• Design And Implementation Of An Attendance System Using Fingerprint Scanner

  • CHAPTER TWO -- [Total Page(s) 4]

    Page 1 of 4

    1 2 3 4    Next
    • CHAPTER TWO LITERATURE REVIEW
      Alphonse Bertillon, a French police officer who applied anthological techniques in law enforcement more than a century ago, brought his idea of using body parts in his quest to solve all crimes. Since then, extensive research into many biometric recognition methods have been brought to light because of the increasing crime rate in the world. Soon, many security agencies developed biometric matching techniques for crime check.
      Many studies that went into biometric studies were mainly because of authentication because it proved invaluable in checking the crime rate. However, advances in biometric study showed biometrics can be used for validation as well. This section of the study analyses existing theoretical contributions and findings with respect to the biometrics with special focus on fingerprint biometrics. This will help us get a better idea as to the approach chosen to deal with the problem identified.
      2.1    Review of Biometric Identification Systems
      A biometric identification system is a pattern matching system used in determining physical or behavioural characteristics of a unique individual. Biometric systems are used primarily for two reasons: Authentication and Validation.
      Authentication is the verification of a person’s identity by cross checking previously captured biometric information of that person to determine a true identity.
      Validation is the identification of a person by searching a registered database for a match.
      A physical or behavioural characteristic can be used as a biometric identifier if it meets the following requirements:
      1.    Distinctiveness: The biometric identifier should be unique
      2.    Universality: Each person should have the said biometric identifier
      3.    Permanence: The biometric identifier should be same over a period of time
      2.1.1    Commonly Used Biometric Identifiers
      This section discusses some of the commonly used biometric identifiers used in biometric systems.
      1.    Ear: The structure and shape of the ear and the pinna’s cartilaginous tissue are distinctive. While all features in the ear structure are not exclusively distinct, the distance of points on the pinna which are always distinct make this a biometric identifier.
      2.    Face: Facial features are largely distinct thus making this feature a very acceptable biometric feature. However, one disadvantage is facial disguise in automated unattended biometric applications.
      3.    Deoxyribonucleic Acid (DNA): This is a unique code for an individual’s uniqueness. One disadvantage of this is identical twins have very similar DNA prints but this is still a very widely used biometric identifier.
      4.    Retinal scan: Each individual’s eye has a unique retinal vasculature and very difficult to duplicate. Therefore, this is arguably one of the most secure biometric identifiers.
      5.    Fingerprints: These are friction ridges of human fingers largely used in biometrics for law enforcements because they can easily be deposited on surfaces. This study focuses on this biometric identifier and will be discussed extensively.

  • CHAPTER TWO -- [Total Page(s) 4]

    Page 1 of 4

    1 2 3 4    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTThis research work, Design and Implementation of an Attendance System using fingerprint scanner, focuses on computerizing and managing the attendance of students during lecture or event periods. This is very imperative as the cons of the traditional pen to paper attendance system far outweigh the pros as management of student attendance has become a hassle due to increasing number of students during various lecture periods. This study would discuss in detail, how the inconveniences posed ... Continue reading---

         

      LIST OF TABLES - [ Total Page(s): 1 ]LIST OF TABLETable 2.1    Comparison of biometric identifiers    Table 3.1    Data Dictionary    Table 4.1 Hardware RequirementsTable 4.2 Software Requirements ... Continue reading---

         

      LIST OF FIGURES - [ Total Page(s): 1 ]LIST OF FIGURESFigure 2.1    Estimated Biometric Market Report Revenue in 2012 (International Biometric Group)    Figure 2.2    Live Scan Optical Fingerprint impression      Figure 2.3    Live Scan Capacitive Fingerprint impression        Figure 2.4    Live Scan Ultrasonic Fingerprint impression        Figure 2.5    System Architecture for Time Clock Biometric System    Figure 3.1    uc Fingerprint Attendance Management System Use Case Diagram Figure 3.2 ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTSTITLE PAGE i CERTIFICATION   DEDICATION    ACKNOWLEDGMENT    ABSTRACT    TABLE OF CONTENTS    LIST OF FIGURES    LIST OF TABLES    CHAPTER ONE: INTRODUCTION11.0    Background of the study    1.1    Statement of the Problem    1.2    Objective of the Study 1.3    Significance of the Study    1.4    Scope of the Study    1.5    Limitations    1.6    Organization of the Study    1.7    Definitions of Terms    CHAPTER ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE INTRODUCTIONBiometric fingerprint is technology that makes use of the distinctive fingerprint characteristic in recognizing various identities. The fingerprint configuration does not change throughout an individual’s life because it is a unique representation of an identity thus making the biometric fingerprint system invaluable in many applications in life such as validation and authentication.The biometric fingerprint technology has been extensively used for authentication b ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 9 ]3.8    Entity Relationship Diagram (Database)This section contains the diagrammatic representation of the entities in the database and their relationships. ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 3 ]4.5    System Test-RunIn this stage, the software is tested for bugs and correctness. There are various ways the system was tested.a.    Unit Testing – This is the testing of the smallest running program in the system. This is to ensure that a section works a certain way before implementing other units. The fingerprint attendance management system was implemented module by module. Each module was tested before implementing another module.b.    Integration Testing – This is ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION AND RECOMMENDATION5.1    Summary49This research work, Design and Implementation of an Attendance System Using Fingerprint Scanner, was carried to find an adequate and efficient substitute to the current manual system of attendance carried out in City University. The current manual system was proven to be loop holed in many aspects and therefore a system analysis needed to be carried out. This research work came up with a computerized fingerprint attendance mana ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]REFERENCESCappelli, R., Lumini, A., Maio, D. and Maltoni, D. (2007). Fingerprint Image Reconstruction from Standard Templates, IEEE Transactions, vol. 29, pp.1489-1503.Chitresh Saraswat, Amit Kumar, “An efficient automatic attendance system using fingerprint verification technique”, International Journal on Computer Science and Engineering, vol. 02, No. 02, pp. 264-269, 2010.D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003F. ... Continue reading---