...ABSTRACT This project is about designing and developing a system, Student’s Attendance System (SAS) that will record the attendance of student in FEDERAL POLYTECHNIC NEKEDE. SAS using fingerprint technology to authenticate every student by using their fingerprint in order to get an accurate record. The fingerprint technology is cheaper and easy to implement compared to other biometrics technology. The fingerprint only authenticates the validated student. SAS with the fingerprint features can make the system secure because no student can record their attendance except to be authenticated by the system. Besides provides security, this new system provides efficiency to both lecturers and students. SAS focused on the developing system using SDLC as the methodology. This system using personal computer that is run under Windows platform and develop using VB, PHP and MySQL. This system uses the questionnaire method in order to analyze the user acceptance among respondents. In conclusion, this is important to provide the reliable and efficient record. 1.1 INTRODUCTION This chapter will focus on background of this project, problem of the manual system, the objectives, scope and significance of the project. 1.2 BACKGROUND Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. It includes fingerprint, iris, facial and retinal. Biometrics technologies are becoming the foundation of an extensive array...
Words: 2173 - Pages: 9
...International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 5– No.3, February 2013 – www.ijais.org Fingerprint Biometric Authentication for Enhancing Staff Attendance System Oloyede Muhtahir O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. Adedoyin Adeyinka O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. ABSTRACT Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of staff attendance. Despite the numerous advantages of the biometric system and its impact to various work sectors across the globe, most biometric technology users face the issue of defining the right and accurate biometric technology system that will be cost effective in solving particular problems in specific environment. In this paper, a study was conducted using a telecommunication company in the South West region of Nigeria, in order to determine the specific biometric identifier that can be used to enhance their traditional staff attendance system which presently affects the productivity of the organization. The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on different biometric technologies. The survey involved...
Words: 4926 - Pages: 20
...A FINGERPRINT BASED BIOMETRIC AUTHENTICATION AND IDENTIFICATION SYSTEM FOR TIME AND ATTENDANCE MANAGEMENT ABSTRACT This project is about designing a system that automates the whole process of taking attendance and maintaining its records in an academic institute. Managing people is a difficult task for most of the organizations, and maintaining the attendance record is an important factor in people management. When considering academic institutes, taking the attendance of students on daily basis and maintaining the records is a major task. Manually taking the attendance and maintaining it for a long time adds to the difficulty of this task as well as wastes a lot of time. For this reason an efficient system is designed. This system takes attendance electronically with the help of a fingerprint sensor and all the records are saved on a computer server. In order to mark the attendance, student/staff has to place his/her finger on the fingerprint sensor. On identification student’s attendance record is updated in the database and he/she is notified through a screen. . TABLE OF CONTENTS Certification Acknowledgement Abstract Table of Contents List of Figures Chapter One Introduction Chapter Two Literature Review Chapter Three Methodology Chapter Four System Design Chapter Five Implementation Chapter Six Conclusion and Recommendation LIST OF FIGURES CHAPTER ONE INTRODUCTION 1.1 INTRODUCTION This chapter focuses on the background of the project, the objectives, scope and...
Words: 2434 - Pages: 10
...CHAPTER ONE INTRODUCTION 1.0 BACKGROUND TO THE STUDY Staff attenda nce management of an institution or organization can be very laborious using the conventional method of paper sheets and old file system method. Every corporate organization poses some standards concerning how attendance is to be confirmed for staff in offices. This is to enable the management of the organization identify those staff that are punctual and competent, that is why keeping the accurate record of attendance is very important. Also in institutions, tracking and monitoring staff time of attendance could pose a tedious task, time consuming and as well prone to errors. As an alternative to the traditional manual clocking process by staff in offices, biometrics characteristics can be used for authenticating staff. This research will focus on developing a Fingerprint based Biometric Clocking System. The fingerprint Biometrics is adopted in this research work due to the fact that it is one of the most successful applications of biometric technology. In the manual signing processes, where a sheet of paper is placed at the entrance of the office for staff to write their names and signature as a form of confirming their presence for a particular day in the office, falsification in staff attendance mostly occur. A situation whereby a staff can sign on behalf of his or her colleague as being present in the office when that is not true. This can be so difficult to prevent from happening especially for large...
Words: 1919 - Pages: 8
...Biometrics in Schools, Colleges and other Educational Institutions The following guidance has been prepared as an aid to schools, colleges and other educational institutions that may be considering the installation and use of a biometric system. This document is intended to encourage such institutions to fully consider if there is need for a biometric system in the first place and then to assess the privacy impact of different systems. The critical issues to be considered from a data protection perspective are the proportionality of introducing a biometric system and the requirement to obtain the signed consent of the student users (and their parents or guardians in the case of minors) giving them a clear and unambiguous right to opt out of the system without penalty. The document is not intended to promote any particular system, but is intended to make schools and colleges aware of their responsibilities under the Data Protection Acts 1988 & 2003. It is the use of a biometric system that may give rise to a data protection concern, not necessarily the production or sale of a system. All situations must be judged on a case-by-case basis. 1. Different types of Biometric systems All biometric systems operate on the basis of the automatic identification or authentication/verification of a person. What differs between systems is the nature of the biometric and the type of storage. 1.1 Information used to generate biometric data Biometric data may be created from physical or physiological...
Words: 3989 - Pages: 16
...“Biometric attendance in the workplace is a threat to privacy”. How far do you agree? (30 marks) Ref - http://www.biometrics.org/html/introduction.html Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy...
Words: 665 - Pages: 3
...What is a Biometric Time and Attendance System? Biometrics is the identification of people based upon their physical characteristics; most commonly their fingerprints, hands, eyes, or facial features. While time and attendance systems are used to manage employee attendance, scheduling, and associated payroll tasks. Within time and attendance, biometric devices are often used as a punch clock in order to add an extra layer of security, accountability and efficiency. How Does Biometric Time and Attendance Software Work? Step 1: Biometric Devices: Using biometric time and attendance systemsallows employees to clock in and out using their fingerprint, retinal scan, etc. Often times this process is also accompanied by a PIN (Personal Identification Number) which must also match the fingerprint or other scan. Step 2: Time and Attendance Software: Pairing your biometric device with a time and attendance software allows for more efficient payroll and attendance processing. Rather than spending hours adding up manually submitted clock-in and clock-out times, your biometric time and attendance software will allow you to automatically import data into your payroll software. This will significantly cut down on processing time and will eliminate errors derived from manually inputting information. Different Types of Biometric Devices Fingerprint Scanners are probably the most common type of biometric time and attendance device, simply because they are easy to use and are generally quite...
Words: 573 - Pages: 3
..._________________________________________________________________________________ Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions in Ghana such as Christian Service University the attendance of students is very important factor since it forms part of the students’ assessment and evaluation. It has therefore become imperative that proper measures should be put in place to ensure that no student signs for another. It has been observed that at Christian Service University College lecturers sometimes give the attendance book to students to sign without actually supervising them to see whether the right student is signing or making sure that no student signs for another. Moreover, if a lecturer wants to supervise the signing of the attendance book to make sure that the right student is signing and no student signs for a friend then the lecturer may end up by wasting a significant amount of the lecture period on the signing supervision. Furthermore, in the larger classes lecturers sometimes use their own ideology and principles to award the attendance marks (5%) that counts towards continuous assessment for students because they find counting each individual student’s attendance laborious, boring and even error prone. This means that the 5% marks obtained by students from attendance sometimes does not give a true picture about the student and therefore...
Words: 2527 - Pages: 11
...Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D.1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria. 2 Department of Electrical and Electronics, University of Benin, Edo State, Nigeria. E-mail: engrshoewu@lasunigeria.org* ABSTRACT In this paper, the development of an attendance management system using biometrics is proposed. Managing student attendance during lecture periods has become a difficult challenge. The ability to compute the attendance percentage becomes a major task as manual computation produces errors, and also wastes a lot of time. For the stated reason, an efficient attendance management system using biometrics is designed. This system takes attendance electronically with the help of a finger print device and the records of the attendance are stored in a database. Attendance is marked after student identification. For student identification, a biometric (fingerprint) identification based system is used. This process however, eliminates the need for stationary materials and personnel for the keeping of records. Eighty candidates were used to test the system and success rate of 94% was recorded. The manual attendance system average execution time for eighty students was 17.83 seconds while it was 3.79 seconds for the automatic attendance management system using biometrics. The results showed improved performance over manual attendance management system. Attendance...
Words: 3034 - Pages: 13
...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...
Words: 3961 - Pages: 16
...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 3, March 2012 An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Dr.M.Ramakrishnan Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com Professor/HOD-IT Velammal Engineering College Chennai,India ramkrishod@gmail.com Abstract— Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm ...
Words: 3558 - Pages: 15
...Biometric devices all around us Many components come into play when debating biometric devices. Is it ethical? Is it legal? Is it economical? Is it sociological? As technology continues to progress, the safety of society has to be considered. I believe that technological advancement is wonderful, but the natural right to privacy holds more importance. Imagine, every time you want to enter a building you have to swipe your finger. It is not like just swiping a card. You have to physically be there to gain access. Teachers could require swiping your finger or getting your retina scanned to take attendance. This takes away the option of possibly having a friend sign you in if there was an emergency and you could not make it. Also, those records could be collected and future employers could possibly gain access to them. A person with bad attendance probably should not get a job over someone with good attendance, but the person with bad attendance could be automatically taken out of competition with no chance to explain. Although biometrics can legitimately address a host of problems from slow lunch lines, lost lunch money, cumbersome payment, fraud and bullying, to falling National School Lunch Program participation, In most school lunch biometric systems, students place a forefinger on a small fingerprint reader. In seconds, the system translates the electronic print into a mathematical pattern, discards the fingerprint image, and matches the pattern to the student's meal account...
Words: 624 - Pages: 3
...Arun Kumar Mishra and Debidutt Acharya, “WIRELESS FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM” , 2010. Biometrics is the very study of identifying a person by his/her physical traits that are inherent and unique to only the person concerned. Biometric measurement and assessment include fingerprint verification, iris recognition, palm geometry, face recognition etc. The above mentioned techniques work with different levels of functionality and accuracy. Accuracy and reliability are the two most important parameters when it comes to biometric applications. Fingerprint verification is one of the oldest known biometric techniques known but still is the most widely used because of its simplicity and good levels of accuracy. It’s a well known fact that every human being is born with a different pattern on the fingers and this feature is exploited to identify and differentiate between two different persons. The application in an educational institute is worth noting because of the benefits it brings along with it. The fingerprint recognition and verification technique can easily replace an attendance sheet and save time wasted on calling out roll numbers in the class. A fingerprint detecting device needs to be placed in each classroom and students would be made to swipe their finger over the sensor so as to mark their presence in the class. The database would contain all the fingerprints beforehand. So, the moment a finger would be swiped, a check would...
Words: 978 - Pages: 4
...CHAPTER I INTRODUCTION Background of the Study Student absences jeopardize student and school success. Academic achievement scores are correlated with school attendance. Students who are not at school cannot receive instruction. Excessive school absence is a precursor of school dropout and is related to juvenile delinquency. And, because average daily attendance rates are a common determiner of school funding, absences mean that schools have less resources to do the job. Given all this, it is not surprising that reducing school absences is a top priority for many schools. (http://smhp.psych.ucla.edu) Now-a-days intelligent automation has stepped its presence in every field all over the world. This project has a stepping in the attendance and power management of the classrooms in the colleges/schools. The use of low cost technologies for highly reliable applications with the help of newly innovated algorithms makes the automation process to reach the consumers at cheaper and reliable cost. (http://www.muxtronics.com) The widespread of embedded computer networks as part of everyday peoples’ lives is leading the current research towards smart environments and Ambient Intelligence (AmI). AmI is a new information paradigm where people are empowered through a digital environment that is “aware” of their presence and context and is sensitive, adaptive and responsive to their needs. Mark Weiser, described the smart environments as physical worlds that invisibly interact...
Words: 4807 - Pages: 20
...automating the collecting of employee attendance data when employees begin their shifts is still a manual process. Even business that has automated or computerized processes such as scheduling, time cards sheets to collect time and attendance data. NOVA time a group system developer, on last May 2007, the system that will give management the power to not only utilize the tools we have available to us today, but will continue to grow and evolve, giving it the capability to incorporate and utilize the tools the new millennium promises to bring us. NOVA time has brought a system designed for growth while maintaining the maximum in flexibility. Where the sophistication lies within the programmed mechanism of the system, allowing for a quick and simple implementation and employee training cycle, after all the true test of a system is not only in the production and wealth of reporting, but in the simplicity and ease of its operation in conjunction with a simple and accommodating implementation program. Better humans (2003) stated that a wireless fingerprint scanner could soon be helping law enforcement agencies; government and the military instantly identity the scanner, called sweet fingerprint, today. It is being demonstrated at the government convention one merging technologies, which addresses issues of homeland security Scanned fingerprint can also be used to query a database for someone’s profile, using automated fingerprint identification system, and the profile can then be sent...
Words: 1251 - Pages: 6