• Title/Summary/Keyword: Electronic Attendance System

Search Result 27, Processing Time 0.021 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

Implementation of Mobile Authentication System for Context-Awareness based on Near Field Communication (근거리 통신 기반의 상황 인식을 위한 모바일 인증 시스템의 구현)

  • Park, Hung-Bog;Seo, Jung-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.39-46
    • /
    • 2017
  • Today, mobile devices are becoming essential for everyday life, and integration of mobile computing, situation recognition and intellectual service accelerates mobile interaction. Surrounding intelligence detection technology is extremely important. These technologies can automatically acquire and recognize surrounding information and situations. Situation recognition can realize wide-range mobile recognition for intellectual services of users' diverse activities, by distinguishing many surrounding devices and recognizing their situations. Thus, this paper suggests application for students' mobile authentication such as college campus attendance authentication, and redesign existing plastic student ID as NFC-compatible mobile authentication system. Experiment results proved NFC-compatible mobile touch-based interactions can maximize the strengths of NFC technology because it can recognize limits in some situations such as tardiness and absences by automating student validation and preventing far-distance reading.

Design and Implementation of Web-Based Cyber-University System (웹-기반 가상대학 시스템의 설계 및 구현)

  • Lee, Sei-Young;Yong, Hwan-Seung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3577-3588
    • /
    • 1999
  • This paper describes design and implementation of a general purpose cyber educational system. In this system, there are different types of menus and services according to such user's rights as system operators, professors, assistant instructors, students. In order to keep in close contact between students and professors, provided are various services such as the official announcement, transcripts of lecture, bulletin board, Q/A corner, report box, archive of study materials, electronic mail box, memorandum including checking of one's attendance and school record. For the purpose of activating small group studies and discussion about given subject, it can organize into groups automatically and provide with debating rooms. The system is implemented by separating with both HTML design and programming part by templete concept. Overload of iterative server is solved by adjusting the numbers of DB servers of each service.

  • PDF

Study on Blockchain Based University Public Records Management Service (블록체인 기반 대학 공공기록물 관리 서비스 설계 연구)

  • Hong, Gi Wan;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.79-91
    • /
    • 2021
  • The public records of universities shall be classified according to the Enforcement Decree of the Public Records Act and public records management activities shall be carried out accordingly. Among various kinds of public records of the university, the records of performance management are still managed as paper documents, such as attendance books, answer sheets, and assignments, and the management system and methods of each school are different, making it difficult for the management manager to manage them. In this paper, we propose a service model that can perform blockchain-based records management of records related to performance at universities currently kept in paper documents. The proposed service is expected to reduce resource consumption, such as the cost, time and effort spent on storing and managing paper documents.

Deleterious Effects of Shift Work in the Realm of Cognitive and Behavioral Domains : A Critical Review (인지 및 행동영역에서 교대 근무의 유해적인 영향 : 비판적 고찰)

  • Lee, Suji L.;Park, Chang-hyun;Ha, Eunji;Park, Shinwon;Hong, Haejin;Park, Su Hyun;Ma, Jiyoung;Kang, Ilhyang;Kang, Hahn;Song, William Byunghoon;Kim, Jungyoon;Kim, Jieun E.
    • Korean Journal of Biological Psychiatry
    • /
    • v.24 no.2
    • /
    • pp.59-67
    • /
    • 2017
  • Shift workers experience a disruption in the circadian sleep-wake rhythm, which brings upon adverse health effects such as fatigue, insomnia and decreased sleep quality. Moreover, shift work has deleterious effects on both work productivity and safety. In this review, we present a brief overview of the current literature on the consequences of shift work, especially focusing on attention-associated cognitive decline and related behavioral changes. We searched two electronic databases, PubMed and RISS, using key search terms related to cognitive domains, deleterious effects, and shift work. Twenty studies were eligible for the final review. The consequences of shift work can be classified into the following three categories extracted from the literature review : 1) work accidents ; 2) commuting accidents such as car accidents that occur on the way to and from work ; and 3) attendance management at work (i.e., absenteeism, tardiness, and unscheduled early departure). These cognitive and behavioral consequences of shift work were also found to be associated with sleep disorders in shift workers. Thus, improvements in the shift work system are necessary in order to enhance workers' health conditions, work productivity, and safety.

A Study on the Violation of Probation Condition Determinants between Sex Offenders and Non-Sex Offenders (성범죄자와 일반범죄자의 보호관찰 경고장 관련 요인 비교)

  • Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.205-230
    • /
    • 2015
  • This study aims to compare the differences of crucial factors that are associated with probation warning tickets between sex offenders and non-sex offenders in South Korea. Serious high-profile cases have occurred in recent years which resulted in public and political conners for successful sex offender management and monitoring strategy through community corrections. The official response has been to initiate a series of legislative probation and parole measures by using GPS electronic monitoring system, chemical castration, and sex offender registry and notification. In this context, the current study is designed to explore the major factors that could affect the failure of probation by comparing the differences between sex offenders and non-sex offenders in terms of their major factors which are related to the failure of probation. The failure of probation is measured by the number of warning tickets which would be issued when there is the violation of probation conditions. The data is obtained from Seoul Probation office from January, 29, 2014 to February, 28, 2014. The sample number of sex offenders is 144 and the number of non-sex offenders is 1,460. The data includes the information regarding the offenders who completed their probation order after they were assigned to Seoul Probation in 2013. Furthermore, this study uses the chi-square and logistic regression analysis by using SPSS statistical package program. The result demonstrated that only prior criminal history was statistically significant factor that was related to the number of warning tickets in the sex offender group when other variables were controlled($X^2=25.15$, p<0.05, Nagelkerke $R^2=0.23$)(b=0.19, SE=0.08, p<0.05). By contrast, there were various factors that were associated with the number of warning tickets in non-sex offender group. Specifically, the logistic regression analysis for the non-sex offenders showed that demographic variable(marital status and employment type), offender-victim relationships, alcohol addiction, violent behavior, prior criminal history, community service order, and attendance order were statistically significant factors that were associated with the odds of warning tickets. Further policy implication will be discussed.

  • PDF