You are on page 1of 34

CHAPTER ONE

1.0 INTRODUCTION
Biometric is the study of method of uniquely recognizing human based upon one or
more intrinsic physical or behavioral traits and characteristics. Biometrics can provide
very secure and convenient authentication for an individual since they cannot be stolen
or forgotten and are very difficult to forge.
Lectures Attendance System is software developed for maintaining the attendance of
the student on the daily basis in the school. Here the staffs, who are handling the
courses, will be responsible to mark the attendance of the students. Each staff will be
given with a separate username and password based on the course they handle. An
accurate report based on the student attendance is generated here. This system will
also help in evaluating attendance eligibility criteria of a student. Report of the
students attendance on weekly and monthly basis is generated.
For manual attendance system, the most common problem is that the class
lecturer need to take student daily attendance and manually filled the record in
attendance book for every month. If the attendance book is missing or misplace, it
could lead to big problem because the lecturer need the attendance record to make
analysis and generate an attendance report. Another problem is that the lecturer will
need more time to analyze and generate the attendance report because the lecturer
needs to search and refer the old attendance record first. Besides that, an error could
happen when the lecturer make the calculations to generate the attendance report by
themselves. Even though the attendance record is hassle to keep by the class lecturer,

management report is required in urgent basis. Analyzed attendance record is


required by Federal Polytechnic Ado-Ekiti for future actions is normally being delay
because of the lack of precise. Moreover, delay analyzes would leads to prolong the
time to inform the parents about the truancy students.
Addressing this issue, this project discusses the strategy to analyze and generate
reports related to attendance, provide trigger facilities in conjunction to pre-defined
consequences and develop a prototype of Biometric System Based on tracking
lectures attendance.
1.1 BACKGROUND OF THE STUDY
This project is designed to handle the issues that arise as a result of thy typical time
and attendance in a learning and business environment.
The Biometric system-based software also helps in evaluating the examination
eligibility criteria for a student in the sense that only those students with attendance
above 75% are allow to sit for the semester exams. And this system will also help in
evaluating attendance eligibility criteria of a student. In schools, attendance is
important and mandatory. Nowadays, due to the large number of students, it is
efficient to use Biometric system based to manage attendance in schools.
An electronic system is used to track attendance of every student during
lectures, helping lecturers to have an accurate attendance register, this would be
achieved by using biometric system.

1.2

OBJECTIVES OF THE STUDY

This research is focused on using the vast potential of biometric system to develop an
accurate attendance monitoring system for lecturers in schools.
The objectives of the project work are to:
i.

Capturing eligible students Bio data and Biometric characteristic and putting

ii.

everything into high integrity database.


Designing a well accurate biometric system-based on tracking lectures

iii.

attendance
Developing biometric-based application program on tracking lectures

iv.

attendance
Improving an efficient data storage and retrieval of the stored data.

1.3

MOTIVATION FOR THE STUDY

The motivation for this study are needs to find the following:
i.
ii.
iii.
iv.
1.4

Fake attendance of the students


Student attendance forgery
Accurate attendance after the overall section
Misplacing of attendance after lectures

RESEARCH METHODOLOGY

The methodology adopted in the design of this project is object oriented analysis and
design (OOAD). The methodology is preferred to other methodologies for the
following reason:
i.

Survey method is used to know the existing problem of taking students

ii.

attendance.
Questionnaire method is used to if the biometric way of capturing students
attendance will outweigh the manual or conventional way by distributing a
paper to fill for them in order to know the aforementioned fact.
The tools needed to carry out this analysis are as follows:

i.
ii.

Scanner machine which allows student to register with different finger tips
Visual Studio 2010: this is used to design and develop the biometric system

iii.

based for tracking lectures attendance


Microsoft database 2013: the is used as a back-end that allows student and

iv.

others data to be stored for retrieval.


Passport: this is used to avoid impersonation during registration and other
thing that will be done.

The procedure to take in order to accomplish this task is by writing the


appropriate program with VB.NET 2013 because of its reliability and its
flexibility, using MS Access as the database that will store, delete, search and
retrieve students data in the database through student registration portal.
Scanner machine will be used by any organizations who wish to use this
software for tracking students attendance due to the financial constraint provision
for scanner machine to all end-user would not be made.
1.5 SCOPE OF THE STUDY
The impact of biometrics in technology is overwhelming one of the impact is
automated time and attendance system using biometrics.
However, this study focuses on developing a software that first of all eligible
students taking a particular course using biometrics (fingerprint scanner to be
precise). Attendance is being taken each time there is a lecture on that particular
course by verifying the fingerprint of each enrolled student.
The software is a capture the fingerprint of each student and compare it will the
enrolled one and then the software takes record of time of entry of the students and
stores it in the database. At the end of the semester the overall attendance report id

generated for continuous assessment to know whether a student is eligible to write


the examination.
1.6
i.
ii.

EXPECTED TO CONTRIBUTION TO KNOWLEDGE


This project is used to tracking student attendance during lectures.
The program developed is to perform a better tracking student attendance every
day during lectures

CHAPTER TWO
LITERATURE REVIEW
2.1

HISTORY OF BIOMETRICS
Biometrics is authentic mechanism that is based on the unique attributes of

individuals. Biometrics is the technology that identifies people on a living trait such as
fingerprint recognition, voice, and handwriting analysis, retinal scan and hand
geometry recognition, the most obvious example is the human use of face recognition.
Automation recognition becomes possible within the last few decades with the
advancement of computer processing capabilities. The individuals biometrics
modalities vary in their stages of maturity. Fingerprint began the transition to
automation in the late 1960s, many method, such as gait are still in the research and
development stage and are not yet ready for development Pankanti, S (2006).
2.2

IDENTIFICATION TECHNOLOGIES USED IN BIOMETRICS

2.2.1 FINGERPRINT
This reads the unique patterns of lines on the of a finger, or compare the ridges
or point where the ridges join or end. Some method counts the number of ridges
between points, processing the fingerprint image and recording the prints sound wave.
It is quite easy to use, and it has proven effective in many large scale systems over the
year of use. it is noted that fingerprint are unique to each to finger of each individuals
and ridge arrangement remains permanent during ones lifetime. Although, an

individual age and occupation may cause some sensor difficulty in capturing a
complete and accurate fingerprint image.
2.2.2 EYE RECOGNITION (IRIS)
Research has established without doubt uniqueness of retinal and iris pattern to
update, no one has successfully fooled a retinal-scanning device. Now, device can
capture an image (iris image) from over a meter away. Iris scanning device are in
bulky and time consuming. It requires no contact and believed to be highly stable over
lifetime. Acquisition of an iris image requires more training.
2.2.3 FACES
Face: it is human beings identify one another. It is a natural, non-intrinsic
identification method that will work on just about anyone. Expression variation,
change in hairstyle, facial hair, glass movement I using facial verification. They have
commonly available sensors (camera), it requires no contact and it easy to verify
results.
2.2.4 HAND GEOMETRIC
Hand geometric system measure the shape of the hand may be dirty or scarred.
Such system however are bulky, making them more welcome than voice or iris
recognition technology and they are less accurate than fingerprints system. It is easy to
capture and believed to be a highly stable pattern over the adult lifespan. It is not
sufficiently distinctive for identification large dtat bases usually used for verification
of a claimed register as, a member of student.

2.2.5 VOICE
People are most comfortable and familiar speaking into a device in order to
identify themselves. Voice identification is not as accurate as other methods as it has
tends to reject genuine users due to background noise. It is also insecure for use in
high security market and too slow for customers service application such as ATMs or
phone banking. It has commonly available sensors (telephones, microphones)
although it is difficult to control sensor and channel variances that significantly impact
capabilities. It is also not sufficiently distinctively for identification over large data
bases.
2.2.6 SIGNATURES
Authorized user can sign a document into an electronic writing tablet and seal
it, so it can be viewed but not tampered with. The technology is by far one of the
cheapest biometrics available.
2.3

SELECTING A BIOMETRICS TECHNOLOGY


The effectiveness of a biometrics technology is dependent on the how and

where it is used, each biometrics modality has its strength and weakness that should be
evaluated in relation to the application before implementation. Key decisions in factor
for selecting a biometrics technology include evaluating the environment, throughput
need, population size and demographics, ergonomics, interoperability with existing
systems, user consideration etc. for example, an access control system to a coalmine,
where individuals will have very worn and dirty fingerprint reader. The careful

evaluation of the key decision factors play a crucial role in the success of selected
technology.
2.4

BIOMETRIC SERVICES
Common examples of biometric use involve controlling access to physical

location (laboratories, building etc.) or logical information (personal computer


accounts, secure electronic document, etc.). Biometrics can also be used to determine
whether or not a person is already in a database, such as for social service or national
ID applications.
Biometrics can be used in environments where recognition of an individual is
required. Applications vary and individual vary and range from logical access to a
personal computer, to physical access of a secure laboratory. They can be used in a
variety of collection environments as identification system. Biometrics are also used
for accountability applications, such as recording the biometrics identities of
individuals, boarding an aircraft signing for a piece of equipment, or recording the
chain of evidence of course, biometrics perform more reliably in controlled
environments such as outdoors.
The usefulness of biometrics varies from application to application to
determine its true benefit, one must first develop and understand the automated mean
for identifying of an individual or verification of a claimed identity. Before making a
decision, or it could cause extra cost savings through relocating security resources or
diminishing the expenses associated with password maintenance, or it could cause
extra costs by highlighting problems that were previously misses.

There has been a great deal of interest in using biometrics for verification of
identity. The interest is particularly acute in the areas of visa and immigration
documentation and government issued identification and programs.
2.5

BIOMETRIC SYSTEM

There major components are usually present in a biometric system they are:
1. A mechanism to scan and capture a digit or analog image of a living persons
biometric characteristics.
2. An interface with the application system that will use result to confirm an
individuals identity. It performs all the necessary pre-processing, it has to
remove artifacts from the cursor, to use some kind of normalization. It also
features need to be extracted. This step is an important step as the correct
features need to extract in the optimal way. A vector of numbers or an image
with particular properties to be used to create a template is synthesis of all the
characteristics extracted from the source, in the optimal size to allow for
adequate identificability. Enrolment is being performed, the template being
stored somewhere (on a card or within a database or both) if a matching phase
is being performed, the obtained template is passed to a matcher that compares
it with other existing template with the input. This will then be output for nay
specified use or purpose (e.g. time and attendance monitoring system).
2.6

TIME AND ATTENDANCE SYSTEM


Attendance by definition means the frequency with which one has attended

something. According to 9http://www.BNET.com/attendance.html), the attendance


tracking/monitoring system provide a platform to record attendance monitoring

software is a package consisting of written programs or procedure for tracking


attendance and time management. This software is mainly used to automate a labour
intensive activity.
Time and attendance monitoring system are mostly adopted in companies and
organization where presence of employees at works was normally noted in attendance
register. Time and attendance systems are designed to assist organization to effectively
manage the working hours of employees. They are paperless system used to collect the
work time of employees electronically, (www.timeclockplus.org).
Real time relate to computer system that update information at the same rate as
they receive input, enabling them to direct and process or event without delay. When
referring to time and attendance data, real-time operation is completely un-delayed;
that is, it is not stored and forwarded after any duration. Events are processed at the
time of input, whether by an employee, a manager, a supervisor or an administrator.
In this project, time and attendance during lecture is used to track students
attendance during lectures. This software package helps to monitor attendance of
individual during lectures unlike the use of traditional attendance registers.
The time and attendance system is solution for lecture that will keep accurate
record of students attendance by uniquely identifying student, automatically clock-in
student and generate clear and proper decision making report. The problems of not
proper monitoring attendance during lectures through manual attendance registers
affect proper evaluation and assessment of student. This makes it difficult for lectures
to do proper student assessment through the continuous assessment report.

This system will uniquely identify student with biometrics (automated


fingerprint identification system). Rather writing attendance manually, the student will
only place his/her registered or enrolled finger on a fingerprint scanner and the actual
time of attendance is recorded against the students name. This will make it impossible
for student to sign in their colleague.
2.7

SYSTEM FEATURES

The major of the system are


a)
b)
c)
d)
e)
f)
g)
2.8

Biometric identification and verification module using fingerprint scanner


Student listing
Lecture schedule
Attendance or clock-in tracker
Absence report
Attendance report
Continuous assessment report
BIOMETRIC IDENTIFICATION AND VERIFICATION MODULE
This feature through a minutiae-based algorithm will identify and verify

fingerprint scanner. This feature has a high priority.


The fingerprint scanner must be on at all times of lecture and ready to capture
fingerprint automatically and once a finger is placed on it. The solution must also
ensure that before a new student is added, the user is authenticated and has the proper
privilege level.
Authenticated fingerprint identification is the process of authentically matching
one or many unknown prints. It is a technique used in applications such as attendance
and access control system and it determines identity based solely on fingerprint.

Fingerprints are scanned to automated fingerprints identification system by rolling


print or by placing flat impression onto a glass platen above a camera unit. To match
the prints, fingerprints technicians or users scan in the print question and computer
algorithms are utilized to mark all minutia points, core and deltas detected on the print.
The fingerprint image processor will generally assign a quality measure that indicates
if the print is acceptable for searching. Fingerprint matching algorithm, print matching
aped, robustness to poor image quality. These are critical element of system
performance.

CHAPTER THREE
SYSTEM INVESTIGATION, ANALYSIS AND DESIGN
3.0

INTRODUCTION
In any software development project, it is imperative to carry out the system

study or system survey of what is obtained. This will enable the system developer to
have a good understanding of the working system. As stated in the introduction, the
methodology to be used for the development of the proposed system follows strictly
on object-oriented methodology. The process model to be used for the project is the
Booth, Jacobson and Rumbasugh, which is known as Rational Objectory process. This
is a process model that is structured along dimensions, e.g. time Dimension and
process Dimension.
The time dimension Structure would be used to model what exist in the
convectional or traditional attendance register and this would serve as a foundation to
determine the problem statement which will be examined in greater depth at the
elaborating phase. All of these would be diagrammatically shown by using unified
modeling language (UML).
The time dimension would help us to determine the scope and rational for the
project and this would lead us to the process Dimension, which would analyse how the
process System would be built. The deliverables from the time dimension will result in
the construction phase, which will involve series of iterations that build the system.
The process dimension explicitly shows how the system developer/analyst have been
able to understand and interpret the requirement of the user of the proposed system.

3.1

OVERVIEW OF TRADITIONAL ATTENDANCE REGISTER


During this course of project, Observation and investigation was made about

the traditional attendance register taken during lecture in order to elicit needed and
relevant information. This input and output of the traditional attendance register are
also noted.
In a typical attendance register for student, the student attends lectures, put
down or writes down his or her signature to indicate that the student is present during
the lecture. The lecturer may enter the information into a file based system on the
computer. The inefficiency of the file based system cannot be overemphasized; its
major problem is redundancy and can easily lead toss of data.
The output is the eligibility of the student to write exam and the continuous
assessment score generated based on the input supplied. Another peculiar problem that
may result with this procedure is the problem of missing attendance list as a result of
the sheer volume of data that processed, a summary of the activities performed a
typical learning environment is stated below, where attendance to lecture is been
taken.
This would be translated into the modelling diagrams.
Identified Activities
a.
b.
c.
d.
e.
f.
g.

Student register for lecture/course


Student attends lecture
Students Signs attendance list
Lecturer Compiles attendance list
Lecturer Computes Students eligibility to write exams
Student Checks for eligibility to write exam.
Lecturer Computes Continuous assessment Score

MODELLING DIAGRAMS
The unified modelling language, which is the modeling language of choice,
would be used to assist in diagrammatically analyzing the process that are involved as
well as exposed limitations that may exist in the typical/traditional attendance register.

Students

REGISTER FOR A COURSE


ATTEND LECTURE
SIGN ATTENDANCE LIST

COMPILES ATTENDANCE LIST

COMPUTE STUDENTS
ELIGIBILITY TO WRITE EXAM

CHECK ELIGIBILITY
COMPUTE CONTINOUS ASSESSMENT
SCORE

i.
ii.
iii.
iv.
v.

A student may put down the same of another student who is not in class during
lecture
Students through forgery can sign in for someone that is absent.
A wrong attendance list is eventually given to the lecturer.
A false continuous assessment grade is eventually generated
The attendance lists can get missing or damaged.

3.3 ACTIVITY DIAGRAMS


This is used to analyze the behavior within more complex use cases as well as show
interaction with each other. It models the workflow for use cases.
Top package: Student

Register for a course

Signs attendance list

Check eligibility to write exam

Attend lectures

Updates/compiles attendance list


Computes students eligibility to write exam
Computes continuous assessment score

Analysis of fig 3.2


The activity diagram shown above represents an implicit work of the use cases
3.5

RECOMMENDED ACTIONS
The only way out of the ineffectiveness and inefficiency and inaccuracy

identified is to employ the use of biometrics system with the computer; the problemsolving tool as an appropriate information system management tools. The world of
computing has been endowed with such vast tools database management software to
handle large volume of data as well as aid in the manipulating of data. The use of the

biometric device will identify an individual based on the unique attributes of the
person and verifies that person, the problems identify or in-personification is
overcome by this system.
With all these, the setback that may be associated with recruitment is diplaced.
Records are easily stored, referenced, sorted, accessed and queried. In addition,
virtually appealing informed and detailed reports would be generated to meet the users
of the system.
3.6

OVERVIEW OF THE PROPOSED SYSTEM


As a result of the traditional system evaluation and the recommendation given

above, it has become really imperative for us to design a system that would not
entirely replace the new system but rather incorporate newer functionalities to the
system in a bid to improve on the activities of typical attendance list.
The proposed system aims at eliminating the manual procedures used in
attendance registers. The proposed system which is a time end attendance biometric
system makes use of a biometric device, precisely the fingerprint scanner to capture
the fingerprint of each student. The time and attendance software stores the captured
fingerprint and records the attendance and time of entry student during a lecture.
3.6.1 HOW FINGERPRINT SCANNER WORKS
The fingerprint scanner is a camera device that is used to capture fingerprints.
Fingerprints may be scanned into an automated fingerprint. Identification system by
rolling prints or placing flat impression onto a glass platen above a camera unit. The
biometric image which is the fingerprint of an individual is capture during enrollment

process. The unique characteristics are then extracted from the biometric image to
create the users biometric template. This biometric template is stored against the
users bio data in a database for later use during an identity verification process.
During verification process, the fingerprint is again captured.
The unique characteristics are extracted from the biometric image to create the
users live biometric template. This new template is then compared with the
template previously stored and a numeric matching scale is generated, based on the
percentage of duplication between the live and stored template.
3.6.2 USE CASE DIAGRAMS OF THE PROPOSED SYSTEMS
The diagram below shows the actors and the use cases in the time and attendance
monitoring system. There are for actor in the system namely.
1.
2.
3.
4.

Student
Lecturer
Software administration
The system (software)

Enroll

Take lectures
Clock in the attendance tracker
View eligibility to write exams

This system also specifies the system and the users.


Enroll student details
3.6.3 ACTIVITY DIAGRAMS.

Edit student details


Manage software users

With all the input and output of the proposed system determined, we can proceed to
Generate attendance report

model the workflow and the system behavior of the use cases and actors we have
Generate absence report

identified. The appropriate modeling diagram is the activities that are to be modeled
Generate continuous assessment report

and represented in the design and implementation of the system. This diagram shows
Check eligibility of student

the activity of the time and attendance monitoring system.

Download attendance report


Download absence reoport

Download continuous assessment score


View student eligibility to write exam

Student

Software administrator

Administration

Lecturer

3.6.4 SYSTEM FLOWCHART


This is a design tool used in describing the system in a diagrammatic form by
showing the sequence of steps in the system and the relationship between them. It
shows how procedure are carried out in the system.
3.7

PROPOSED SYSTEM: INPUT AND OUTPUTS


In the proposed system, in order for the student to sign in during lectures, the

student needs to be enrolled first. This is done by the software administrator. The
paper based attendance is replaced by an electronic tracker that keeps track of student
lodge and this serves as an electronic attendance system. With this, checks can be

conducted as to the eligibility of the student (i.e. if the student can write exam or not).
The information gathered from the electronic tracker serves as input for the system.
The output of the systems are the generated that are useful for the lecturer.
3.7.1 BIOMETRICS IDENTIFICATION AND VERIFICATION MODULE
DESCRIPTION AND PRIORITY
This feature will through a minutiae-based algorithm identity and verifies
fingerprint capture by the fingerprint scanner. This feature has a high priority.
Stimulus And response sequence
a. Finger is placed on the fingerprint scanner
b. Finger is checked against database
c. If the fingerprint is not found in the database, the user is asked if a new staff is
added
d. If the fingerprint is in the database, the student is clocked-in
e. If the user replier in the affirmative, the software authenticates and ensure the
user as right to do this.
f. The fingerprint is stored along the new student bio-data
FUNCTIONAL REQUIREMENT
a. The fingerprint scanner must be on at all time during lectures is ready to
capture fingerprint automatically once a finger is placed on it
b. The solution must ensure that a new student is added; the user is authenticated
and has the proper privilege level.
3.7.2 CLOCK-IN TRACKER
DESCRIPTION AND PRIORITY

On identifying a fingerprint in the database, the feature records the use of checking in
of each student
Functional requirement
a. Once a student is identified his/her data must flash on the screen for 10 seconds
b. The solution must ensure that the computer clock cannot be tempered with, and
the database must be
c. The solution must ensure that the computer clock cannot be tampered with, and
the database must be sufficiently protected to ensure that no one can alter the
clock-in time

3.8

SYSTEM DESIGN

The design phase of this project is done using the conceptual and logical design of
software development.
Conceptual Design: this views the problem from the perspective of the user and the
business. The requirement that has been elicited from the user of the system is
translated in the design. In this project, the limitation of the traditional is translated
from the analysis phase to the design.
3.8.1 LOGICAL DESIGN
Logical design is define as the process of describing the solution in terms of its
structure and the interaction of its part from the perspective of the system developer.
Logical design
i.

Defines the constituents part of a solution

ii.
iii.
iv.

Provides the constituents part of a solution


Provides a frame work that holds all parts of the solution together
Illustrates how the solution is put together and how it interacts with users and
other solutions.

When creating the logical design of this project, I took into account all the users,
system and operation requirements that the need for security, logging, scanning, state
management, error handily, application architecture and integration with other system.

Some of the tables used by the database for the proposed system include;
1. Login Table
Field Name
Username

Field Type
Text

Field size
25

Description
It contains a set of characters that
contain numbers and symbols peculiar

Password

Text

25

to a unique user
It contains a

set

of

encrypted

characters

2. Attendance Table
Field Name
Name
Matric No
Date

Field type
Text
Number
Number

Field Size
50

Description
Contain the

25

(surname & lastname)


It contains the matric

10

associated with the student name


It contains the date the attendance is

students

full

name
number

Time of entry

Number

10

been taken
It contains the time each students
clock-in

3. Student Details Table


Field Name
Name

Field Type
Text

Field Size
50

Description
Contain the students full name

Matric No

Number

25

(surname & lastname)


It contains the matric number

Department

Combo

50

associated with the student name


It contains all the department list in
a drop down from and the students

Level

Combo

50

department is chosen out of the list


It contains all the level list in the
drop-down from and the students
level I chosen out of the list.

3.9 SUMMARY
With the system analysis and design carried out already, the identified objects
and component will then be translated to the next phase of software development. This
phase is the implementation phase. Each of the components wil be implemented using
various implementation tools that represent the system design. The proposed system

aims at perfecting all that has been the limitations of the typical time and attendance
monitoring system during lectures.

CHAPTER FOUR
4.0

SYSTEM IMPLEMENTATION AND PERFORMANCE EVALUATION

4.1

INTRODUCTION
The system implementation phase of a software system entails all procedures

that are carried out to put the computerized system into use. It is the process of
describing component, service and technology of the solution from the perspective of
developments required. There are different ways by which system implementation
may be carried out.
It could be a total changeover or parallel implementation. The method adopted
is determined by the nature of the system, the cost that will be involved in changeover,
time required, Quality of new system, impact on customers and technical issues.
System implementation phase include the following procedures;
i.
ii.
iii.

All manual automated into computer files


The use of the file based system is eliminated
System testing
The user interface is the link between the human user and the computer system.

It includes screens, reports and documentation. Simply, the user interface in any part
of the system the user comes in contact with. The solution must have attractive and
user friendly.

4.2.1 THE USERS OF THE SYSTEM

The users of this system are the lectures, students and the database
administrator.
4.3

REPORT DESIGN
The report generated from this system result generated from the attendance.
a. The continuous assessment report
b. absence report and,
c. Students eligibility.

4.4

SCREEN DESIGN
The screen design of this system has been putting into consideration all design

techniques and programming application. The screen is restful to at without dramatic


colour combination or large number of flashing signals. The screen design is
consistent and contains only relevant information; it is self-sufficient and selfexplanatory as a result of the graphical user interface technology. It is complemented
with error-handling mechanisms which handles errors perfectly. The screen layout is
made up of menus to facilitate easy usage of the application and to access the
command and tool contained in the application, control, from, image and icons.
4.5

INTERACTION STYLE
The interaction style used in this new application in user-friendly involves

direct manipulation where the user performs action on the screen corresponding to the
tasks to be carried.
4.6

HARDWARE REQUIREMENT
The Hardware requirement for the system include the following

i.

Computer: memory processor pc with 66mttzz or higher, Pentium or higher

ii.

processor required.
Memory: 16MB of

REM from windows 200 or later ( at least 32MB

recommended) information.
iii. Display: VGA or higher resolution monitor, super VGS recommended
iv. Hard disk: At least 20 GB hard required.
iv.7 SOFTWARE REQUIREMENT
a. Windows 2000 operating system
b. Internet explorers or any other browser
c. The system must have email to specified and be configured to send report via
email to specified location. The can be sent monthly or at the end of the semester.
d. Delphi programming language required to run application.
e. MS Access database: the back end functionality of the proposed system.
f. Conductivity to the database must be through ODBC (opening database
connectivity).
4.8
i.
ii.
iii.

SECURITY REQUIREMENTS
The database must not be accessible by unauthorized individuals/users
All password and fingerprints template stored in the database must be hashed.
The timer (clock) used by the solution must be secured and not be adjustable by
unauthorized individuals.

4.9

USER GUIDE

The required use components are:


i.
ii.
iii.

User manual
Online help
Online tutorials
The user interface of the system is a web user interface. A proficient user of the
internet will find the user interface self-explanatory.
4.10 TRAINING

The development software application has been done using design principle of
software development. It is design a consistent manner and users if the system can
easily identify with the functionalities of the system.
4.11 REVIEW AND MAINTENANCE
Operational software will need to be constantly reviewed and maintained in
order to ensure that the software still meet its initial objectives.
The system would also need to be reviewed and maintained periodically for the
following reason:
1. To ascertain that the system is able to cope with changing requirement of the
system as well as the user
2. To ensure that the requirement are met and to ensure that there is enough capacity
to modify the existing requirement
3. To deal with problem that many arise in operations.
Maintenance activities of a software system would be divided into:
i.
ii.
iii.

Corrective Maintenance
Adaptive Maintenance
Perfective Maintenance
The corrective Maintenance for the project would require running the codes and

locating errors that may result well as correcting the errors. Adaptive maintenance
would ensure that the developed system can be easily adjusted and up graded into
newer environment as well as accommodate changes in software and hardware
requirement. The system developed would run on any windows operating hardware
platform with the software requirements stated above.

The preventive maintenance on this system includes proper documentation of


all stages involved as well as the component. The documentation includes the
comments in the program codes as the user guide. Other forms of maintenance are
handling of the system component which include the power supply, memory, hard
drive and input devices.
In addition, newer version of application software should prompt the upgrade
of the system. A backup of the database should be carried out by the database
administrator.

CHAPTER FIVE
CONCLUSION AND RECOMMENDATION
5.0

SUMMARY
Developing an application from the stages of investigation into a fully

automated system is a very tasking one. It would be necessary at this point to state that
the objectives band expectations of the user of the operational software, the objective
as stated in chapter one of this project have been modeled and designed and has been
interpreted by the developer of the system.
It is also important to note now that a system of this nature cannot be written
without some obvious problems.
5.1

PROBLEM ENCOUNTERED
The major challenge encountered during the course of this project was

discovered that all that had to be analyzed and design were traceable to the objectives
and requirement of the system. Developing a detailed design of the proposed system
was quite tasking, but was surmounted through various consultations to references on
system analysis and design. This helped in realizing that the design stage was an
iterative stage and that every stage of a software development would always require an
analysis and a design process.
5.2

CONCLUSION
To conclude this project suggest ear length to be implemented as an ageing to

for the biometric system as a further step of improving the forgiving the sign of a

biometric system as it never stop growing in the beginning the ear could be used as an
ageing tools and can be combined with finger print biometric system until the
uniqueness to an individual of ear pattern is proving once its proving ear would be the
ideal trait for both providing identification and ageing tools.
5.3

RECOMMENDATIONS
I recommend that this further work may be carried out on time and attendance

monitoring system using biometrics. The system can be used in offices by Human
Resources department.
A client/server system may also be design to replace the stand alone windows
application used in designing the user interface.

REFERENCE
Bruce Mic Cowan, D.D. (2003): Analysis on Attendance system and procedure
microsoft publisher in conjunction with Log Mathew pg.22-33.
Mark Luaz David Aschur (1998), Introduction to biometric and eyes detection
system Brianland Publisher, London, England, pg. 345-390.
R Cappeli Mariod Maltoni J.C.(2004), wagman performance evaluation of
fingerprint verification system privacy sensitive secure personal identification
system Firstbamlian Publisher, pg. 20
Ososa B (2008), Automation for attendance system and logistic Osabth publisher,
Apapa (Oshodi Expressway) pg. 37-67
Jain, A Hony, L&Pankanti, S (2006) Analysis on Biometric system based on tracking
student lecture attendance Johnson and Son publisher pg. 23
Website Source
HTTP: www. Timeclockplus.org/real-time definition for the time and attendance
industry spr. 2008
HTTP.www. applied biometrics.com/back ground of biometrics/am/Feb.2008

You might also like