Development of a Networked Thumb Print-Based Staff Attendance Management System
|
|
|
- Roderick Craig
- 10 years ago
- Views:
Transcription
1 American Journal of Engineering Research (AJER) e-issn : p-issn : Volume-03, Issue-03, pp Research Paper Open Access Development of a Networked Thumb Print-Based Staff Attendance Management System Tolulope Awode 1, Oluwagbemiga Shoewu 2, Oluwabukola Mayowa Ishola 3, Segun O. Olatinwo 4 1 Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. 2 Department of Electronics and Computer Engineering, Lagos State University, Epe Campus, Nigeria 3 Department of Computer Science, University of Lagos, Akoka, Lagos State, Nigeria. 4 Department of Computer Engineering, Moshood Abiola Polytechnic, Abeokuta, Nigeria. Abstract: - This paper focuses on the development of a networked thumb print-based attendance management system. Now, more than ever, it has become necessary to give more thought to the methods of time and attendance management. The traditional time clock, manual attendance registering often no longer makes sense and simply does not meet the needs of the modern work environment. This system offers a comprehensive software solution that will streamline company's operations, and simplify timekeeping. Nowadays, the need of a solution for Time and Attendance in the modern company is a necessity. It is important to be able to manage and control the workers by means of a system of control of times and schedules. Keywords: - Staff attendance management, networked thumb print, Service Oriented Application I. INTRODUCTION Centuries back, employees' attendances are captured by using attendance sheet. The attendance sheet is the paper used by the employer to take their employees' attendance. In the attendance sheet, the information needed are the employee s name, address and their signature. In this attendance, signature is really important because it is used to verify the employee's attendance. Time and attendance management is a system of monitoring employees work hours for the entire company and the analysis of various human resource figures such as overtime allowance, meal allowance, transport allowance and even bonus that are often derived from employee working hours. For the management level personnel, such a system allows them to monitor employee performance automatically and thus allowing them to evaluate if there are any loopholes within the system. It also keeps track of employees within the organization by forcing them to be accountable for their absences once again, better for the business than for the employee himself. That is why most bosses are eagerly engaging in implementing time and attendance management system into their standard operating procedures. In manual attendance system all work is done on paper. The whole session attendance is stored in register and at the end of the session the reports are generated. Some of the problems encountered with manual attendance system are: less user friendly, difficulty in report generation, manual control, lots of paperwork, and time consuming. The proposed system is allows efficient control of attendance and punctuality of all employees. It empowers management with real-time employee information and labour data such as working times, absences, attendance, tardiness and more. The system can be set up in companies/ businesses as a technology demonstration project wherein employees and visitors of the organization are tracked. It is the key to proficient and successful time tracking and management in your workplace. It enables you to collect and organize your employees time data simply and accurately. It represents the most state-of-the-art method of time management for today's businesses. II. Design Methodology Overview MATERIALS AND METHODS w w w. a j e r. o r g Page 121
2 This paper attempts to design and implement a networked thumbprint based attendance management system which requires that staff should register the attendance as soon as he/she gets to the office in the morning, and the Staff is expected to register at the end of the day s work. The proposed system is enhanced with advanced patented Biometric Technologies. It significantly simplifies the routine time management tasks and makes the procedures of registering the coming and leaving events quick, fool-proof and convenient. The proposed system performs: recording of employees arrival and departure events, accounting of work hours for each employee, department or company, automation of report, data export to.html,.xls,.xml,.pdf formats, storage and search of employees biometric records in the database, creation of Company s Divisional Structure, monitoring of employees activity, On-line notification to the Administration Officer on the presence of employees at their workplaces; Application Requirements The functional components employed by the proposed system are: fingerprint scanner, Griaule Fingerprint SDK, laptops, network, Service Oriented Application (SOA), Web Server, Back-End/Database, web camera Application Components The application components are subdivided into seven main components as shown in Figure 1. Application Use Case Figure 2 detailed the interaction between the application and the users (Administrators and the other users) also known as the actors can be explained in the diagram below: w w w. a j e r. o r g Page 122
3 The Administrator performs the following actions: manage users, manage attendance, manage deductions, manage faculty, manage departments, and manage reports III. FINGERPRINT MATCHING ALGORITHM Fingerprint Matching Given a reference representation in database and an input representation extracted from an input image, the matching stage determines the similarity of two fingerprint features and decides whether they are of the same finger. In most Automated Fingerprint Identification Systems (AFIS), the representation of fingerprints is based on minutiae such as ridge ending and ridge bifurcation, with each minutia being characterized by its locations and orientation. With this representation, the matching problem is reduced to a point pattern matching problem. In the ideal case described by Jain, the matching can be accomplished by simply counting the number of spatially overlapping minutiae. But in practice, the sensing system maps the three-dimensional finger on to two dimensional images. Once the location, pressure and direction of impression change, the mapping will change accordingly, which inevitably leads to nonlinear deformation of fingerprint images. Two fingerprint images may have translation, rotation or even nonlinear deformation between them. If the time span between two impressions is long, the images may also change due to cuts on finger or skin disease. In most systems, fingerprint is represented with a set of minutiae which is called Template. The representation itself may be noisy due to presence of spurious minutiae and absence of genuine minutiae. Also, the properties of minutiae such as the location and orientation may be inaccurately estimated due to image degradation and imperfect reprocessing. Considering these, a good fingerprint matching algorithm should meet the following two criteria: Be robust to all kinds of possible deformation which are commonly observed in fingerprints and are hard to model. Be robust to small perturbation on minutiae and minutiae properties. Several approaches have been proposed for point pattern matching, but these methods did not perform well because they did not make use of the extra information provided by fingerprint minutiae. Fingerprint Matching Based on Error Propagation After a fingerprint image is enhanced and thinned with image processing methods, the ridges associated with each minutia are tracked. The tracking procedure stops when the tracking length reaches a certain predefined threshold or another minutia is encountered on the ridge. The ridge sampling method is similar to that of Hong s. In order to overcome the ambiguity that orientation may cause, we use the direction of minutiae as x- coordinate in our sampling instead. Therefore, each ridge is represented by its direction and sampling values. And each minutia is repented by its type, position, direction as well as the ridges it resides (one ridge for an end and three ridges for a bifurcation). The matching algorithm is a three-step method: First, each minutiae in the reference template is matched with each minutiae in the input template and all resulting potential correspondences are used to find several most reliable one, the initial correspondences, using Hough transformation; Secondly, all minutiae surrounding the correspondence are matched and those minutiae pairs whose matching error are less than certain thresholds are added to the MatchedSet; Finally, we adjust the matching error of each unmatched minutia according to the information provided by the MatchedSet recursively until the number of elements in MatchedSet stops increasing. A conformation process which checks the consistency of the matching errors of elements in the MatchedSet is made to label and remove the mismatched minutiae after each iteration. Correspondence Estimation In the ideal case, the alignment of two point patterns can be precisely decided according to one correspondence. But in practice, we need more candidates to estimate correspondences robustly. To do this, we define two kinds of correspondences: End Correspondence and Bifurcation Correspondence. The similarity criteria are different in the two cases. Suppose that d and D (the reference and input features are denoted by lowercase and capital letters respectively) are the reference and input ridges respectively, d i and D i are the i th points on the ridges, and the Similarity S of two ends is defined in Equation 1. d i = Reference input in the i th points on the ridges D i = Input ridges in the i th points on the ridges S =Similarity of two ends (1) w w w. a j e r. o r g Page 123
4 L = Length of the shorter ridge. Here, nonlinear penalty function is adopted to ignore small deformation and emphasize large deformation because our goal is to find the most consistent area (the region around the correspondence) of the two templates. The similarity measure of bifurcation is composed of two parts, namely the sum of the similarity scores of the three ridges and the matching error of direction. Then the similarity measure of two bifurcations is defined in Equations 2 and 3. d 0, d 1, d 2 = reference ridges in the i th points on the ridges D 0, D 1, D 2 = three input ridges in the i th points on the ridges T 0,T 1,T 2 are the orientation of these ridges respectively. k = point on the ridge % = modulo operation S =Similarity of two ends (2) k = point on the ridge ʘ = i th input minutiae θ = i th template minutiae % = modulo operation (3) IV. RESULTS AND DISCUSSION User Interface of the System Design The Attendance Management System starts with the Administrator to preset the username and the password. Admin may also find it convenient to access the system with his private login password initially set by default to admin. The admin can create a new staff with the following fields: staff Id, surname, other names, phone no, department and address, etc. The fingerprint of staff is registered into the database through finger print reader and also the passport of the staff. Figure 3: Registration Interface Users Information The interface below shows the information of all the Users as registered in the database: w w w. a j e r. o r g Page 124
5 Figure 4: Attendance Record Showing Staff Information The primary key linking each table containing the records were indicated with a small key icon in each of the tables linked. The backend was implemented using microsoft SQL server Staffs Attendance and Report Figure 5 shows a staffs attendance for a day. The time at which the User clocks in will be recorded into the database. Figure 5: Daily Attendance Record Attendance Management The attendance of the Staff marked was documented and sectional reports based on the arrival list, departure list, all staff List, Truancy list, Lateness and Deduction based on the decision of the Administration. Figure 6: Arrival List Interface Figure 7: Departure List Interface w w w. a j e r. o r g Page 125
6 Figure 8: All Staff List Interface V. CONCLUSION Thumbprint based attendance system was aimed to address the shortcomings of existing means of taking attendance with a view of improving sanity and credibility of the education system in tertiary institutions and to keep the attendance of the staff for future reference. This also allows the implementation of the deduction on the staff that did not fulfill the basic requirement of marking their daily records. Employing the uniqueness and simplicity of thumbprints in the development ensured that the proposed aim of this work was achieved. Recommendations From the foregoing discussions, the following suggestions were made: The system could be used for attendance management system in an educational system but could also be adapted to benefit other similar areas such as industrial sector, banking sector, ministries among others. Also, staff may not prove their level of commitment to the work they employed for because many may come to mark attendance in the morning and leave the environs with the aim of coming back in the evening to sign out without doing any tangible work for the day. In lieu of this, it is recommended that the establishment should employ the use of access control database system that will only allow the employee (Staff) to open the door if and only if he signs out. This requires the use of fingerprint door. REFERENCES [1] AK Jain, A Ross and S Prabhakar. An introduction to biometric recognition, Circuits and Systems for Video Technology. IEEE Transactions. 2004; Vol. 14, Issue 1, p [2] HP Cheong and H Park. Fingerprint classification using fast Fourier transform and nonlinear discriminant analysis Pattern Recognition. 2005; 38, [3] Digital Persona. Guide to Fingerprint Recognition, Inc. 720 Bay Road Redwood City, CA USA, Available at: accessed November [4] F Zhao, X Tang. Preprocessing and post-processing for skeleton-based fingerprint minutiae extraction, Pattern Recognition. 2007; 40(4): p [5] Fingerprint Database (FVC2002). Available at: accessed July [6] U Halici, LC Jain, A Erol. Introduction to Fingerprint Recognition, Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press [7] E. Hastings. A Survey of Thinning Methodologies, Pattern Analysis and Machine Intelligence, IEEE Transactions. 1992; Vol. 4, Issue 9, p [8] HC Lee and RE Gaensslen. Advances in Fingerprint Technology, Elsevier Science, New York, ISBN [9] L Hong. Automatic Personal Identification Using Fingerprints. Ph.D. Thesis, ISBN: [10] D Maltoni, D Maio, AK Jain, S Prabhaker. Handbook of Fingerprint Recognition. Springer, New York, USA [11] K Manvjeet, M Singh, G Akshay, and SS Parvinder. Fingerprint Verification System using Minutiae Extraction Technique. World Academy of Sci. Eng. and Tech w w w. a j e r. o r g Page 126
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
Secured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Fingerprint-Based Authentication System for Time and Attendance Management
British Journal of Mathematics & Computer Science 5(6): 735-747, 2015, Article no.bjmcs.2015.053 ISSN: 2231-0851 SCIENCEDOMAIN international www.sciencedomain.org Fingerprint-Based Authentication System
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
Fingerprint-Based Authentication System for Time and Attendance Management
1 2 3 4 5 6 7 8 9 10 11 12 Fingerprint-Based Authentication System for Time and Attendance Management ABSTRACT Ikuomola, Aderonke Justina Ondo State University of Science and Technology, Okitipupa, Ondo
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)
AUTOMATION OF HEALTH RECORD MANAGEMENT USING SOME SELECTED HOSPITALS IN SOUTH WESTERN NIGERIA AS CASE STUDY
AUTOMATION OF HEALTH RECORD MANAGEMENT USING SOME SELECTED HOSPITALS IN SOUTH WESTERN NIGERIA AS CASE STUDY Kola Ayanlowo 1, O. Shoewu 2, Segun O. Olatinwo 3 1 Department of Computer Science, Moshood Abiola
Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
Research Article. ISSN 2347-9523 (Print) *Corresponding author Nathan David Email:
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):868-873 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Reliability of Fingerprint Verification in Ghana
Reliability of Fingerprint Verification in Ghana Osman Yakubu Garden City University College Department of Computer Science Kenyasi, Kumasi, Ghana ABSTRACT Biometric recognition refers to the automatic
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
SAMAY - Attendance, Access control and Payroll Software
SAMAY - Attendance, Access control and Payroll Software Welcome to a new world of comprehensive Human Capital Management (HCM) solutions from ISS. ISS SAMAY is a highly simplified HCM solution with an
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Defining AFIS Latent Print Lights-Out
NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
TouchPay Enabling the Future of Payments. Concept Document Stadium Ticketing and Registration Solutions
TouchPay Enabling the Future of Payments Concept Document Stadium Ticketing and Registration Solutions Problem Statement Stadiums in Southern Africa are seeking a simplified way of dealing with the following
Implementation and Security Development Online Exam, Performances and problems for Online University Exam
Implementation and Security Development Online Exam, Performances and problems for Online University Exam Mohammad Attallah Sarrayrih Information Systems and Technology Department, Sur University College
ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS
www.ijcsi.org 352 ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS Prof. Selina Oko 1 and Jane Oruh 2 1 Department of Computer Science, Ebonyi State University Abakaliki, Nigeria 2 Department of Computer
How To Improve Security Of An Atm
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
AIC Attendance Management System
AMS E 2 (V6.0) AIC Attendance Management System Enterprise Edition Specification 1. Enterprise Edition Transfer the application from server base to service. Import data automatically (prior schedule each
INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM
Journal of Computer Science 10 (2): 361-365, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.361.365 Published Online 10 (2) 2014 (http://www.thescipub.com/jcs.toc) INTEGRATING RADIO FREQUENCY IDENTIFICATION
A U D I T R E P O R T MARK J.F. SCHROEDER COMPTROLLER
C I T Y O F B U F F A L O D E P A R T M E N T O F A U D I T A N D C O N T R O L A U D I T R E P O R T Payroll Procedures of timekeepers MARK J.F. SCHROEDER COMPTROLLER A N N E F O R T I - S C I A R R I
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
Fingerprint-Based Attendance Management System
Journal of Computer Sciences and Applications, 2013, Vol. 1, No. 5, 100-105 Available online at http://pubs.sciepub.com/jcsa/1/5/4 Science and Education Publishing DO:10.12691/jcsa-1-5-4 Fingerprint-Based
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Time & Attendance System user manual. Version 3.17 BFLEX Attendance Software User Manual. Page 1 of 51
Version 3.17 BFLEX Attendance Software User Manual Page 1 of 51 Catalog Catalog... 2 1, How to installation... 4 2, How to login... 7 3, About the main window... 9 4, About the employee Profiles... 10
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Two novel characteristics in palmprint verification: datum point invariance and line feature matching
Pattern Recognition 32 (1999) 691 702 Two novel characteristics in palmprint verification: datum point invariance and line feature matching Dapeng Zhang*, Wei Shu Department of Computing, Hong Kong Polytechnic
Optical Character Recognition (OCR)
History of Optical Character Recognition Optical Character Recognition (OCR) What You Need to Know By Phoenix Software International Optical character recognition (OCR) is the process of translating scanned
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M.
International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi,
BioEnable SmartSuite Time Attendance Management Software Facts
FAQs BioEnable SmartSuite Time Attendance Management Software Facts How does BioEnable SmartSuite work? BioEnable Smartsuite uses a biometric device data that store a unique employee ID of each employee
Web Based. Fingerprint Time & Attendance Service
Web Based Fingerprint Time & Attendance Service Users' Guide (version 2.01 ) All Rights Reserved I.Q.S. Shalev Ltd. 1 Table of Contents: Introduction... 3 System Requirements:... 4 Warning... 5 Initial
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
PalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
EaSy: Efficient and Secure System for Utility Service Registration
EaSy: Efficient and Secure System for Utility Service Registration 1 Nor Zaidi Haron, 2 Siti Aisah Md Junos@Yunus, 3 Mohd Sa'ari Mohamad Isa, 4 Azmi Awang Md Isa *1 Universiti Teknikal Malaysia Melaka,
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
A Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
Pattern Recognition 43 (2010) 1050 -- 1061. Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 43 (2010) 1050 -- 1061 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr High resolution partial fingerprint alignment using
USAccess System- Registrar. Help Guide. Prepared for
USAccess System- Registrar Help Guide Prepared for United States Department of Agriculture Office of Security 300 7th Street SW, Washington DC 20024 Version 1.0 December 12, 2007 USAccess System Registrar
Challenges of Online Exam, Performances and problems for Online University Exam
www.ijcsi.org 439 Challenges of Online Exam, Performances and problems for Online University Exam Mohammad A Sarrayrih 1, Mohammed Ilyas 2 1 Information System and Technology Department, Sur University
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
Neovision2 Performance Evaluation Protocol
Neovision2 Performance Evaluation Protocol Version 3.0 4/16/2012 Public Release Prepared by Rajmadhan Ekambaram [email protected] Dmitry Goldgof, Ph.D. [email protected] Rangachar Kasturi, Ph.D.
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Timekeeping at USC Supervisor and Employee Responsibilities
Timekeeping at USC Supervisor and Employee Responsibilities Both supervisors and employees share responsibility for compliance with university policies established to meet the requirements of federal and
Fingerprint-Based Attendance Management System
Fingerprint-Based Attendance Management System 1 Sangeetha.J, 2 Sivaranjani.S, 3 Shalini.J 1, 2, 3 Student, Department of CSE, Panimalar Institute of Technology Chennai, Tamil nadu, India Abstract In recent
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 6, 76-81, 2014 Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2
Table of Contents. Table of Contents...2 BARAZA PAYROLL SYSTEM...3. Control Panel...5 MONTHLY PAYROLL...18 REPORTS...27
Table of Contents Table of Contents...2 BARAZA PAYROLL SYSTEM...3 Control Panel...5 MONTHLY PAYROLL...18 REPORTS...27 BARAZA PAYROLL SYSTEM As your organization grows, the demands on your operations ensure
ONLINE PERFORMANCE APPRAISAL SYSTEM
ONLINE PERFORMANCE APPRAISAL SYSTEM Ms.S.Priscilla Florence Persis B.Tech IT IV year SNS College of Engineering Coimbatore ABSTRACT : Online Performance Appraisal systems enable you to track and monitor
Easy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC
DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC 1,* John B. Oladosu, 2 Oludare Opaleye & 3 Olusayo D. Fenwa Computer Science and Engineering Department,
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Design of a University Portal with Biometric Lecture Attendance Monitoring System
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):847-856 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
SWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
OA101 Fingerprint Time attendance system Preface
Preface Honorable customers, Thanks for choosing products of this company. OA101, with world cutting edge technologies fingerprint recognition, computer communication, as well as microelectronics, is considered
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ATM SECURITY IMPROVEMENT USING FINGER PRINT Neelam Verma 1, Rakesh Patel 2, Priya Bag 3 Student,B.E.(IT) Kirodimal Institute of Technology,Raigarh(C.G.),India
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Wireless Fingerprint Based Attendance System Using Zigbee Technology
Wireless Fingerprint Based Attendance System Using Zigbee Technology Akshay v. Bhoyar, Shruti A. Borgave, A. S. Bhandare Department of electronics engineering,pvpit,sangli, Maharashtra Abstract- An effective
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
Enhanced Cloud Security through KFAC
Enhanced Cloud Security through KFAC Mahesh S Darak, Dr. N. K. Deshmukh Assistant Professor, School of Computational Sciences, S. R. T. M. University, Nanded, Maharashtra, India ABSTRACT: The current era
