Design And Implementation Of Student Attendance Monitoring System Using Fingerprint

 

Chapter One

 

Preface

 

Background of the Study

Attendance operation of scholars in institution can be rigorous using the conventional system of paper wastes and old train system system. Every academic institution poses some norms concerning how attendance is to be verified for pupil in classes, laboratory sessions and examination halls. That’s why keeping the accurate record of attendance is veritably important. The approach of using paper wastes and the old train system to verified scholars has been in use for times. There are so numerous backups with the conventional system, one of similar problem is the difficulty for the operation to cipher the chance of pupil attendance in classes and constantly modify their information. Also in institution, tracking and covering pupil time of attendance could be tedious task, time consuming and as well prone to crimes. As an volition to traditional homemade clocking process by scholars in classes or during examination, biometrics characteristics can be used for authenticating scholars. This exploration will concentrate on developing point grounded Biometric Student Attendance Monitoring System. The point Biometrics is espoused in this exploration work for the fact it’s one of the most successful operations of biometric technology. In the homemade signing processes, where speaker give a distance of paper to pupil to write their names and hand as a form of attesting their presence for a particular class session, falsification in pupil attendance substantially do a situation where by a pupil can subscribe on behalf of his or her coworker as being present in the class when not true can be so delicate to help from passing especially for large classes where row count can takes longer time International Journal of Computer Science and Network Security( 2009).

The trending concern in this ultramodern world is regarding public security, relating theft as well as on- line terrorism. Experimenter refers to Biometric as a result for detecting stoner’s identity and security challenges expiring in this ultramodern day. Biometric identification is any automatically measurable, robust and distinctive physical characteristic or particular particularity that can be used to identify an individual or corroborate the claimed identify of an existent. Biometric wisdom utilizes the measures of a person’s behavioral characteristics( keyboard strokes, mouse movement) or natural characteristics( point, iris, nose, eyes, jaw, voice pattern, etc). It’s the features captures that’s being converted digitally into a template. The recognition software can also be use to discover an individual as the person they claim to be. point recognition is the most common biometric system espoused in identification of a person( Ismail 2009).

Biometric is a field of technology that uses automated styles for relating and vindicating a person grounded on physiological and behavioral traits. Because some corridor of the mortal body is use in biometrics, the issue of getting lost isn’t possible and for word to be fluently guess can be fluently avoided. Also, exercising biometrics in utmost cases can be said to be more effective when speed is considered and accessible than employing word and ID cards system.

Using a particular person point as a form of authentication is just like using natural physical data as a word. The benefit of using biometric authentication is that it’s absolutely distinct to each person. There are no two different individualities with the same point, it’s delicate and insolvable for one another to have the same point, and fingerprints from different people can noway be the same. Also, a point can noway be guess by a felonious, similar as a word which pretender can fluently prognosticate using a stoner birth date or any other common word. Infiltration is veritably hard to come by due to the fact that felonious won’t be suitable to meddle around to steal stoner word when using ATM with the 4- number pass law( Valasquez 2013).

point can be classify as one of the most mature biometric traits and is accepted in courts of law as a licit evidence of substantiation. Fingerprints are espoused in forensic analysis encyclopedically in examinations of felonious. More lately, there are growing figures of individualities and marketable druggies that are presently using or explosively putting into consideration of using point- grounded identification for no any other reason other than the matching performance biometric technology has demonstrated as well as a better understanding of fingerprints.

Although there are so numerous positive impacts for using biometric authentication, still, unlike username and word, biometric data is a physical point of a person that’s fixed and can not bechange.However, that checkup has the capability to trick the Touch ID system, If a person could have access to acceptable checkup another person point. In that case, the point features of a person ca n’t be change accordingly a miscreant ca n’t be averted from having access to your particular information or lines. As point scanning becomes further extensively accepted anywhere anytime, this may come a substantial challenge. A miscreant can have access to different accounts because with one point, a miscreant may have access to multiple accounts that enforced authentication using point.

 

Statement of the Problem

The traditional system is still substantially used in lecture room or laboratory session in utmost institution moment. Lecturer or educator will give out a distance of paper containing list of pupil’s name to subscribe or in some cases, the pupil will be the bones to write their names, pupil id and matriculation number to indicate their presence for a particular class. Falsification in pupil attendance does do rampantly in the traditional system. For illustration, another pupil can fluently subscribe an attendance on behalf of another pupil. In other to help this problem, it’s necessary to develop an Authentication System for scholars using point Biometric recognition that will be employed to track and keep the attendance of every pupil in a particular class. point is unique point for everyone compare to using barcode in smart cards. thus, this system designed in this design work isn’t grounded on the being barcode system. Tracking and covering pupil time of attendance could be tedious, time consuming and further susceptible to crimes. The security of the being attendance system that are now use in classroom( hand system) can be fluently compromised. Some scholars can master other pupil’s hand. Thereby, helping their coworker who are absent for a particular class to subscribe the attendance distance using the duplicated hand. The point Attendance monitoring system designed in this exploration work for pupil is a more secure platform where scholars mark their attendance with their point.

 

Aim And Objects

The end of the study is to design and develop a dependable, scalable and cost effective point grounded Student Attendance Monitoring system. This is to be achieved by the following objects

i) To carry out the analysis of homemade processes involved in class attendance and examination attendance.

ii) To design a new system for the( i) over and

iii) To apply the design using Microsoft VisualBasic.net.

Compass Of The Study

The compass of this work is to develop a Fingerprint Based Student Attendance covering System that will ameliorate how attendance operation is done by using point as a form authentication for evidence of attending a class. The system will be a window grounded operation developed using Microsoft VisualBasic.net as the preferred programming language for erecting the stoner interface and Microsoft SQL Garçon for database design. It doesn’t cover other aspects of biometric.

 

Limitations Of The Study

The effectiveness of the scanner can be reduced due to the roughages in the captured images which are frequently caused by worn- eschewal or cut or dirt’s set up on point. thus, there’s every possibility that enrolled druggies can be rejected by the system. Also the scanner or detector can not distinguish between a real and an artificial cutlet, thus it’s possible to wisecrack the scanner. In addition, if an enrolled point is been duplicated or caricature, it isn’t possible to change point as in the case of word because stoner cutlet biometric. Eventually, since the system will be design using VisualBasic.net, it wo n’t be suitable to run on any other platforms other than Microsoft Window operating system.

 

significance of the study

The System for scholars using point Biometric will exclude the use of paper in homemade signing processes and all the threat associated with it. One of the pitfalls of using a paper in class attendance is that it can be fluently lost and scholars cheat by subscribing for each other not present in the class thereby defeating the end of taking the attendance. Tracking and covering scholars time of attendance could be tedious, time consuming and susceptible to error. therefore, the System will drastically reduce time demanded to corroborate attendance data.

The System also allows the institution operation to track or probe pupil class attendance in a particular course having poor attendance thereby enabling the operation to amend the situation by furnishing the necessary interventions. The system give high position of security whereby making it insolvable for fakers and impersonators in making their ways to examination halls. The System using point Biometric will keep literal data making it easy for speakers to pierce and grade scholars.

point Grounded Student Attendance monitoring System is extremely useful in institutions especially during classes, tutorials, laboratory sessions and examination during which heavy security are typically emplace to validate pupil’s identity in order to cob fakers, with the use of Authentication System the number of security labor force will be greatly reduce. utmost speakers ’ handbill distance of paper for their class attendance, which can fluently be lost or damaged and poses a lot of stress in cumulating grades for their scholars. The system allows the speaker to cover each pupil attendance, track down truants and take the applicable action. therefore, the system eliminates all these downsides. The Authentication system isn’t only useful to the institutions and speakers alone, indeed the scholars profit a great deal by reducing the stress in queuing up which affect in detention and frequently time in the damage of the attendance distance. It also prevents miscalculations and anomaly that’s associated with homemade signing in which pupil that attend a class are marked as not present thereby losing the mark accorded to the particular attendance due to multiple attendance distance.

 

Functional Description Of Terms

Biometrics is physiological or behavioral characteristics unique to individualities, this Include Fingerprint, hand figure, handwriting, iris, retinal, tone and voice.

Leg particular identification number.

Biometric Verification is any means by which a person can be uniquely linked by assessing one or further identifying natural traits.

Scanner a device for examining, reading, or covering commodity in particular.

Point Detector is an electronic device used to capture a digital image of the point pattern.

Rapid Application Development is a conception that products can be developed briskly and of advanced quality.

Authentication is the process of determining whether someone or commodity is, in fact, who or what it declared to be.

Use Case Diagram is used to show scripts used for understanding the conditions of the system and to show the commerce between the stoner and the system.

Flow map or exertion Diagram is a Unified Modeling Language that represents the graphical workflows of step wise conditioning and conduct with support for replication, choice and concurrency.

 

Leave a Comment