Professional Documents
Culture Documents
1.0 INTRODUCTION
Biometric is the study of method of uniquely recognizing human based upon one or
more intrinsic physical or behavioral traits and characteristics. Biometrics can provide
very secure and convenient authentication for an individual since they cannot be stolen
or forgotten and are very difficult to forge.
Lectures Attendance System is software developed for maintaining the attendance of
the student on the daily basis in the school. Here the staffs, who are handling the
courses, will be responsible to mark the attendance of the students. Each staff will be
given with a separate username and password based on the course they handle. An
accurate report based on the student attendance is generated here. This system will
also help in evaluating attendance eligibility criteria of a student. Report of the
students attendance on weekly and monthly basis is generated.
For manual attendance system, the most common problem is that the class
lecturer need to take student daily attendance and manually filled the record in
attendance book for every month. If the attendance book is missing or misplace, it
could lead to big problem because the lecturer need the attendance record to make
analysis and generate an attendance report. Another problem is that the lecturer will
need more time to analyze and generate the attendance report because the lecturer
needs to search and refer the old attendance record first. Besides that, an error could
happen when the lecturer make the calculations to generate the attendance report by
themselves. Even though the attendance record is hassle to keep by the class lecturer,
1.2
This research is focused on using the vast potential of biometric system to develop an
accurate attendance monitoring system for lecturers in schools.
The objectives of the project work are to:
i.
Capturing eligible students Bio data and Biometric characteristic and putting
ii.
iii.
attendance
Developing biometric-based application program on tracking lectures
iv.
attendance
Improving an efficient data storage and retrieval of the stored data.
1.3
The motivation for this study are needs to find the following:
i.
ii.
iii.
iv.
1.4
RESEARCH METHODOLOGY
The methodology adopted in the design of this project is object oriented analysis and
design (OOAD). The methodology is preferred to other methodologies for the
following reason:
i.
ii.
attendance.
Questionnaire method is used to if the biometric way of capturing students
attendance will outweigh the manual or conventional way by distributing a
paper to fill for them in order to know the aforementioned fact.
The tools needed to carry out this analysis are as follows:
i.
ii.
Scanner machine which allows student to register with different finger tips
Visual Studio 2010: this is used to design and develop the biometric system
iii.
iv.
CHAPTER TWO
LITERATURE REVIEW
2.1
HISTORY OF BIOMETRICS
Biometrics is authentic mechanism that is based on the unique attributes of
individuals. Biometrics is the technology that identifies people on a living trait such as
fingerprint recognition, voice, and handwriting analysis, retinal scan and hand
geometry recognition, the most obvious example is the human use of face recognition.
Automation recognition becomes possible within the last few decades with the
advancement of computer processing capabilities. The individuals biometrics
modalities vary in their stages of maturity. Fingerprint began the transition to
automation in the late 1960s, many method, such as gait are still in the research and
development stage and are not yet ready for development Pankanti, S (2006).
2.2
2.2.1 FINGERPRINT
This reads the unique patterns of lines on the of a finger, or compare the ridges
or point where the ridges join or end. Some method counts the number of ridges
between points, processing the fingerprint image and recording the prints sound wave.
It is quite easy to use, and it has proven effective in many large scale systems over the
year of use. it is noted that fingerprint are unique to each to finger of each individuals
and ridge arrangement remains permanent during ones lifetime. Although, an
individual age and occupation may cause some sensor difficulty in capturing a
complete and accurate fingerprint image.
2.2.2 EYE RECOGNITION (IRIS)
Research has established without doubt uniqueness of retinal and iris pattern to
update, no one has successfully fooled a retinal-scanning device. Now, device can
capture an image (iris image) from over a meter away. Iris scanning device are in
bulky and time consuming. It requires no contact and believed to be highly stable over
lifetime. Acquisition of an iris image requires more training.
2.2.3 FACES
Face: it is human beings identify one another. It is a natural, non-intrinsic
identification method that will work on just about anyone. Expression variation,
change in hairstyle, facial hair, glass movement I using facial verification. They have
commonly available sensors (camera), it requires no contact and it easy to verify
results.
2.2.4 HAND GEOMETRIC
Hand geometric system measure the shape of the hand may be dirty or scarred.
Such system however are bulky, making them more welcome than voice or iris
recognition technology and they are less accurate than fingerprints system. It is easy to
capture and believed to be a highly stable pattern over the adult lifespan. It is not
sufficiently distinctive for identification large dtat bases usually used for verification
of a claimed register as, a member of student.
2.2.5 VOICE
People are most comfortable and familiar speaking into a device in order to
identify themselves. Voice identification is not as accurate as other methods as it has
tends to reject genuine users due to background noise. It is also insecure for use in
high security market and too slow for customers service application such as ATMs or
phone banking. It has commonly available sensors (telephones, microphones)
although it is difficult to control sensor and channel variances that significantly impact
capabilities. It is also not sufficiently distinctively for identification over large data
bases.
2.2.6 SIGNATURES
Authorized user can sign a document into an electronic writing tablet and seal
it, so it can be viewed but not tampered with. The technology is by far one of the
cheapest biometrics available.
2.3
where it is used, each biometrics modality has its strength and weakness that should be
evaluated in relation to the application before implementation. Key decisions in factor
for selecting a biometrics technology include evaluating the environment, throughput
need, population size and demographics, ergonomics, interoperability with existing
systems, user consideration etc. for example, an access control system to a coalmine,
where individuals will have very worn and dirty fingerprint reader. The careful
evaluation of the key decision factors play a crucial role in the success of selected
technology.
2.4
BIOMETRIC SERVICES
Common examples of biometric use involve controlling access to physical
There has been a great deal of interest in using biometrics for verification of
identity. The interest is particularly acute in the areas of visa and immigration
documentation and government issued identification and programs.
2.5
BIOMETRIC SYSTEM
There major components are usually present in a biometric system they are:
1. A mechanism to scan and capture a digit or analog image of a living persons
biometric characteristics.
2. An interface with the application system that will use result to confirm an
individuals identity. It performs all the necessary pre-processing, it has to
remove artifacts from the cursor, to use some kind of normalization. It also
features need to be extracted. This step is an important step as the correct
features need to extract in the optimal way. A vector of numbers or an image
with particular properties to be used to create a template is synthesis of all the
characteristics extracted from the source, in the optimal size to allow for
adequate identificability. Enrolment is being performed, the template being
stored somewhere (on a card or within a database or both) if a matching phase
is being performed, the obtained template is passed to a matcher that compares
it with other existing template with the input. This will then be output for nay
specified use or purpose (e.g. time and attendance monitoring system).
2.6
SYSTEM FEATURES
CHAPTER THREE
SYSTEM INVESTIGATION, ANALYSIS AND DESIGN
3.0
INTRODUCTION
In any software development project, it is imperative to carry out the system
study or system survey of what is obtained. This will enable the system developer to
have a good understanding of the working system. As stated in the introduction, the
methodology to be used for the development of the proposed system follows strictly
on object-oriented methodology. The process model to be used for the project is the
Booth, Jacobson and Rumbasugh, which is known as Rational Objectory process. This
is a process model that is structured along dimensions, e.g. time Dimension and
process Dimension.
The time dimension Structure would be used to model what exist in the
convectional or traditional attendance register and this would serve as a foundation to
determine the problem statement which will be examined in greater depth at the
elaborating phase. All of these would be diagrammatically shown by using unified
modeling language (UML).
The time dimension would help us to determine the scope and rational for the
project and this would lead us to the process Dimension, which would analyse how the
process System would be built. The deliverables from the time dimension will result in
the construction phase, which will involve series of iterations that build the system.
The process dimension explicitly shows how the system developer/analyst have been
able to understand and interpret the requirement of the user of the proposed system.
3.1
the traditional attendance register taken during lecture in order to elicit needed and
relevant information. This input and output of the traditional attendance register are
also noted.
In a typical attendance register for student, the student attends lectures, put
down or writes down his or her signature to indicate that the student is present during
the lecture. The lecturer may enter the information into a file based system on the
computer. The inefficiency of the file based system cannot be overemphasized; its
major problem is redundancy and can easily lead toss of data.
The output is the eligibility of the student to write exam and the continuous
assessment score generated based on the input supplied. Another peculiar problem that
may result with this procedure is the problem of missing attendance list as a result of
the sheer volume of data that processed, a summary of the activities performed a
typical learning environment is stated below, where attendance to lecture is been
taken.
This would be translated into the modelling diagrams.
Identified Activities
a.
b.
c.
d.
e.
f.
g.
MODELLING DIAGRAMS
The unified modelling language, which is the modeling language of choice,
would be used to assist in diagrammatically analyzing the process that are involved as
well as exposed limitations that may exist in the typical/traditional attendance register.
Students
COMPUTE STUDENTS
ELIGIBILITY TO WRITE EXAM
CHECK ELIGIBILITY
COMPUTE CONTINOUS ASSESSMENT
SCORE
i.
ii.
iii.
iv.
v.
A student may put down the same of another student who is not in class during
lecture
Students through forgery can sign in for someone that is absent.
A wrong attendance list is eventually given to the lecturer.
A false continuous assessment grade is eventually generated
The attendance lists can get missing or damaged.
Attend lectures
RECOMMENDED ACTIONS
The only way out of the ineffectiveness and inefficiency and inaccuracy
identified is to employ the use of biometrics system with the computer; the problemsolving tool as an appropriate information system management tools. The world of
computing has been endowed with such vast tools database management software to
handle large volume of data as well as aid in the manipulating of data. The use of the
biometric device will identify an individual based on the unique attributes of the
person and verifies that person, the problems identify or in-personification is
overcome by this system.
With all these, the setback that may be associated with recruitment is diplaced.
Records are easily stored, referenced, sorted, accessed and queried. In addition,
virtually appealing informed and detailed reports would be generated to meet the users
of the system.
3.6
above, it has become really imperative for us to design a system that would not
entirely replace the new system but rather incorporate newer functionalities to the
system in a bid to improve on the activities of typical attendance list.
The proposed system aims at eliminating the manual procedures used in
attendance registers. The proposed system which is a time end attendance biometric
system makes use of a biometric device, precisely the fingerprint scanner to capture
the fingerprint of each student. The time and attendance software stores the captured
fingerprint and records the attendance and time of entry student during a lecture.
3.6.1 HOW FINGERPRINT SCANNER WORKS
The fingerprint scanner is a camera device that is used to capture fingerprints.
Fingerprints may be scanned into an automated fingerprint. Identification system by
rolling prints or placing flat impression onto a glass platen above a camera unit. The
biometric image which is the fingerprint of an individual is capture during enrollment
process. The unique characteristics are then extracted from the biometric image to
create the users biometric template. This biometric template is stored against the
users bio data in a database for later use during an identity verification process.
During verification process, the fingerprint is again captured.
The unique characteristics are extracted from the biometric image to create the
users live biometric template. This new template is then compared with the
template previously stored and a numeric matching scale is generated, based on the
percentage of duplication between the live and stored template.
3.6.2 USE CASE DIAGRAMS OF THE PROPOSED SYSTEMS
The diagram below shows the actors and the use cases in the time and attendance
monitoring system. There are for actor in the system namely.
1.
2.
3.
4.
Student
Lecturer
Software administration
The system (software)
Enroll
Take lectures
Clock in the attendance tracker
View eligibility to write exams
With all the input and output of the proposed system determined, we can proceed to
Generate attendance report
model the workflow and the system behavior of the use cases and actors we have
Generate absence report
identified. The appropriate modeling diagram is the activities that are to be modeled
Generate continuous assessment report
and represented in the design and implementation of the system. This diagram shows
Check eligibility of student
Student
Software administrator
Administration
Lecturer
student needs to be enrolled first. This is done by the software administrator. The
paper based attendance is replaced by an electronic tracker that keeps track of student
lodge and this serves as an electronic attendance system. With this, checks can be
conducted as to the eligibility of the student (i.e. if the student can write exam or not).
The information gathered from the electronic tracker serves as input for the system.
The output of the systems are the generated that are useful for the lecturer.
3.7.1 BIOMETRICS IDENTIFICATION AND VERIFICATION MODULE
DESCRIPTION AND PRIORITY
This feature will through a minutiae-based algorithm identity and verifies
fingerprint capture by the fingerprint scanner. This feature has a high priority.
Stimulus And response sequence
a. Finger is placed on the fingerprint scanner
b. Finger is checked against database
c. If the fingerprint is not found in the database, the user is asked if a new staff is
added
d. If the fingerprint is in the database, the student is clocked-in
e. If the user replier in the affirmative, the software authenticates and ensure the
user as right to do this.
f. The fingerprint is stored along the new student bio-data
FUNCTIONAL REQUIREMENT
a. The fingerprint scanner must be on at all time during lectures is ready to
capture fingerprint automatically once a finger is placed on it
b. The solution must ensure that a new student is added; the user is authenticated
and has the proper privilege level.
3.7.2 CLOCK-IN TRACKER
DESCRIPTION AND PRIORITY
On identifying a fingerprint in the database, the feature records the use of checking in
of each student
Functional requirement
a. Once a student is identified his/her data must flash on the screen for 10 seconds
b. The solution must ensure that the computer clock cannot be tempered with, and
the database must be
c. The solution must ensure that the computer clock cannot be tampered with, and
the database must be sufficiently protected to ensure that no one can alter the
clock-in time
3.8
SYSTEM DESIGN
The design phase of this project is done using the conceptual and logical design of
software development.
Conceptual Design: this views the problem from the perspective of the user and the
business. The requirement that has been elicited from the user of the system is
translated in the design. In this project, the limitation of the traditional is translated
from the analysis phase to the design.
3.8.1 LOGICAL DESIGN
Logical design is define as the process of describing the solution in terms of its
structure and the interaction of its part from the perspective of the system developer.
Logical design
i.
ii.
iii.
iv.
When creating the logical design of this project, I took into account all the users,
system and operation requirements that the need for security, logging, scanning, state
management, error handily, application architecture and integration with other system.
Some of the tables used by the database for the proposed system include;
1. Login Table
Field Name
Username
Field Type
Text
Field size
25
Description
It contains a set of characters that
contain numbers and symbols peculiar
Password
Text
25
to a unique user
It contains a
set
of
encrypted
characters
2. Attendance Table
Field Name
Name
Matric No
Date
Field type
Text
Number
Number
Field Size
50
Description
Contain the
25
10
students
full
name
number
Time of entry
Number
10
been taken
It contains the time each students
clock-in
Field Type
Text
Field Size
50
Description
Contain the students full name
Matric No
Number
25
Department
Combo
50
Level
Combo
50
3.9 SUMMARY
With the system analysis and design carried out already, the identified objects
and component will then be translated to the next phase of software development. This
phase is the implementation phase. Each of the components wil be implemented using
various implementation tools that represent the system design. The proposed system
aims at perfecting all that has been the limitations of the typical time and attendance
monitoring system during lectures.
CHAPTER FOUR
4.0
4.1
INTRODUCTION
The system implementation phase of a software system entails all procedures
that are carried out to put the computerized system into use. It is the process of
describing component, service and technology of the solution from the perspective of
developments required. There are different ways by which system implementation
may be carried out.
It could be a total changeover or parallel implementation. The method adopted
is determined by the nature of the system, the cost that will be involved in changeover,
time required, Quality of new system, impact on customers and technical issues.
System implementation phase include the following procedures;
i.
ii.
iii.
It includes screens, reports and documentation. Simply, the user interface in any part
of the system the user comes in contact with. The solution must have attractive and
user friendly.
The users of this system are the lectures, students and the database
administrator.
4.3
REPORT DESIGN
The report generated from this system result generated from the attendance.
a. The continuous assessment report
b. absence report and,
c. Students eligibility.
4.4
SCREEN DESIGN
The screen design of this system has been putting into consideration all design
INTERACTION STYLE
The interaction style used in this new application in user-friendly involves
direct manipulation where the user performs action on the screen corresponding to the
tasks to be carried.
4.6
HARDWARE REQUIREMENT
The Hardware requirement for the system include the following
i.
ii.
processor required.
Memory: 16MB of
recommended) information.
iii. Display: VGA or higher resolution monitor, super VGS recommended
iv. Hard disk: At least 20 GB hard required.
iv.7 SOFTWARE REQUIREMENT
a. Windows 2000 operating system
b. Internet explorers or any other browser
c. The system must have email to specified and be configured to send report via
email to specified location. The can be sent monthly or at the end of the semester.
d. Delphi programming language required to run application.
e. MS Access database: the back end functionality of the proposed system.
f. Conductivity to the database must be through ODBC (opening database
connectivity).
4.8
i.
ii.
iii.
SECURITY REQUIREMENTS
The database must not be accessible by unauthorized individuals/users
All password and fingerprints template stored in the database must be hashed.
The timer (clock) used by the solution must be secured and not be adjustable by
unauthorized individuals.
4.9
USER GUIDE
User manual
Online help
Online tutorials
The user interface of the system is a web user interface. A proficient user of the
internet will find the user interface self-explanatory.
4.10 TRAINING
The development software application has been done using design principle of
software development. It is design a consistent manner and users if the system can
easily identify with the functionalities of the system.
4.11 REVIEW AND MAINTENANCE
Operational software will need to be constantly reviewed and maintained in
order to ensure that the software still meet its initial objectives.
The system would also need to be reviewed and maintained periodically for the
following reason:
1. To ascertain that the system is able to cope with changing requirement of the
system as well as the user
2. To ensure that the requirement are met and to ensure that there is enough capacity
to modify the existing requirement
3. To deal with problem that many arise in operations.
Maintenance activities of a software system would be divided into:
i.
ii.
iii.
Corrective Maintenance
Adaptive Maintenance
Perfective Maintenance
The corrective Maintenance for the project would require running the codes and
locating errors that may result well as correcting the errors. Adaptive maintenance
would ensure that the developed system can be easily adjusted and up graded into
newer environment as well as accommodate changes in software and hardware
requirement. The system developed would run on any windows operating hardware
platform with the software requirements stated above.
CHAPTER FIVE
CONCLUSION AND RECOMMENDATION
5.0
SUMMARY
Developing an application from the stages of investigation into a fully
automated system is a very tasking one. It would be necessary at this point to state that
the objectives band expectations of the user of the operational software, the objective
as stated in chapter one of this project have been modeled and designed and has been
interpreted by the developer of the system.
It is also important to note now that a system of this nature cannot be written
without some obvious problems.
5.1
PROBLEM ENCOUNTERED
The major challenge encountered during the course of this project was
discovered that all that had to be analyzed and design were traceable to the objectives
and requirement of the system. Developing a detailed design of the proposed system
was quite tasking, but was surmounted through various consultations to references on
system analysis and design. This helped in realizing that the design stage was an
iterative stage and that every stage of a software development would always require an
analysis and a design process.
5.2
CONCLUSION
To conclude this project suggest ear length to be implemented as an ageing to
for the biometric system as a further step of improving the forgiving the sign of a
biometric system as it never stop growing in the beginning the ear could be used as an
ageing tools and can be combined with finger print biometric system until the
uniqueness to an individual of ear pattern is proving once its proving ear would be the
ideal trait for both providing identification and ageing tools.
5.3
RECOMMENDATIONS
I recommend that this further work may be carried out on time and attendance
monitoring system using biometrics. The system can be used in offices by Human
Resources department.
A client/server system may also be design to replace the stand alone windows
application used in designing the user interface.
REFERENCE
Bruce Mic Cowan, D.D. (2003): Analysis on Attendance system and procedure
microsoft publisher in conjunction with Log Mathew pg.22-33.
Mark Luaz David Aschur (1998), Introduction to biometric and eyes detection
system Brianland Publisher, London, England, pg. 345-390.
R Cappeli Mariod Maltoni J.C.(2004), wagman performance evaluation of
fingerprint verification system privacy sensitive secure personal identification
system Firstbamlian Publisher, pg. 20
Ososa B (2008), Automation for attendance system and logistic Osabth publisher,
Apapa (Oshodi Expressway) pg. 37-67
Jain, A Hony, L&Pankanti, S (2006) Analysis on Biometric system based on tracking
student lecture attendance Johnson and Son publisher pg. 23
Website Source
HTTP: www. Timeclockplus.org/real-time definition for the time and attendance
industry spr. 2008
HTTP.www. applied biometrics.com/back ground of biometrics/am/Feb.2008