AUTOMATED FINGERPRINT AS A MEANS OF SECURITY

ABSTRACT
This project work is based on the simulation of fingerprints based biometrics, h is an application that allows the computer to be able to identify and confirm an employee in an organisation and to change from the old manual system of identification to the new system. Visual Basic 6.0 was used for developing the system because it is flexible and memory conserving. And to itself documentation, it is easy to understand and to overcome difficult tasks when compared with other languages. Microsoft Access 2002 is used for the database development and preferred query language is Structured Query Language (SQL) for record manipulation.

Related Post

TABLE OF CONTENTS
Title page
Certification
Dedication
Acknowledgement
Abstract
Table of contents
CHAPTER ONE: GENERAL INTRODUCTION
1.1 Introduction
1.2 Statement of the problem
1.3 Aim and objectives of the study
1.4 Significance of the study
1.5 Scope and limitation of the study
1.6 Definition of terms
1.7 Organisation of the report
CHAPTER TWO: REVIEW OF RELEVANT LITERATURES
2.1 Background knowledge
2.2 Computer Aided Learning/Instruction
2.2.1 Computer Aided Individual Learning
2.2.2 Computer Aided group Learning
2.3 Types of Computer Aided Learning Program
2.4 Benefits of computer aided learning
2.5 Limitation of Computer as a teaching aid
2.6 Artificial intelligence
2.7 Problems of artificial intelligence
CHAPTER THREE: PROJECT METHODOLOGY
3.1 Method of data collection
3.2 Analysis of data and the existing system
3.3 Problems of the existing system
3.4 Description of the proposed system
3.5 Advantages of the proposed system
3.6 Design and Implementation Methodology
CHAPTER FOUR: DESIGN, IMPLEMENTATION AND DOCUMENTATION OF THE SYSTEM
4.1 Design of the system
4.1.1 Output Design
4.1.2 Input Design
4.1.3 File/Database design
4.1.4 Procedure Design
4.2 Implementation of the System
4.2.1 Hardware Support
4.2.2 Software support
4.3 Documentation of the system
4.3.1 Program Documentation
4.3.2 Operating the system
4.3.3 Maintaining the system
CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 Summary
5.2 Conclusion
5.3 Recommendation
References
Appendix
Flowchart
Source code
Programs outputs

Contents

Recent Posts

Implementation of an Academic Research Paper Plagiarism Checker System

ABSTRACT The problem of plagiarism in Africa generally is growing at an alarming rate, especially… Read More

2 years ago

How to Write a Conclusion for your Final Year Project

In order to successfully complete a project for your senior year, you will need to… Read More

2 years ago

Google scholar project topics

List of Google scholar project topics Google Scholar is a convenient tool that enables users… Read More

2 years ago

How To Recover Your Money From COTP

If you lost money in a COTPS Ponzi scheme, you should talk to a lawyer… Read More

3 years ago

The Growth And Popularity Of Naira Marley Songs Among Students

EXECUTIVE SUMMARY This synopsis is on the Growth and popularity of Naire Marley songs amongst… Read More

3 years ago