DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

ABSTRACT

In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of employee absence in their workforce and the difficulty in managing student attendance during lecture periods. Fingerprints are a form of biometric identification which is unique and does not change in one’s entire lifetime. This paper presents the biometric attendance logging system using fingerprint technology for Students in a university environment. It consists of two processes namely; enrolment and authentication. During enrolment, the fingerprint of the user is captured and its unique features extracted and stored in a database along with the users identity as a template for the subject. During authentication, the fingerprint of the user is captured again and the extracted features compared with the template in the database to determine a match before attendance is made. The fingerprint-based attendance management system was implemented with Arduino Framework for the Hardware and Firmware while Microsoft’s C# on the. NET framework was used for the User Interface and Microsoft’s Structured Query Language (SQL) Server 2005 as the backend database. The experimental result shows that the developed system is highly vResearch would be useful to find improved ways of record keeping and co-ordination of existing records which will provide useful data for health promotion activities. Today in Nigeria, death by accidents far exceed those by any communicable diseases in the country, road accident have been recognized as a major public health problem in Nigeria for some time (Asogwa,1978).efficient in the verification of users fingerprint with an accuracy level of 97.4%. The average execution time for the developed system was 4.29 seconds as against 18.48 seconds for the existing system. Moreover, the result shows a well secured and reliable system capable of preventing impersonation

Related Post

Recent Posts

Implementation of an Academic Research Paper Plagiarism Checker System

ABSTRACT The problem of plagiarism in Africa generally is growing at an alarming rate, especially… Read More

2 years ago

How to Write a Conclusion for your Final Year Project

In order to successfully complete a project for your senior year, you will need to… Read More

2 years ago

Google scholar project topics

List of Google scholar project topics Google Scholar is a convenient tool that enables users… Read More

2 years ago

How To Recover Your Money From COTP

If you lost money in a COTPS Ponzi scheme, you should talk to a lawyer… Read More

2 years ago

The Growth And Popularity Of Naira Marley Songs Among Students

EXECUTIVE SUMMARY This synopsis is on the Growth and popularity of Naire Marley songs amongst… Read More

3 years ago