Attendence System
Attendence System
INTRODUCTION
criterion which is used for various purposes. These purposes include record
attendance is required in most institutions and this policy has not been adhered to,
because of the various challenges the present method of taking attendance presents.
This traditional method involves the use of sheets of paper or books in taking
student attendance. This method could easily allow for impersonation and the
and it is difficult to ascertain the number of students that have made the minimum
percentage and thus eligible for exam. Thus, there is a need for a system that would
of a particular student in a particular class. This system will also help in generating
1
Rather than signing an attendance sheet, individuals will pass their thumb over the
users, and once a match is made, the individual will be registered as having
The paper discusses related works in the problem domain; highlights the general
overview of the proposed system; details design considerations of the system, both
at the hardware and software level; discusses the operation and how the system
was tested in conformity to system design and functional objectives; concludes the
The traditional system is still mostly used in lecture room or examination hall in
most institution today. Lecturer or instructor will give out a sheet of paper
containing list of student’s name to sign or in some cases, the student will be the
ones to write their names, student id and matriculation number to indicate their
For example, another student can easily sign an attendance on behalf of another
will be employed to track and keep the attendance of every student in a particular
2
class. Fingerprint is unique feature for everyone compare to using barcode in smart
cards. Therefore, this system designed in this project work is not based on the
existing barcode system. Tracking and monitoring student time of attendance could
be tedious, time consuming and more susceptible to errors. The security of the
existing attendance system that are now use in classroom (signature system) can be
easily compromised. Some students can master other student’s signature. Thereby,
helping their colleague who are absent for a particular class to sign the attendance
system designed in this research work for student is a more secure platform where
The aim of the study is to design and develop a reliable, scalable and cost effective
i). To carry out the analysis of manual processes involved in class attendance and
examination attendance.
3
1.4 Significance of the Study
The System for Students using fingerprint Biometric will eliminate the use of paper
in manual signing processes and all the risk associated with it. One of the risks of
using a paper in class attendance is that it can be easily misplaced and students
cheat by signing for each other not present in the class thereby defeating the aim of
taking the attendance. Tracking and monitoring students time of attendance could
be tedious, time consuming and susceptible to error. Thus, the System will
The System also allows the institution management to track or investigate student
class attendance in a particular course having poor attendance thereby enabling the
system provide high level of security whereby making it impossible for imposters
and impersonators in making their ways to examination halls. The System using
fingerprint Biometric will keep historical data making it easy for lecturers to access
during which heavy security are normally deploy to validate student’s identity in
order to cob imposters, with the use of Authentication System the number of
security personnel will be greatly reduce. Most lecturers’ handout sheet of paper for
4
their class attendance, which can easily be misplaced or damaged and poses a lot of
stress in cumulating grades for their students. The system allows the lecturer to
monitor each student attendance, track down truants and take the appropriate action.
Thus, the system eliminates all these downsides. The Authentication system is not
only useful to the institutions and lecturers alone, even the students benefit a great
deal by reducing the stress in queuing up which result in delay and often time in the
damage of the attendance sheet. It also prevents mistakes and anomaly that is
associated with manual signing in which student that attend a class are marked as
not present thereby losing the mark accorded to the particular attendance due to
The scope of this work is to develop an Attendance management System that will
authentication for proof of attending a class. The system will be a window based
programming language for building the user interface and Microsoft Access for
The efficiency of the scanner can be reduced due to the roughages in the captured
images which are often caused by worn-out or cut or dirt’s found on fingerprint.
5
Therefore, there is every possibility that enrolled users can be rejected by the
system. Also the scanner or sensor cannot distinguish between a real and an
fingerprint as in the case of password because user finger biometric. Finally, since
the system will be design using Visual Basic.net, it won’t be able to run on any
this Include Fingerprint, hand geometry, handwriting, iris, retinal, vein and voice.
fingerprint pattern.
6
CHAPTER TWO
LITERATURE REVIEW
2.0 INTRODUCTION
A number of related works exist on the application of different methods and
card and card reader serially interfaced to the digital computer system.
that authenticates using the iris of the individual. The system uses an off-line iris
recognition management system that can finish all the process including capturing
Attendance Management has also been carried out using attendance software that
implemented a system that authenticates the user based on passwords, this type of
system allows for impersonation since the password can be shared or tampered
with. Passwords could also be forgotten at times thereby preventing the user from
GPRS based student attendance system. These are all device-based solutions.
While GSM-GPRS based systems use position of class for attendance marking
which is not dynamic and if schedule or location of the class changes, wrong
(2006) based systems is that students have to carry RFID cards and also the RFID
detectors are needed to be installed. Pankanti, S., S. Prabhakar, and A.K. Jain.
(2002)
This system, however, is a cost effective simplified system that uses fingerprints
shared. It allows students to register for lectures with ease and eliminate errors that
are associated with attendance reports because the system generates reports at the
The word “biometrics” comes from the Greek language and is derived from the
words bio (life) and metric (to measure). Biometric systems use a person’s physical
they are who they claim to be. (Bolle et al, 2003) Biometric data are highly unique
8
to each individual, easily obtainable non-intrusively, time invariant (no significant
special training, (Jain, 1999). Biometric data are highly unique to each individual,
A physiological biometric would identify ones voice, DNA, hand print, iris A
access control include knowledge based methods such as password or pin and
token based method such as passport, driver’s license, ID card. These methods are
prone to fraud because pin numbers could be forgotten and hacked and the token
could be lost, duplicated or stolen, to address the need for robust, reliable and fool
o Uniqueness
9
o Measurability
o Performance
o Universality
2.3 IDENTIFICATION
A biometrics system searches the database for a match to the newly captured
sample, and grants access if it is found. Using a fingerprint as part of the login
the friction ridges and furrows on all parts of a finger. These ridges and furrows
present good similarities in each small local window, like parallelism and average
width.
10
However, shown by intensive research on fingerprint recognition, fingerprints are
not distinguished by their ridges and furrows, but by features called Minutia, which
are some abnormal points on the ridges (Figure 1.2). Among the variety of minutia
types reported in literatures, two are mostly significant and in heavy usage:
11
Fig. 2.2 features of finger print
Fingerprints are made of a series of ridges and furrows on the surface of the finger
and have a core around which patterns like swirls, loops, or arches are curved to
ensure that each print is unique. (Maltoni, Jain, Maio, Prabhakar,2004)An arch is a
pattern where the ridges enter from one side of the finger, rise in the center
forming an arc, and then exit the other side of the finger. (Henry, Edward,1990)
The loop is a pattern where the ridges enter from one side of a finger, form a curve,
and tend to exit from the same side they enter. In the whorl pattern, ridges form
circularly around a central point on the finger. The ridges and furrows are
characterized by irregularities known as minutiae, the distinctive feature upon
which finger scanning technologies are based. Minutiae points are local ridge
characteristics that occur at either a ridge bifurcation or a ridge ending. The ridge
12
ending is the point at which a ridge terminates. Bifurcations are points at which a
single ridge splits into two ridges. Minutiae and patterns are very important in the
analysis of fingerprints since no two fingers have been shown to be identical.
And identification:
Biometric authentication technologies such as face, finger, hand, iris, and speaker
recognition are commercially available today and are already in use. (Fernando L.
Podio: year) A biometric system is essentially a pattern recognition system that
operates by acquiring biometric data from an individual, extracting a feature set
from the acquired data, and comparing this feature set against the template set in
the database. Depending on the context, a biometric system may operate either in
verification mode or identification mode.(Anil, Arun and Salil,2004)
13
Number), a user name, a smart card, etc., and the system conducts a one-to-one
comparison to determine whether the claim is true or not (e.g., “Does this
biometric data belong to Bob?”). Identity verification is typically used for positive
recognition, where the aim is to prevent multiple people from using the same
identity. (O'Gorman, 2002.)
14
CHAPTER THREE
METHODOLOGY
Students can boldly enter the examination hall with prohibited materials without
being detected. Some who are not registered students of the institution often
receive huge amount of money from registered students in order to help them in
writing various examination, this they do with impurity.
a. Interview
b. Observation
Various methods were used in gathering data from students which include
interview and observation.
3.2.2 Observation
This is the direct aspect of data collection. In one of the just concluded exams, a lot
of students were arrested because the invigilators discovered that they were unable
to write their matriculation number correctly.
15
During their arrest, there was an up roar thereby disturbing other candidates in the
hall from concentrating on their exams. This would have been prevented if
biometric data machine had been introduced.
3.2.3 Interview
Having interviewed some students, over 80% of the students interviewed believed
that the introduction of fingerprints detecting machine will go a long way to
eradicating impersonation during examination especially in institution of higher
learning.
The existing system which makes use of mostly manual technique of student
verification such as photo cards which carries students’ passport photograph and
details and this serve as an entry key into lecture/examination halls through
verification by the examination supervisor. The problems with this method of
verification are
16
For attendance, the student places his/ her finger over the fingerprint device and
the student’s matriculation number is sent to the database as having attended that
particular lecture. At the end of the semester, reports are generated to specify the
students that are eligible for exams and percentage of times the student attended
lecture.
3.5 Objectives/Benefits Of The Proposed (New) System
Students who were once victims of impersonation will desist and take their
studies serious.
Impersonation and mercenary will be eradicated during examination.
Lecturers will be encouraged to put in their best in order to avoid any
occasion for cheating during examination.
Strangers/unregistered students will be discouraged from entering the
school premises.
Virtually all the students will be encouraged to study hard since there will
be no more room for impersonation.
3.6 High Level Model of the Proposed System
HOME
STAFF STUDENTS
During enrolment, the biometrics of the user is captured (using a fingerprint reader,
which are likely to be an optical, solid state or an ultrasound sensor or other
suitable device) and the unique features are extracted and stored in a database as a
template for the subject along with the student ID.
The objective of the enrolment module is to admit a student using his/her ID and
fingerprints into a database after feature extraction. These features form a template
that is used to determine the identity of the student, formulating the process of
authentication. The enrolment process is carried out by an administrator in the
attendance system.
During authentication, the biometrics of the user is captured again and the
extracted features are compared (using a matching algorithm) with the ones already
existing in the database to determine a match. The identification accuracy of a
biometric system is measured with the false (impostor) acceptance rate (FAR) and
the false (genuine individual) reject rate (FRR). The FAR/FRR ratios depend,
among other factors, on the type of difficulty of the algorithms used in the
fingerprint extraction. Usually, algorithms with high-medium complexity lead to
acceptable low FRR/FAR.
18
CHAPTER FOUR
19
4.3 Design of Input and Output of the Proposed System
In fact, any artificial language that can be used to define a sequence of
instructions that can ultimately be processed and executed by the computer
program. Many programming languages are currently in use today.
They include.
VISUAL BASIC
QBASIC
ORACLE
JAVA
HTML
ACCESS
Each of these languages has its own merits and demerits. Nevertheless, this
research work was done to favour interactive processing rather than batch
processing. Its interactive nature makes files processing more lively and makes for
immediate response. The tutorial nature of interactive system enables a layman
even to understand it easily and also for faster function. It is a stand. Alone
program that will be accessed by the account department only, irrespective of the
password.
On this note, the attendance management system was written with a well structured
query language, visual basic in particular, because of the following reasons.
1. The need to provide a graphic user interface (GUI) for the operator so as to
enhance operations of the program.
2. The simplicity
20
3. And module oriented nature of the software.
4. The ability of the software to connect to diverse database engineer, such as:
ODBC, Data Access, SY base and the like.
5. The fact that programs developed from visual basic can easily run on most
windows operating system that has the VBARUN DLL files (without actually
requiring the installation of the VB compiler).
6. The fact that it has sufficient storage management and facilitates easy retrieval
of information stored.
7. It is user friendly and easy to code, red and understand, since it is English like.
4.3.1 Program Flowchart
The program flowchart is drawn from the job specification of the analyst. It
consists of outline flowchart, which is an overview and sketch of the various
procedures, while the detailed chart involves processing operating and procedures
in the system. The system works on a central database. All outputs generated while
running the program are also sorted in the central database until they are needed
either for printing or viewing.
Normally, the program to suit the needs of the user will generate reports. And
besides, the system has been designed to work on a multi-user to en-corporate time
sharing facility.
21
independently of mother programs. The process of creating these instructions is
called the out of programming.
22
4.6 Program Structure
The program structure is a step that must follow the design of the output. The
success of any system development depends more on the design and file output.
This is because the coding of the program is done on the design inputs. The
program for this system will thus be:
23
4.6.3 Parallel Change Over
Here, the old and new systems are run concurrently using the same inputs. The
outputs are compared and reason for differences resolved until new system has
been proved satisfactory. At this point, the old system is discontinued and the new
system takes its place.
24
4.6.7 Maintenance
Once the implementation process is complete and the system is operational, there
is a tendency to have a sign of relief but it is importance to follow up
implementation with an evaluation process to ensure that the original objectives are
being reached. Thus, program evaluation is defined as a detailed measure of
performance against standard, which form a basis of comprise. On the other hand,
program maintenance has to do with maintaining the system to ensure that the
necessary subsystems are functioning and this may lead to at times possible
updates to the database program. Attention should be given to various aspects like
the user and the kind of work that will be done. Finally, time productivity and cost
may be some criteria that will serve as standard of measuring the data base
performance (new system).
26
CHAPTER FIVE
5.2 CONCLUSION
The system successfully took the attendance both at lectures and examinations.
The prototype successfully captured new fingerprints to be stored in the database;
scanned fingerprints placed on the device sensor and compared them against those
stored in the database successfully. The performance of the system was acceptable
and would be considered for full implementation especially because of its short
execution time and reports generation. Everyone who tested the system was
pleased and interested in the product being developed for use in schools.
5.3 RECOMMENDATION
The following suggestions should be considered in carrying out further work on
this study:
The system can be linked with the school’s central database so that the
student registration phase can be eliminated and the bio-data can be directly
from the database.
The university should acquire the fingerprints of all students at admission.
27
The components could be chosen and assembled in a commercialized
manner: instead of a stand-alone fingerprint scanner and a laptop, the unit
could have the fingerprint scanner, a small LCD screen and a keypad all
attached to the wall of each classroom.
The system could be modified into a web based system so that reports could
be generated anywhere
The system could be adapted for human resource use i.e. attendance,
pension, payroll processing, etc.
28
REFERENCES
29
Shoewu, O. (2006). “Radio Frequency Identification Technology: Development,
Application and Security Issues”. Pacific Journal of Science and
Technology.
Flowchart
30
31