the antenn
as
of the RFI
D
tag and the re
ad
er
If the tag is i
n
the radiatio
n pattern of t
he read
er a
n
tenna i
n
the
F
i
gure
4, a vol
t
age is
indu
ced
from
the read
er
a
n
tenna
coil to the ta
g ant
enna
coil. Th
e voltage
ind
u
ce
d in
the
coil
cau
s
e
s
flo
w
o
f
the current f
r
om th
e
coil. Indu
ced volta
ge in th
e tag
antenn
a
coil
depe
nd
s on
the
cha
nge of the
magnetic
cu
rrent (
Ψ
) over time [10].
.
Ψ
VV
o
lt
(1)
N: Numb
er of
turn of the antenna
coil
Ψ
: Magn
etic flux in every turn
Magneti
c
flux (
Ψ
):
Ψ
=
∫
B
d
S
W
b
(w
eber) (
2
)
B: Magnetic
Area
S: Surface area of the coil
is cal
c
ulate
d
by the formula above. The
ma
ximum magneti
c
flux is obtained in the ca
se
that the read
er anten
na a
nd the tag ant
enna a
r
e pa
rallel.
Whe
n
the
re
ader a
n
tenna
and
the
tag
antenn
a a
r
e
parall
e
l, the
magneti
c
flux
pa
ssi
ng
from the tag
coil is at max
i
mum level. Maxi
mum re
ading di
stan
ce is re
ached
by the maximum
indu
ced volta
ge in the tag coil. The eq
uati
on 2 exp
r
esse
s the m
u
tual co
uplin
g betwe
en the
read
er an
d th
e tag
coils. A
s
the
tag
is p
a
ssive a
n
d
th
ere
will
be
no
flow of
cu
rre
nt from
the ta
g
coil out
side
of the rea
d
in
g are
a
, the equatio
n
3 can be
writte
n. The written equatio
n can
mathemati
c
al
ly model the voltage i
ndu
ced by the rea
der ante
nna [
11].
Ψ
.
2
⁄
.
2
⁄
(3)
N1: Num
b
e
r
of turn of the read
er a
n
ten
n
a
N2: Numb
er
of turn of the tag antenn
a
a: Radiu
s
of the rea
d
e
r
ant
enna
b: Radiu
s
of the tag anten
n
a
r: The dista
n
ce betwe
en th
e read
er a
nd
tag
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
RFID Pe
rson
nel Co
ntrol S
ystem
That Can Be Mana
g
ed Via 4.5G
(Abdülkadi
r Çakir)
400
.
.
2
⁄
(4)
a: Radiu
s
of the rea
d
e
r
coil
b: Radiu
s
of the tag coil
r: The dista
n
ce betwe
en th
e two coil
Tag coil voltage dep
end
s o
n
the mutual i
ndu
ctan
ce be
tween the t
w
o coil
s. The i
ndu
ced
voltage is de
crea
sed by r-3
in the tag coi
l
. T
he readi
ng
distan
ce is d
e
crea
sed
sim
ilarly.
The indu
ce
d voltage in the
tag coil.
V0=
2
π
fNS
Q
B0Cos
α
(5)
f: Frequen
cy of receive
d
si
gnal
N: Numb
er of
turn of the co
il in the cycle
S: Cycle are
a
in the m2
Q: Quality factor
B0: Area si
ze
of the receiv
ed sig
nal
α
: If the angle betwee
n
the tag and the reade
r is
α
=0,
the indu
ced v
o
ltage is at m
a
ximum.
Whe
n
the RFID
tag ante
nna coil rea
c
he
s
4V
pea
k to p
e
a
k
vo
ltage, the vo
ltage is
rectified
and
the devi
c
e
sta
r
ts to
o
perate
in the voltag
e of 2,4 V
DC. It is cal
c
ulat
ed is
cal
c
ul
ated
by the coil voltage for indu
cing the B magneti
c
ar
e
a
in the 4V peak to pea
k coil voltage in the
ISO 7810 sta
ndard ca
rd di
mensi
o
n
s
(9
8
.
2 x 12.3 x 0,76 mm).
V0=
2
π
fNS
Q
B0Cos
α
=4
(6)
Size of the tag coil: (98.2 x
12.3) mm2
Freq
uen
cy: 902 MHz
Numb
er of turn 4
Quality factor of the Tag Antenna
Coil: 40
The voltage o
f
the AC coil enabli
ng the
work
in
g of the tag: Peak to pea
k
4V
Magneti
c
are
a
cre
a
ted by the anten
na u
s
ed in the
stu
d
y for the Co
s
α
=1:
4
√
2
2
0
,0449
(7)
has b
een
cal
c
ulate
d
as
sh
own a
bove.
2.1.3. RFID Reader
As impo
rtant
as tag fo
r the in
stallatio
n
of
a succe
ssful
RFID
system, re
ceiv
es a
nd
interp
rets the
sig
nal
se
nt b
a
ck by
the
activat
ed tag by
se
ndin
g
the
digital info
rm
ation
cod
ed v
i
a
its antenn
as t
o
the tag in the form of radi
o wave [12].
Figure 6. The
RFID re
ade
r
use
d
in the system
Table 2 give
s the features
of the RFID reade
r in Figu
re 6 used in the hardware
part of
the s
t
udy [5].
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 396 –
408
401
Table 2. Feat
ure
s
of the RFID rea
der
Oper
ating Fr
equ
enc
y
902-928 M
H
z
Hopping channel
number
50
Channel Rang
e
500 KHz
Waiting time in the channel
< 0.4 sec
RF T
r
ansmitter
30 dBm at the en
d of the <6m LM
R-195 cable.
Modulation Meth
od
Phase reversal -
Amplitude Shift Ke
y
i
ng
20 dB Modulatio
n Band
w
i
dth
<400 KHz
RF Receiver
2 Channels
Power consumpti
on
45 Watts
Communication Interface
RS-232
(DB-9
F)
, TCPI / IP (
R
J-4
5
)
Input/Out
put Port
s
4 coaxial antenn
as, 4 inlet / 8 outlets (Optic insulated), RS-
232 com
connection point, LAN, po
w
e
r
Dimensions (L)
22.9 cm x 28 cm
x 5.6 cm
Weight
1.8 kg
Oper
ational Tem
peratur
e
0 ° C and +5
0 °
C
LEDs
Power, Link, Active, Antenna 0-3,
Processor, Readi
ng, Failure (
R
ed)
Compliance Certi
f
icates
FCC Section:15;
FCCID: P
65ALR
9800
EPCglobal Code
GSRN 9
5011012
600000015
5
Securit
y
Cer
t
ificates
cTUVus, UL: 609
50-1:3004
, CAN/
CSA: C22.2 No
.6
0950-1
-
03
RFID
read
ers unde
rtake two tasks in the sy
ste
m
. Their p
r
ima
r
y and p
r
ivilege
d functio
n
is a
c
tivating t
he tag
s
i
n
the
i
r
control a
r
e
a
via thei
r
ant
enna
s
and
ob
taining th
e inf
o
rmatio
n o
n
t
he
tags. Thei
r
se
con
d
fun
c
tion
is creatin
g a
n
inte
rfa
c
e b
e
tween th
e sy
stem
s that co
llects, a
nalyses
and di
strib
u
te
s the d
a
ta in
a big a
m
ount
created
by
the tag
s
a
c
tivated in the
area in
whi
c
h t
here
are tags
[13].
3. Mobile Cellular Communication S
y
s
t
ems
Mobile com
m
unication systems sta
r
t
ed to develo
p
in the beg
inning
s of the 1980'
s.
Firstly first g
eneration a
n
a
log
comm
u
n
icatio
n sy
stems we
re started
to
b
e
use
d
,
and se
con
d
gene
ration
di
gital commu
n
i
cation
sy
ste
m
s
we
re
start
ed to
be
use
d
in th
e be
gi
nning
s
of 199
0's.
In the 2000
's,
the third ge
n
e
ration
bro
a
d
band
comm
u
n
icatio
n syste
m
s were sta
r
ted to be u
s
e
d
in the develo
ped countri
es and no
w
it has re
ached m
any use
r
s [14
]
.
Third
ge
neration
comm
unication
sy
stem i
s
the
gen
eri
c
n
a
m
e of the
cell
ular
comm
uni
cati
on stand
ards and techn
o
l
ogy desig
ne
d for providi
ng the mobil
e
terminal
s like
mobile ph
one
s and
sma
r
tp
hone
s with
service
s
requi
ring high
spe
e
d
and b
r
oad
band
width such
as hig
h
sp
ee
d internet
co
nne
ction, se
n
d
ing of mo
vin
g
pictu
r
e
s
in the fixed network
quality su
ch
as ISDN and
DSL [15].
The spee
d in
the fourth ge
neratio
n mobi
le
cellul
a
r
co
mmuni
cation
system i
s
10
0 Mbp
s
and it is 1Gb
p
s in the wi-fi
netwo
rks. A
4.5 G system
provide
s
end
to end IP solution in orde
r to
providin
g u
s
e
r
s with
the
so
und, d
a
ta a
n
d
contin
u
o
u
s
multiple m
a
ss
comm
uni
ca
tion by e
nabli
n
g
highe
r data speed tha
n
the
previou
s
gen
eration
s
(su
c
h as 3G, 2G
etc.).
In this study, we be
nefited
from the 4.5 G mobile cell
ular commu
ni
cation
system
.
4. Results
In this study, the system i
s
con
s
i
s
ted of both softw
are
and hardware.
Structu
r
e of the Ha
rd
wa
re
In this study, the use
d
hard
w
are is
cons
is
ted of five main c
o
mponents
.
Hardware (Fi
gure 7
)
;
UHF RFID
T
a
g
UHF RFID
A
n
tenna
UHF RFID Reade
r
Mobile Modem
PC.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
RFID Pe
rson
nel Co
ntrol S
ystem
That Can Be Mana
g
ed Via 4.5G
(Abdülkadi
r Çakir)
402
Figure 7. Hardwa
re pa
rt of the web
-
ba
se
d RFID p
e
rso
nnel monito
ri
ng syste
m
The RFID te
chn
o
logy
can
operate at
differ
ent fre
q
uen
cie
s
. In this
study, UHF
RFID
techn
o
logy h
a
s be
en use
d
in the syst
em in ac
co
rdan
ce with t
he enviro
n
m
ent in which
th
e
system
will be installe
d an
d the readi
ng
distan
ce. Op
erating frequ
ency is b
e
tween 90
2.75
MHz
– 927.25 M
H
z [5].
We u
s
e p
e
rsonnel
ca
rd
s h
a
ving UHD
RFID tag in
thi
s
study fo
r id
entifying the person
nel
and e
n
suri
ng
their
co
ntrol
(Fig
ure
8).
That pe
rsonn
el carry their ca
rd i
s
e
n
o
ugh fo
r ma
ki
ng
identificatio
n and en
su
ring
their co
ntrol [
16].
Figure 8. The
diagra
m
of the web b
a
s
ed
RFID p
e
rson
nel monito
rin
g
system
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 396 –
408
403
In the study, the RFID te
chnolo
g
y is u
s
ed and
th
e ot
her
comp
one
n
ts of the sy
stem are
placed to the
area i
n
which the pe
rson
nel are
de
sired to be
co
ntrolled. T
h
e
s
e
are
UHF RF
ID
antenn
a and
UHF
RFI
D
read
er [1
7]. UHF
RFI
D
a
n
tenna
ca
n
control whet
her the
r
e i
s
an
employee
hol
ding a
p
e
rson
nel ca
rd with UHF
RFID
ta
g
o
r
n
o
t
by UHF sig
n
al at certai
n
inte
rv
als
in the area to
which it is position
ed. Wh
en an
empl
oyee that carrie
s the perso
n
nel ca
rd com
e
s
into the a
r
ea,
the tag i
n
th
e pe
rsonn
el card
det
e
c
ts t
he si
gnal
emi
tted by the a
n
tenna, a
c
tivates
itself and tra
n
smits the id
entific
ation
si
gnal to the antenn
a.
The
antenna d
e
tects the
sign
al
contai
ning th
is re
spo
n
siv
e
identifying
information
and se
nd
s it to the UHF RFI
D
re
ader.
Therefore, th
e antenn
a co
mpletes its ta
sk
(Figu
r
e 9
)
.
Figure 9. Tasks of RFID an
tenna in the o
peratio
n
The a
n
tenn
a
trie
s to
dete
c
t the
existe
nce
of oth
e
r
sign
als comi
ng a
s
re
spo
n
s
e to
the
sign
al it sent
via UHF
sign
als to the a
r
e
a
whe
r
e
it is
placed. Antenna cann
ot id
entify whose
is
the sig
nal, in
other
wo
rd
s t
he ID i
n
form
a
t
ion. It can le
arn
whi
c
h I
D
t
h
e tag
hold th
e co
ming
sig
n
al
belon
gs via
reade
r. The
re
ader i
n
terpret
s
the
info
rmat
ion coming f
r
om the ante
n
na an
d ena
bl
es
us to
re
ach th
e ID i
n
form
ation in t
he
sign
al. After
that,
the re
ade
r
tra
n
sfers thi
s
I
D
inform
ation t
o
the PC mana
ging the sy
stem by using
mobile cellula
r com
m
uni
cat
i
on tech
nolo
g
y
(Figure 1
0
).
Figure 10. Ta
sk of the RFID rea
d
e
r
and
mobile mo
de
m in operatio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
IJEECS
ISSN:
2502-4
752
RFID Pe
rson
nel Co
ntrol S
ystem
That Can Be Mana
g
ed Via 4.5G
(Abdülkadi
r Çakir)
404
The softwa
r
e
develope
d for ma
nagin
g
the RFID
system is op
erat
ed in the P
C
. Sent to
the soft
ware i
n
the PC fro
m
the read
er,
the ID in
fo
rm
ation is tran
sf
erred by
usi
n
g mobil
e
cell
ular
comm
uni
cat
i
on sy
st
e
m
.
ID informatio
n of the personnel is o
b
ta
ined via UHF RFID Tag,
antenna an
d read
er
use
d
in th
e
system, a
nd
the ha
rd
ware
in the
ope
ra
tion do th
eir
tasks
by the
tran
sfer of t
h
e
informatio
n to the softwa
r
e
in the PC via mobile mo
de
m.
The s
o
ft
ware us
ed in this
s
t
udy is
principally consist
e
d
of 3 interface
s
.
These interfa
c
e
s
are:
Personn
el co
ntrol monito
r
Personn
el re
gistratio
n
mo
nitor
Personn
el time control mon
i
tor.
Personn
el control m
onit
o
r
con
s
titute
s the
m
o
st
importa
nt p
a
rt of the d
e
velope
d
s
o
ftware. It is
the interfac
e in whic
h the c
o
mmu
nicati
on is ena
ble
d
via UHF RFID Rea
d
e
r
and
UHF
RFID
system is ma
na
ged (Fi
gure 1
1
).
In the interfa
c
e sh
own i
n
th
e Figu
re 11, t
here
are
buttons i
n
the nu
mber
one bl
u
e
frame
for enabli
ng the control of the sy
stem by the user. In
this se
ction, there are six button
s
.
Information
scre
en i
s
the
area
in
whi
c
h
instant
inf
o
rmation i
s
giv
en ab
out the
done
pro
c
e
sses.
"CONNE
CT"
button en
ab
les -i
n eve
r
ywhe
re
- the
conne
ction to
the UHF
RFID sy
stem
with
mobile
cell
ul
ar
com
m
uni
cation te
chn
o
l
ogy. Co
mmu
nicatio
n
i
s
d
o
ne by
TELNET co
nne
ctio
n to
the read
er. T
E
LNET is the
name of the prog
ram
s
dev
elope
d for co
nne
cting to a remote ma
chi
n
e
via internet
and u
s
ed fo
r setting up
a TCP/IP
protocol a
nd conne
cti
on. T
he program
ming
stru
cture use
d
in these d
e
v
eloped p
r
og
rams
a
r
e calle
d so
cket prog
rammin
g
[18].
In this study, we ma
ke co
n
nectio
n
to t
he system and
manag
e it via
socket pro
g
ramming
and
we
u
s
e S
Q
L d
a
taba
se
managi
ng
sy
stem fo
r
kee
p
i
ng the
re
co
rd of the
pe
rsonnel. Fi
gu
re
12
sho
w
s the da
tabase de
sig
ned in the S
Q
L datab
as
e managi
ng sy
stem for
kee
p
ing the reco
rd of
the person
nel
information.
Figure 11. Ob
jects u
s
e
d
in t
he perso
nnel
control interfa
c
e.
Figure 12. Di
agra
m
of the tables
cre
a
te
d in the datab
ase
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 25
02-4
752
IJEECS
Vol.
2, No. 2, May 2016 : 396 –
408
405
Personal inf
o
rmatio
n of the perso
nn
el and
the t
ag informatio
n assign
ed t
o
these
person
nel a
r
e kept in the
"person
s
" table in t
he da
tabase. In the "Ent
rance/Exit" table,
the
informatio
n of "entran
c
e/exi
t
" time information is kept reco
rde
d
.
If the "SAVE" button in the person
nel co
ntro
l i
n
terface is clicked, the personnel
recording inte
rface in the Fi
gure 1
3
is op
ened a
nd
the
informatio
n of the personn
e
l
is recorded.
Figure 13. Ob
jects in the p
e
rsonn
el re
gistration m
o
nit
o
r
"READ TAG"
button h
a
s b
een p
r
o
g
ra
m
m
ed in
the p
e
r
so
nnel
control interfa
c
e
fo
r testin
g
the UHF RFI
D
syste
m
. After pre
ssi
ng
this bu
tton, the antenna
is activated
by establish
i
ng
TELNET con
nectio
n
with the rea
der a
n
d
it is test
ed wheth
e
r there
is a tag in the surro
undin
g
s
or
not. If any ta
g is detecte
d
by the antenna, ID inform
ation of the tag is sh
own to the use
r
in the
area
sho
w
n b
y
two digits in the perso
nne
l control in
te
rface. ID information
of the tag detected
by
the Antenn
a
0 is li
sted i
n
li
stBox1 in the
gro
upb
ox na
med "Anten
n
a
0", ID info
rmation of the
tag
detecte
d by the Antenna 1
is listed in list Box 2
in the
grou
pbox na
med "Antenn
a 1" (Figu
r
e 1
4
.).
Figure 14. Ta
g readi
ng p
r
o
c
e
s
s
Personn
el co
ntrol process is don
e by the
button in
the person
n
e
l cont
rol int
e
rface
named
"STA
RT". Fig
u
re
15
sho
w
s the
algo
rithm
de
sign
ed fo
r
en
suri
ng
the
pe
rso
nnel
control.
This
algo
rith
m is
ope
rate
d until the
bu
tton name
d
"
F
INISH" in th
e pe
rsonn
e
l
control i
n
terfa
c
e is
Evaluation Warning : The document was created with Spire.PDF for Python.