• Design And Implementation Of An Attendance System Using Fingerprint Scanner

  • CHAPTER TWO -- [Total Page(s) 4]

    Page 3 of 4

    Previous   1 2 3 4    Next
    • 2.    Capacitance: This type of sensor acts in a parallel state with one parallel plate acting as the electrically conductive layer and the other plate acting as the non-conductive layer (Setlak, 2005).

      3.    Ultrasonic: This sensor uses a high frequency sound wave to penetrate the fingertip skin. The measurements from such penetration results in the fingerprint image. (Majid and Saeed, 2005).

      Good fingerprint imaging comprises of two main properties:
      a.    Salient: This means the fingerprint image should be distinct.
      b.    Sustainable: This means the fingerprint image should be useful for matching.
      2.5    Fingerprint Matching
      Fingerprint matching is the process taken to find the similarity between two fingerprint imprints. Various matching algorithms depend on which type of fingerprint acquisition technique used. In this section, we will review some common fingerprint matching algorithms.
      1.    Minutia Based Method: This is a widely used method of pattern matching where very precise details on the fingerprint are chosen and matched in other to determine a correlation (Cappelli et al., 2001).
      2.    Correlation Based Method: In this method, the two fingerprints in question are properly aligned and correlation is digitally checked for. This is done by checking for displacements in the fingerprints checked (N. K. Ratha, 1996).
      3.    Ridge Feature Based Method: In this method, the fingerprint ridges are used to form a finger code. This finger code is unique and so pattern matching happens when two finger codes are compared.
      2.6    Existing Approaches to the Problem Identified and Challenges
      In order to better appreciate the existing approaches to the problems faced, below are some problems faced by the current system.
      1.    In the current system of writing names, time and date, the attendance data is not secure because one student can write for another, who may or may not be in attendance.
      2.    Handwritten attendance records can render information useless due to legibility issues. Times, dates, and names can be incorrectly written or read which can cause problems when making use of the attendance records.
      3.    Physical attendance registers can be lost, or damaged in some way or another, or even stolen. This makes it impossible to access those records for future use.
      4.    Once information has been recorded within a set of bulky paper records, it may not be readily accessible later. It is also very difficult and time consuming to search for and locate a particular record or entry within a set of paper records.
      5.    The integrity of such attendance records cannot be spoken for since the method of collection is not universally unique.
      The following are existing techniques used to try and solve problems identified and challenges they faced:
      1.    Attendance System using Visual Basic (University of Khartoum, 2009): An application was designed to help record attendance for university students. This application required an operator to compare student’s ID cards with the present students. Once determined, the operator ticks present or absent.
      Challenge –While this provides secure storage for data collected from attendance, an operator is required to be present before this system works. Absence of the operator means attendance records will be halted.

  • CHAPTER TWO -- [Total Page(s) 4]

    Page 3 of 4

    Previous   1 2 3 4    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTThis research work, Design and Implementation of an Attendance System using fingerprint scanner, focuses on computerizing and managing the attendance of students during lecture or event periods. This is very imperative as the cons of the traditional pen to paper attendance system far outweigh the pros as management of student attendance has become a hassle due to increasing number of students during various lecture periods. This study would discuss in detail, how the inconveniences posed ... Continue reading---

         

      LIST OF TABLES - [ Total Page(s): 1 ]LIST OF TABLETable 2.1    Comparison of biometric identifiers    Table 3.1    Data Dictionary    Table 4.1 Hardware RequirementsTable 4.2 Software Requirements ... Continue reading---

         

      LIST OF FIGURES - [ Total Page(s): 1 ]LIST OF FIGURESFigure 2.1    Estimated Biometric Market Report Revenue in 2012 (International Biometric Group)    Figure 2.2    Live Scan Optical Fingerprint impression      Figure 2.3    Live Scan Capacitive Fingerprint impression        Figure 2.4    Live Scan Ultrasonic Fingerprint impression        Figure 2.5    System Architecture for Time Clock Biometric System    Figure 3.1    uc Fingerprint Attendance Management System Use Case Diagram Figure 3.2 ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTSTITLE PAGE i CERTIFICATION   DEDICATION    ACKNOWLEDGMENT    ABSTRACT    TABLE OF CONTENTS    LIST OF FIGURES    LIST OF TABLES    CHAPTER ONE: INTRODUCTION11.0    Background of the study    1.1    Statement of the Problem    1.2    Objective of the Study 1.3    Significance of the Study    1.4    Scope of the Study    1.5    Limitations    1.6    Organization of the Study    1.7    Definitions of Terms    CHAPTER ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE INTRODUCTIONBiometric fingerprint is technology that makes use of the distinctive fingerprint characteristic in recognizing various identities. The fingerprint configuration does not change throughout an individual’s life because it is a unique representation of an identity thus making the biometric fingerprint system invaluable in many applications in life such as validation and authentication.The biometric fingerprint technology has been extensively used for authentication b ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 9 ]3.8    Entity Relationship Diagram (Database)This section contains the diagrammatic representation of the entities in the database and their relationships. ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 3 ]4.5    System Test-RunIn this stage, the software is tested for bugs and correctness. There are various ways the system was tested.a.    Unit Testing – This is the testing of the smallest running program in the system. This is to ensure that a section works a certain way before implementing other units. The fingerprint attendance management system was implemented module by module. Each module was tested before implementing another module.b.    Integration Testing – This is ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION AND RECOMMENDATION5.1    Summary49This research work, Design and Implementation of an Attendance System Using Fingerprint Scanner, was carried to find an adequate and efficient substitute to the current manual system of attendance carried out in City University. The current manual system was proven to be loop holed in many aspects and therefore a system analysis needed to be carried out. This research work came up with a computerized fingerprint attendance mana ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]REFERENCESCappelli, R., Lumini, A., Maio, D. and Maltoni, D. (2007). Fingerprint Image Reconstruction from Standard Templates, IEEE Transactions, vol. 29, pp.1489-1503.Chitresh Saraswat, Amit Kumar, “An efficient automatic attendance system using fingerprint verification technique”, International Journal on Computer Science and Engineering, vol. 02, No. 02, pp. 264-269, 2010.D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003F. ... Continue reading---