Android Based Smart Attendance System
Android Based Smart Attendance System
Abstract—Attendance, being a priority for students, job holders Benefits of proposed techniques is also wary of some
and management has remain untouched with growing technical drawbacks and risks which needs to be drawn after substantial
vision. In this paper, we address the problem with the simplest results.
and efficient techniques overshadowed by glimpse of latest
computer and mobile techniques. II. EXISTING TECHNIQUES
Yet, pen and paper rules at places for taking attendance. We
keep registers full on records. But, Some organizations have
moved with time and adopted some other means like
Keywords- Android, Network Security, Cryptography, Normalized computerized attendance, biometric systems, RFID systems,
Database etc.. These techniques have their own pros and cons. Some
come with scalability issue, some faces reliability measures.
I. INTRODUCTION
Ease of use and mobility always remains a challenge.
Attendance is quite familiar for us, either students or teachers
or be anyone from working arena. Running fast for college,
company and telling friends for proxies, running for marking 1.Biometric Technique
attendance without parking our vehicles shows the priority of This technique stepped around five years ago and has taken
attendance in our life. Taking or giving attendance has become over at all places. This enable automatic personal recognition
an woo. We rely on conventional methods of pen and paper for based on physiological and behavioral characterisitics.
attendance. Though, some techniques evolved in recent span Biometric is defined as automated identification or verification
of time but doen't prove worthy. These are likes of biometric of human identity through the measurement of repeatable
system, RFID system, CCTV camera and more. In this paper, physiological and behavioral characteristics. This succeeded in
the proposed technique adds focus on mobility of use along removing proxies. It also stands good in reliability and and
with precision and optimum resource utilization. Common scalability but we can not have attendance of more than one
problems faced in existing techniques are data redundancy, person at a time. Even, Attendance Machine is stationary, That
unease of access, human errors, unsecurity and unefficiency. is not going to move. Despite these, it is used at most.[1]
Idea proposed is to use existing resources in way to save time,
money and energy. Along with to be scaled, skilled and
speedy enough. Technology already exists, we have to just use
them. Android mobiles lie in hand-to-hand. Everyone is aware
about quality attributes of android apps. Even mobile
processors are well enough for computations and storage
required at small scale. So we can have mobile applications
side. Now, comes the need of a powerful server which meets
the request of huge bunch of service-seekers. This can be
implemented either at intranet or internet as per organisation
demands. This server-client pair will add up much needed
facilites. Likes of dashboard, feedback system, library module,
payment window and much more can be implemented using
above platform. It will provide ease of access anywhere and
anytime. But, the simplicity of use adds the burden of design.
“More easy to use, Much Harder to design”
Proper and well tested security aspects has been taken care of.
Normalized database has its role with fast retrieval of data. Biometric Techniques[1]
2.Blue-tooth or Wi-Fi attendance System 4.Android Attendance
Attendance is being taken using instructor's mobile phone. A When we talk about android, it has recently a hot development
Software is installed in his phone which enables others to area. Android phones are no less than personal computers. We
interact and query. Blue tooth or Wi-Fi connection works for can implement and fulfill multi-fashionable requirements
marking one's attendance. Though connection is unique as per using this technology. Lots of applications has been designed.
Mobile's MAC_address. Still, chance of impersonation was Attendance Tracker is an pretty of example of this module. It
high in this module. First, availability of mobile was necessary has also proved reliable, mobile, scalable and speedy.
and secondly, impersonation was expected. As, anyone would Though , legacy products has been designed. Need differs
carry his her mobile phone and mark proxies. Scalability and from company to company. The simplicity of usage also lacks.
Reliability was an issue with this system. Mobility was well As simple it should be that Lehman can also come across and
supported. Proposed system is update of this module.[2] use it. Security in android is also an issue to be addressed.
Along with for proper analysis complementary computer
application requirement is there. In our proposed system we
have addressed all these design issues which proved
motivation for our research.[4]
III. COMPARISION OF EXISTING TECHNIQUES
1.Architecture
RFID Implementation Module[3] This design comprises of two mobile applications and a
complementary computer application acting as a server. One
application for professors for taking attendance and querying
RFID can also be used to spy. Hence, its usage is still not necessary informations. Other module for students in order to
preferred though it is a robust and versatile module. give their attendance. They can even give feedback using it.
Even can get their attendance anytime and anywhere. Any we not even gave a login for them. Just a prompt to retrieve
important information can be passed over the secure channel. required information.[4]
2.Implementation
Table Schema
Master_table prof_name,
prof_details(composite),
password(use SHA,MD5,DES
or AES encryption,
pid(primary key)
Student_table Class,div,roll,stud_name
class+div as candidate key
Class_table pid(reference key),
class(reference key),
div(reference key), subject,
cid(primary key)
Attendance_table cid(reference key),date,slot,lid
(primary key), cid+date+slot
as candidate key
Lecture_table lid(reference key),roll
Table Schema
Prof_table prof_name,pid(same as alloted
by admin),password
Subject_table Class,division,sub,sid
(primary key)
class+div+sub as candidate key
Student_table sid(reference key),
student_name, roll
Lecture_table Date,slot,sid(reference key),
lid(primary key)
Attendance_table lid(reference key),roll
Login Page
5. Left for implementation REFERENCES
Though, at this stage we have not designed an application [1] Samuel King Opoku, “An Automated Biometric Attendance
which has got rid of the time consuming process of taking Management System with Dual Authentication Mechanism Based on Blue-
tooth and NFC Technologies”, International Journal of Computer Science and
attendance. We can take advantage of available features of
Mobile Computing, IJCSMC, Vol. 2, Issue. 3, March 2013, pg.18 – 2, ISSN
android phones. Implementation of thumb or iris scanner can 2320–088X
solve such issue which will truncate both time consumption
and impersonation. But limitations of listening requests by [2] M. Mattam, S. R. M. Karumuri, and S. R. Meda, “Architecture for
server, authentication failed even by a little cut in hand, iris Automated Student Attendance,” in Proc. IEEE Fourth International
not scanned due to bad light left us empty-handed. But goal is Conference on Technology for Education (T4E 2012), pp.164-167, 18-20 July
2012, doi: 10.1109/T4E.2012.39.
there to not have manual system. Mixture of technologies as
use of RFID along with this module will solve the problem.
But we need simplification of tasks, not a burden. So, it will [3] T. S. Lim, S. C. Sim, and M. M. Mansor, “RFID based attendance
system,” IEEE Symposium on Industrial Electronics & Applications 2009
always be a field left for readers to have a system to address (ISIEA 2009), vol.2, pp. 778-782, 4-6 Oct. 2009, doi:
this issue. 10.1109/ISIEA.2009.5356360.
VI. CONCLUSION
VII. ACKNOWLEDGEMENT