AUTOMATED FINGERPRINT AS A MEANS OF SECURITY

271

ABSTRACT
This project work is based on the simulation of fingerprints based biometrics, h is an application that allows the computer to be able to identify and confirm an employee in an organisation and to change from the old manual system of identification to the new system. Visual Basic 6.0 was used for developing the system because it is flexible and memory conserving. And to itself documentation, it is easy to understand and to overcome difficult tasks when compared with other languages. Microsoft Access 2002 is used for the database development and preferred query language is Structured Query Language (SQL) for record manipulation.

TABLE OF CONTENTS
Title page
Certification
Dedication
Acknowledgement
Abstract
Table of contents
CHAPTER ONE: GENERAL INTRODUCTION
1.1 Introduction
1.2 Statement of the problem
1.3 Aim and objectives of the study
1.4 Significance of the study
1.5 Scope and limitation of the study
1.6 Definition of terms
1.7 Organisation of the report
CHAPTER TWO: REVIEW OF RELEVANT LITERATURES
2.1 Background knowledge
2.2 Computer Aided Learning/Instruction
2.2.1 Computer Aided Individual Learning
2.2.2 Computer Aided group Learning
2.3 Types of Computer Aided Learning Program
2.4 Benefits of computer aided learning
2.5 Limitation of Computer as a teaching aid
2.6 Artificial intelligence
2.7 Problems of artificial intelligence
CHAPTER THREE: PROJECT METHODOLOGY
3.1 Method of data collection
3.2 Analysis of data and the existing system
3.3 Problems of the existing system
3.4 Description of the proposed system
3.5 Advantages of the proposed system
3.6 Design and Implementation Methodology
CHAPTER FOUR: DESIGN, IMPLEMENTATION AND DOCUMENTATION OF THE SYSTEM
4.1 Design of the system
4.1.1 Output Design
4.1.2 Input Design
4.1.3 File/Database design
4.1.4 Procedure Design
4.2 Implementation of the System
4.2.1 Hardware Support
4.2.2 Software support
4.3 Documentation of the system
4.3.1 Program Documentation
4.3.2 Operating the system
4.3.3 Maintaining the system
CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 Summary
5.2 Conclusion
5.3 Recommendation
References
Appendix
Flowchart
Source code
Programs outputs

Contents

LEAVE A REPLY

Please enter your comment!
Please enter your name here