An Investigation of the Usage of IOT for Scholar Safety and Attendance Tracking in Schools

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2018 by IJPTT Journal
Volume-8 Issue-5
Year of Publication : 2018
Authors : Dr.I.Lakshmi


MLA Style: Dr.I.Lakshmi "An Investigation of the Usage of IOT for Scholar Safety and Attendance Tracking in Schools" International Journal of P2P Network Trends and Technology 8.5 (2018): 9-16.

APA Style:Dr.I.Lakshmi, (2018). An Investigation of the Usage of IOT for Scholar Safety and Attendance Tracking in Schools. International Journal of P2P Network Trends and Technology, 8(5), 9-16.


In India, many pupil abduction cases are stated due to the lack of safety mechanisms and the dearth of law enforcement. Educational institutions including primary faculties are searching out a higher mechanism to screen the pupil attendance in order that the safety of the students may be better monitored. Presently, student attendance in schools is achieved in a conventional manner where the academics will manually take a look at and report the attendance of students in their magnificence. But, this traditional technique has many drawbacks together with it is able to only be taken at positive time c program language period and consequently cannot screen students in actual time. The principle intention of this look at is to analyze the viability of the use of internet of things (IoT) approach to monitor student attendance and their presence in the school compound in real time so that it will make sure their safety. A quantitative information series the usage of questionnaire with 113 working group of workers from number one colleges became performed to perceive the modern challenges of pupil tracking and the viability of the use of iot to deal with those demanding situations. The outcomes of the questionnaire evaluation display that using iot should enhance the safety surroundings of number one colleges by way of being capable of screen scholar attendance as it should be in real time.


[1] Copson, Raymond W. The India War: Background and Issues. Nova Publishers, 2003.
[2] Thompson, Alexander. Channels of power: The UN Security Council and US statecraft in India. Cornell University Press, 2015.
[3] UN.Children and armed conflict Report of the Secretary-General. Report by United Nations. General Assembly Security Council. (2015) A/69/926*–S/2015/409*.
[4] Xiaocong, Qian, and Zhang Jidong. "Study on the structure of ?Internet of Things (IOT)? business operation support platform." In Communication Technology (ICCT), 2010 12th IEEE International Conference on, pp. 1068-1071. IEEE, 2010.
[5] Zhu, Qian, Ruicong Wang, Qi Chen, Yan Liu, and Weijun Qin. "Iot gateway: Bridgingwireless sensor networks into internet of things." In Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, pp. 347-352. IEEE, 2010.
[6] Berghella, L., A. Depari, P. Ferrari, A. Flammini, Stefano Rinaldi, Emiliano Sisinni, and A. Vezzoli. "Low-power wireless interface for handheld smart metering devices." In Sensors Applications Symposium (SAS),2014 IEEE, pp. 317-322. IEEE, 2014.
[7] Ashton, Kevin. "That ?internet of things‘ thing." RFiD Journal 22, no. 7 (2009): 97-114.
[8] Manches, Andrew, Pauline Duncan, Lydia Plowman, and Shari Sabeti. "Three questions about the Internet of things and children." TechTrends 59, no. 1 (2015): 76- 83.
[9] Michael, Katina, and Luke McCathie. "The pros and cons of RFID in supply chain management." In Mobile Business, 2005. ICMB 2005. International Conference on, pp. 623-629. IEEE, 2005.
[10] Barker, Leon, Martin White, Mairead Curran, Zeeshan Patoli, Benji Huggins, Tudor Pascu, and Natalia Beloff. "Taxonomy for Internet of Things-Tools for Monitoring Personal Effects." In PECCS, pp. 67-71. 2014.
[11] Nahrstedt, Klara. "Internet of mobile things: challenges and opportunities." InProceedings of the 23rd international conference on Parallel architectures and compilation, pp. 1- 2. ACM, 2014.
[12] Want, Roy. "Enabling ubiquitous sensing with RFID." Computer 37, no. 4 (2004): 84-86.
[13] Anastasi, Giuseppe, Eleonora Borgia, Marco Conti, and Enrico Gregori. "A hybrid adaptive protocol for reliable data delivery in WSNs with multiple mobile sinks." The Computer Journal 54, no. 2 (2011): 213-229.
[14] Pretz, Kathy. "The next evolution of the internet." IEEE Magazine The institute50, no.5 (2013).
[15] Hodge, Victoria J., Simon O`Keefe, Michael Weeks, and Anthony Moulds. "Wireless sensor networks for condition monitoring in the railway industry: A survey." (2014).
[16] Welbourne, Evan, Leilani Battle, Gregory Cole, Kyle Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, and Gaetano Borriello. "Building the internet of things using RFID: the RFID ecosystem experience." Internet Computing, IEEE 13, no. 3 (2009): 48-55.
[17] Pursula, Pekka, Nadine Pesonen, Ilkka Marttila, Jian Song, and Ville Viikari. "Achieving long reading ranges with passive wireless intermodulation sensors." In RFID Technology and Applications Conference (RFID-TA), 2014 IEEE, pp. 131-134. IEEE, 2014.
[18] Sung, Wen-Tsai, and Ming-Han Tsai. "Data fusion of multi-sensor for IOT precise measurement based on improved PSO algorithms." Computers & Mathematics with Applications 64, no. 5 (2012): 1450-1461.
[19] Rohokale, Vandana Milind, Neeli Rashmi Prasad, and Ramjee Prasad. "A cooperative Internet of Things (IoT) for rural healthcare monitoring and control." In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, pp. 1-6. IEEE, 2011.
[20] Agrawal, Sarita, and Manik Lal Das. "Internet of Things - A paradigm shift of future Internet applications." In Engineering (NUiCONE),2011 Nirma University International Conference on, pp.1-7.
[21] Al-Turjman, Fadi M., Ashraf E. Al-Fagih, Waleed M. Alsalih, and Hossam S. Hassanein. "A delay-tolerant framework for integrated RSNs in IoT." Computer Communications 36, no. 9 (2013): 998-1010.
[22] Waters, E. (2002). The Goodness of Attachment Assessment: There Is A Gold Standard But It Isn`t As Simple As That. Retrieved October 22, 2013,
[23] Glenn, I." Determining Sample Size". Online Google Books. (2013).
[24] Bernstein, Ira H., and J. C. Nunnally. "Psychometric theory." New York: McGraw- Hill. Oliva, TA, Oliver, RL, & MacMillan, IC (1992). A catastrophe model for developing service satisfaction strategies. Journal of Marketing 56 (1994): 83-95.
[25] Qawasmeh, Farid M., and Ziad S. Al-Omari. "The Learning Organization Dimensions and Their Impact on Organizational Performance: Orange Jordan as a Case Study." Arab Economic and Business Journal 8, no. 1 (2013): 38-52.
[26] Cohen, P. "Applied multiple regression / correlation analysis for the behavioral sciences. Hillsdale." (2003).
[27] Ashida, N., Y. Ashida, S. Sagawa, S. Suto, T. Higashi, K. Makimoto, and T. Kawahara.
[28] "Safety Management and Crime Prevention by IC Tags–Cases of practical use of IC tag in medical and welfare fields–." APAMI 2006 (2006): 858.
[29] Carver, Alison, Anna Timperio, and David Crawford. "Playing it safe: The influence of neighborhood safety on children`s physical activity—A review." Health & place 14, no. 2 (2008): 217-227.
[30] Kitzinger, Jenny, and Paula Skidmore. "Playing safe: Media coverage of child sexual abuse prevention strategies." Child Abuse Review 4.1 (1995): 47-56.
[31] Zainudin, Nur Dalila. "Students` perception on the implementation of Radio Frequency Identification (RFID) tag to secondary school students." (2007).

IoT, Primary Schools, Students, Attendance Monitoring, Sa