DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

329

DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

ABSTRACT

In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of employee absence in their workforce and the difficulty in managing student attendance during lecture periods. Fingerprints are a form of biometric identification which is unique and does not change in one’s entire lifetime. This paper presents the biometric attendance logging system using fingerprint technology for Students in a university environment. It consists of two processes namely; enrolment and authentication. During enrolment, the fingerprint of the user is captured and its unique features extracted and stored in a database along with the users identity as a template for the subject. During authentication, the fingerprint of the user is captured again and the extracted features compared with the template in the database to determine a match before attendance is made. The fingerprint-based attendance management system was implemented with Arduino Framework for the Hardware and Firmware while Microsoft’s C# on the. NET framework was used for the User Interface and Microsoft’s Structured Query Language (SQL) Server 2005 as the backend database. The experimental result shows that the developed system is highly vResearch would be useful to find improved ways of record keeping and co-ordination of existing records which will provide useful data for health promotion activities. Today in Nigeria, death by accidents far exceed those by any communicable diseases in the country, road accident have been recognized as a major public health problem in Nigeria for some time (Asogwa,1978).efficient in the verification of users fingerprint with an accuracy level of 97.4%. The average execution time for the developed system was 4.29 seconds as against 18.48 seconds for the existing system. Moreover, the result shows a well secured and reliable system capable of preventing impersonation

LEAVE A REPLY

Please enter your comment!
Please enter your name here