Attendance monitoring as a context-aware service
|
|
|
- Martin Shepherd
- 9 years ago
- Views:
Transcription
1 Attendance monitoring as a context-aware service ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] DMITRY RAYCHUK [email protected] IGOR KHMELKOV IBS Group Holding Ltd. Dmitrovskoye shosse 9B, Moscow [email protected] Abstract: We propose an approach to attendance monitoring using mobile devices and the mobile device management infrastructure. Attendance monitoring is regarded as a mobile context-aware service that integrates with other services and information systems of the university. As a result, attendance tracking can be faster and more precise, using the best method that is available in the classroom where the educational event takes place. Key Words: Attendance monitoring, educational institutes, mobile device management, context-aware services. 1 Introduction Attendance monitoring is an important aspect of the educational process. Research suggests that a statistically significant correlation exists between the class attendance and the academic progress [1, 2]. The analysis of classroom attendance data provides instructors an insight into potential issues with course progress. At the same time, students are encouraged not to miss their classes if lecture attendance counts towards grading. Continuous monitoring of attendance may be obligatory for international students in relation to the country visa policy [3, 4]. Attendance checking is often performed in a nonautomated manner. For example, in St. Petersburg State Polytechnic University there are three common ways to check attendance. In small groups, the instructor records if a student is present when she sees this student. In larger groups, or when the instructor does not know students well enough, the instructor calls the roll. If calling over would take too long time, the instructor may choose to make students to write their names on a sheet of paper. Sometimes additional verification is performed to detect missing students who have been checked in by their classmates. The attendance data is usually processed by departments and by the university administration. The data may be collected using attendance reporting software or paper registers [3, 4]. Sometimes the attendance check process itself is automated [5]. In this paper, we survey existing approaches to the attendance check automation and propose a new way to integrate different methods of attendance tracking. We regard attendance monitoring as a context-aware service that uses class time and location to find the best available method of automated attendance tracking in order to make attendance check less disturbing for both instructors and students. 2 Related Work Attendance check can be automated. The necessary equipment may be installed in classrooms, or instructors and students can use their own mobile devices. The problem of attendance check automation has been researched by many authors. Let us review main approaches that have been proposed so far. The events of entrance and exit may be tracked using RFID sensors or other NFC devices [6, 7]. This method is commonly implemented in access control systems, so existing access management infrastructure can be used. The main drawback of the method is coming from the fact that students are identified by their access cards. If a student misses the class but has given her access card to a friend, she will be accounted as present. On the other hand, the need to put access cards close to the reader slows down entrance into the classroom, so the crowd at entry is more likely to form. Some students in the crowd may pass without being tracked, which leads to false negatives during attendance checking. ISBN:
2 Students can be identified based on their biometric data [8, 9, 10, 11]. Methods of this family are very accurate, and their usage makes cheating difficult. To implement biometric identity verification, special equipment and a database containing biometric data of all students are needed. As a less obtrusive method of biometric authentication, face recognition can be employed [12, 13]. Authors of [13] propose to use face-based authentication at entry. In the paper [12], the video of the class is recorded during the lecture. This approach is attractive because it does not distract students, and may be combined with ordinary lecture recording. On the other side, common face recognition techniques have somewhat inaccurate (e.g., precision is 80% in [12]). There are commercial access control systems based on face recognition, but the number of users is limited. E.g., devices by ZK Technology [14] allow up to 500 different faces. As large institutions have several thousands of students, face-based attendance tracking may be hard to implement. Students can also be identified using their mobile devices, such as smartphones [8, 15, 16]. A mobile device may be used as an authentication token or as a computer that communicates with attendance management system. As an authentication token, the device provides a unique key using Bluetooth, NFC or other available media. When a mobile device is used as a computer, its camera, microphone, and other peripherals can be involved. For example, the paper [16] describes a method of attendance checking using QR codes. A random QR code is displayed to students using a projector. A student uses her mobile device to recognize QR code and to send a message to the instructors device. This message contains the data obtained from QR code and the identifier of the student. As the QR code is randomly generated, it is more difficult, although possible, to check in a missing student. 3 Attendance monitoring as a mobile context-aware service Each method of automated attendance monitoring needs a specific set of equipment to be installed in the classroom. RFID-based and biometric methods require a set of sensors. They may be easier to implement if the classroom already has an access management system using the same method of authentication. Attendance checking based on face recognition may be performed without preinstalled hardware, as it may be implemented using a portable web camera or a smartphone. However, for continuous recording of the audience during the lecture a stationary camera is more convenient. The mobile device based methods are most versatile as they can be used even in completely unequipped rooms. For example, when attendance is checked using QR codes, one can print the code on a paper sheet in advance, and set up an ad-hoc Wi-Fi infrastructure to receive attendance data. However, automated attendance tracking may be easier if additional devices are available. Although every classroom has a different set of authentication facilities, sticking to only one universal method that works everywhere, such as QR-code recognition, is not always appropriate. For example, if every student must use an RFID-based access control system to get into the classroom, there may be no need to check attendance again if the necessary data can be obtained from the access control system. Automated attendance monitoring software should be able to interact with all available authentication equipment to collect attendance data. It should also help instructor to select the best available method of attendance checking. As the survey [17] shows, more than 95% of university students in Russia use smartphones, tablet computers, or other mobile devices that can run userinstalled software. Therefore, a mobile device can be viewed as the main medium of electronic communication between the student and the instructor during the lecture. In particular, we propose to use mobile devices as the default authentication tool for attendance management. Unlike prior research, we regard attendance monitoring not as a stand-alone activity but as a service integrated with other mobile and information services of the university. To achieve this, it is necessary to identify the mobile devices that are used by students and instructors, and to connect them to the university network resources with appropriate permissions. This problem can be solved using the mobile device management (MDM) infrastructure [17, 18]. When a service is implemented using MDM infrastructure, it can obtain context information about the mobile devices that use it, like the time of the request, the location of the device, and the user identity. This reduces the amount of data that should be explicitly provided to the service, and makes the attendance monitoring more precise. That said, we propose to implement attendance monitoring as an MDM-based context-aware service. The paper [18] describes a set of mobile services that may be implemented using the MDM service of an educational institution. These services, among other things, provide information on schedule and classroom equipment, class membership, and mobile device location. The data is obtained from the institution information systems, and from the MDM ISBN:
3 server that updates location information in real time by communicating with mobile devices. Services are provided to the applications running on registered mobile devices, and to other services and information systems of the institution. Mobile services offer new options that simplify attendance monitoring. A common authentication service. A mobile device that has been registered in the MDM system becomes an authentication token for all services using MDM-based authentication. If a student replaces her smartphone, she needs only register her new device in the MDM system. Existing attendance records will not change. A centralized user database. The MDM system provides information on the user that owns a registered mobile device. If permitted by corporate rules, instructors may obtain the necessary data such as name, photographic image and curriculum of any student who has checked in. Automatic update of central attendance database. The results of attendance check may be automatically sent to the central server without diverting the instructor. Attendance history may be updated many times during the lecture, allowing recording not only the absence of a student but the late attendance too. The context of the attendance monitoring service includes the location where attendance checking takes place, and the time when it occurs. The use of context enables automatic search of information that is relevant to the specific lecture, and the following features become available. Access to the information on schedule. The list of students who should be attending the lecture becomes automatically available based on the schedule and the information on last-minute changes. Access to location data of specific mobile devices. Location data of students mobile devices may be used in attendance checking to discover cheating attempts. Knowing each other location also helps the instructor and the students to coordinate in case of unpredictable delays. Automatic selection of the best available method of attendance checking. If the attendance management service knows in which classroom the lecture takes place, it may automatically suggest the way the attendance should be tracked. Figure 1: Architecture of the attendance monitoring system The integration of the institutional services is a necessary condition for enabling these features. In particular, access control systems should provide authentication data to the authorized services, and attendance management service should have access to schedule and classroom equipment databases. Our main goal is to make attendance check transparent and as less distracting as possible for both the instructor and the students. To track the attendance, the service obtains the necessary information about schedule and students, takes into account the location of each students mobile device, and communicates with available authentication equipment in the classroom. The instructor may also manually correct the results of attendance checking to check in the students whose presence has been identified incorrectly. 4 Attendance monitoring use case The proposed system architecture is shown in Fig. 1. Main components of this architecture are the mobile device management system of the institution, the attendance management service, a set of access control and authentication systems installed in classrooms, and instructors and students mobile devices. During the lecture, the instructor starts the attendance management application on a mobile device, or on a classroom terminal. The application connects to the attendance management service and provides the context. If the software is running on a mobile device, the context is obtained using the MDM system. In case of the stationary terminal, the location context ISBN:
4 is known to the attendance management service as it is determined by the physical location of the terminal. Based on the context, the attendance management system responds with a list of students who should be present in the classroom. The system also discovers the authentication equipment that is installed in the classroom. The list of available methods of attendance checking is formed and displayed on instructors device. If an access control system is listed, the attendance management system tries to obtain attendance data from it. If successful, the attendance data is displayed to the instructor. If no attendance data is available, the instructor should initiate an attendance check using one of available methods. For example, let us suppose that the method based on QR code recognition is selected. The instructor shows the QR code to the students. If instructors mobile device is connected to the projector, the QR code may be generated automatically. Otherwise, the instructor should supply the correct code to the attendance management application, e.g., by scanning the QR code. To check in, every student should run the attendance management application on a mobile device and scan the QR code image. The recognized code is passed to the attendance management service. Using this code and the location of the device, that is obtained from the MDM system, attendance management service check the student in and marks her as present in the instructors interface. The instructor can also check in the students who have not been authenticated automatically. If the instructor decides to use other methods of attendance tracking, the attendance management service carries the communication with necessary authentication equipment. This process may be repeated multiple times, and the system can notify the instructor if an obligatory attendance check is missing. 5 Discussion and implementation The proposed approach to attendance management automation has some advantages. The attendance tracking is performed using the best available authentication methods. In particular, the attendance data can be obtained from the access control system, gathered using students mobile devices, or manually added by the instructor. The instructor has actual information about the students attending the lecture. The attendance management may be integrated with other services, such as polls and quizzes. To implement of the proposed architecture, it is necessary to analyze the existing infrastructure of the educational institution, and to ensure that all components communicate using the common protocol. However, the attendance management service does not depend on any specific components except the MDM server. It is possible to deploy the attendance management system together with the MDM system. Additional features may be added to it later, as far as new services are integrated with the common MDMbased infrastructure. 6 Conslusion In this paper, a set of known approaches to automated attendance tracking has been reviewed. Each of these methods requires a specific set of equipment. The most general method is based on students mobile devices. This method may be used even in an unequipped classroom. At the same time, other methods can be more convenient in specific circumstances. We propose a novel approach to implementation of attendance monitoring based on mobile devices. The attendance monitoring service is regarded as a context-aware service that is implemented using a mobile device management system. This service is integrated with other university services and information systems. The usage of contest and the integration of attendance monitoring and other services allows for selecting the best available method of attendance tracking, making attendance check less disturbing to both students and instructors. Acknowledgements: This research is a part of the joint project by IBS (Moscow, Russia) and St. Petersburg State Polytechnic University (St. Petersburg, Russia). This work is financially supported by the Ministry of Education and Science of the Russian Federation (state contract 02.G from ). References: [1] L. Newman-Ford, K. Fitzgibbon, S. Lloyd and S. Thomas, A large-scale investigation into the relationship between attendance and attainment: a study using an innovative, electronic attendance monitoring system, Studies in Higher Education 33(6), 2008, pp [2] M. Credé, S. G. Roch and U. M. Kieszczynka, Class Attendance in college. A Meta-Analytic Review of the Relationship of Class Attendance With Grades and Student Characteristics, ISBN:
5 Review of Educational Research 80(2), 2010, pp [3] The University of Sheffield. Student Attendance Monitoring Policy and Guidance for Departments (with effect from ), Retrieved from ac.uk/ssd/sam [4] University of West London, Student Attendance Monitoring Policy, Retrieved from policies [5] A. Ryman, New technology at NAU to track attendance, Retrieved from 12news/news/articles/2010/04/27/ nau-student-attendance. html [6] F. Silva, V. Filipe and A. Pereira, Automatic Control of Students Attendance in Classrooms Using RFID, ICSNC 08, 2008, pp [7] O. T. Arulogun, A. Olatunbosun, O. A. Fakolujo and O. M. Olaniyi, RFID-Based Students Attendance Management System, IJSER, vol. 4, issue 2, [8] V. Bhalla, T. Singla, A. Gahlot and V. Gupta, Bluetooth Based Attendance Management System, IJIET, vol. 3, issue 1, [9] P. Verma and N. Gupta, Fingerprint Based Student Attendance System Using GSM, IJSR, vol. 2, issue 10, [10] S. Rao and K. J. Satoa, An Attendance Monitoring System Using Biometrics Authentication, IJARCASSE, vol. 3, issue 4, [11] S. Kadry and K. Smaili, A Design and Implementation of a Wireless Iris Recognition Attendance Management System, Information Technology and Control, vol. 36, no. 3, [12] Y. Kawaguchi, T. Shoj, W. Lin, K. Kakusho and M. Minoh, Face Recognition-based Lecture Attendance System, The 3rd AEARU Workshop on Network Education, [13] J. Joseph and K. P. Zakharia, Automatic Attendance Management System Using Face Recognition, IJSR, vol. 2, issue 11, [14] ZK Technology web site. Retrieved from http: // [15] T. Jamil, Automatic attendance recording system using mobile telephone, 19th Telecommunications Forum, TELFOR 2011, 2011 [16] F. Masalha and N. Hirzallah, A Students Attendance System Using QR Code, JACSA, vol. 5, no. 4, [17] D. A. Ivanchenko, Mobile technologies management in the information space of modern institure of higher education, Higher Education in Russia, issue 7, 2014, pp [18] D. Yu. Raychuk, A. V. Samochadin, D. A. Timofeev, P. A. Rogov and D. A. Ivanchenko, Context-aware services for educational organizations, St. Petersburg State Polytechnical University Journal, issue 6(186), 2013, pp ISBN:
Architecture of a Platform for Building Context-Aware Educational Mobile Services
Architecture of a Platform for Building Context-Aware Educational Mobile Services ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] MAXIM MASLOV [email protected] Abstract:
Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 6, 76-81, 2014 Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring
A Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Bluetooth Based Attendance Management System
Bluetooth Based Attendance Management System Vishal Bhalla Dronacharya College of Engineering, Gurgaon, Haryana, India Tapodhan Singla Dronacharya College of Engineering, Gurgaon, Haryana, India Ankit
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
Fingerprint-Based Authentication System for Time and Attendance Management
British Journal of Mathematics & Computer Science 5(6): 735-747, 2015, Article no.bjmcs.2015.053 ISSN: 2231-0851 SCIENCEDOMAIN international www.sciencedomain.org Fingerprint-Based Authentication System
A Survey on SMART CONNECT an Android and Web Based Application for College Management System
A Survey on SMART CONNECT an Android and Web Based Application for College Amita Dhale, Madhav Mistry, Tushar Zore Department of C.E., B.D.C.E., Sewagram, Wardha Abstract: In recent years the Android Technology
INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM
Journal of Computer Science 10 (2): 361-365, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.361.365 Published Online 10 (2) 2014 (http://www.thescipub.com/jcs.toc) INTEGRATING RADIO FREQUENCY IDENTIFICATION
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
NFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
Fingerprint-Based Authentication System for Time and Attendance Management
1 2 3 4 5 6 7 8 9 10 11 12 Fingerprint-Based Authentication System for Time and Attendance Management ABSTRACT Ikuomola, Aderonke Justina Ondo State University of Science and Technology, Okitipupa, Ondo
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 8, August 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Online Attendance Management System Using RFID with Object Counter
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 3 (2013), pp. 131-138 International Research Publications House http://www. irphouse.com /ijict.htm Online
IT 101 Introduction to Information Technology
Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)
RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M.
International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi,
Classroom Management for Android
Classroom Management for Android (Android Teacher + Android Students) With the purpose to provide an infrastructure for 1:1 elearning in the classroom, the Classroom Management for Android is designed
Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial
WEB SERVICE FOR STUDENT ATTENDANCE MANAGEMENT SYSTEM
WEB SERVICE FOR STUDENT ATTENDANCE MANAGEMENT SYSTEM Anusha V Pai 1, Atul Krishna 2, Kshama P M 3, Menita Correa 4 1,2,3,4 Department of CSE, Canara Engineering College, (India) ABSTRACT Attendance is
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
BLUETOOTH ATTENDENCE SYSTEM
BLUETOOTH ATTENDENCE SYSTEM NAMIT SATIJA V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar, Gurgaon, India ABSTRACT These days, instructors
Monitoring solar PV output
Monitoring solar PV output Introduction Monitoring of your solar PV output is useful to see the actual outputs. This can be measured from the inverter and/or mains using current clamps or pulse meters
A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2
A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2 1 Applied Science University, Amman, Jordan 2 Zarqa University, Zarqa, Jordan ABSTRACT: The number of people using
City of Dublin Education & Training Board. Programme Module for. Mobile Technologies. leading to. Level 6 FETAC. Mobile Technologies 6N0734
City of Dublin Education & Training Board Programme Module for Mobile Technologies leading to Level 6 FETAC Version 3 1 Introduction This programme module may be delivered as a standalone module leading
A Foolproof Biometric Attendance Management System
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 433-438 International Research Publications House http://www. irphouse.com /ijict.htm A Foolproof
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
The Suitability of Native Application for University E-Learning Compared to Web-Based Application
The Suitability of Native Application for University E-Learning Compared to Web-Based Application Maya Novia Sari 1, Noor Azian Bt. Mohamad Ali 2 Department of Information Systems, Kulliyyah of Information
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
Sensors-enabled Smart Attendance Systems Using NFC and RFID Technologies
Sensors-enabled Smart Attendance Systems Using NFC and RFID Technologies Cheah Boon Chew,Manmeet Mahinderjit-Singh, Kam Chiang Wei, Tan Wei Sheng, Mohd Heikal Husin, Nurul Hashimah Ahamed Hassain Malim
Automatic Attendance and Mobile Learning System in Sensor-Enabled Heterogeneous and Dynamic University Environment.
Automatic Attendance and Mobile Learning System in Sensor-Enabled Heterogeneous and Dynamic University Environment. Odabi I. Odabi 1 and Erhiri Orobosa Jonathan 2 1 1 Dept. of Computer and Physical Sciences,
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Secure Testing Options for the University
Secure Testing Options for the University Jason Smith Innovation in Learning Center April 12, 2011 Introduction The University of South Alabama currently offers 350 fully online courses annually. In fall
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS
IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS Ajinkya Patil 1, Mrudang Shukla 2 1 Mtech (E&TC), 2 Assisstant Professor Symbiosis institute of Technology, Pune, Maharashtra,
EMPORIA STATE UNIVERSITYSCHOOL OF BUSINESS Department of Accounting and Information Systems. IS213 A Management Information Systems Concepts
EMPORIA STATE UNIVERSITYSCHOOL OF BUSINESS Department of Accounting and Information Systems IS213A Course Syllabus Spring 2013 MISSION STATEMENT: The School of Business prepares a diverse student body
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
SINGLE DEVICE FOR MULTIPLE TASKS
ViZRO s BioMate M043 SINGLE DEVICE FOR MULTIPLE TASKS Datasheet ViZRO S BioPad Vizro Technologies www.vizro.net INDEX 1. Introduction 2. Main Application Area 3.Technical Specifications 4.Product Picture
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Remote MasterMind for Mobility. Mobile Device Management Software
Remote MasterMind for Mobility Mobile Device Management Software Remote MasterMind for Mobility You have mobility devices in locations all across the area, state, or country. They are constantly on the
ENTERPRISE MOBILITY 2.0
Implementing a mobile project is no small task. The evergrowing choice of devices available, the complexity of back-end integration and the rapid evolution of mobile technologies can make it look like
INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 INTERMEDIATE ANDROID DEVELOPMENT Course Syllabus Course Number: APD-0248 OHLAP Credit: No OCAS Code: None Course Length: 120 Hours Career Cluster:
Secure Data Transmission Technique for iphone using Quick Response (QR) Code
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 53-62 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015
REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE
REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE Manoj Pandita 1, Pallavi Shinde 2, Dnyanada Shirsat 3, Seema Yadav 4 1 Student, Department of Information Technology, K.J
RETAILING STORE TRACKING CUSTOMER-FIRST. Customers have three currencies which they can spend: Money, Time and Emotion
CUSTOMER-FIRST RETAILING GROWING RETAIL SALES WITH CUSTOMER CENTRIC STRATEGIES By Jason Nathan STORE TRACKING HOW CUSTOMERS SHOP IN-STORE IN THE DIGITAL AGE When shopping, customers have three currencies
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
ITNW 2305 Network Administration COURSE SYLLABUS
COURSE NUMBER AND TITLE: ITNW 2305 Network Administration ITNW 2305 Network Administration COURSE SYLLABUS COURSE (CATALOG) DESCRIPTION: Topics include network components, user accounts and groups, network
Time recording with the Terminal B-web 93 00
Time recording with the Terminal B-web 93 00 Elegant design with innovative usability concept In pursuit of perfection «Perfection is achieved, not when there is nothing more to add, but when there is
Kilgore College Course Syllabus
Windows Server 2008 Active Directory Configuration (ITMT 2302) Credit: 3 semester credit hours (2 hours lecture, 3 hours lab) Prerequisite/Co-requisite: ITMT2301 Course Description A study of Active Directory
DETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...
The Development of a Web-Based Attendance System with RFID for Higher Education Institution in Binus University
EPJ Web of Conferences 68, 00038 (2014) DOI: 10.1051/ epjconf/ 20146800038 C Owned by the authors, published by EDP Sciences, 2014 The Development of a Web-Based Attendance System with RFID for Higher
Role of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 [email protected] *: In collaboration with colleagues from
Remote MasterMind for Mobility 2.5. Mobile Device Management Software
Remote MasterMind for Mobility 2.5 Mobile Device Management Software Remote MasterMind for Mobility 2.5 You have mobility devices in locations all across the area, state, or country. They are constantly
Ingenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction
AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction 2 Introduction Biometric Attendance System based on Aadhaar Authentication Attendance System with real time monitoring Comprehensive
ImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Videofied Video Verification A Guide for Central Monitoring Stations
1 Contents Glossary... 2 What is Videofied?... 3 Secure Wireless Communication... 3 How does it work?... 4 System Architecture... 5 Frontel Receiver Server Specifications... 5 Port information... 5 Video
How To Design A Mobile Express Delivery System For Courier In Nigerian Nigeria
Design and Implementation of a Mobile Express Delivery System Azeta, A. A., Ogunlana A. O. and Ezeh C. O. College of Science and Technology, Covenant University, Ota, Nigeria. [email protected], [email protected],
Context-aware Library Management System using Augmented Reality
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
Access Control and Management System Based on NFC-Technology by the Use of Smart Phones as Keys
Middle-East Journal of Scientific Research 21 (7): 1130-1135, 2014 ISSN 1990-9233 IDOSI Publications, 2014 DOI: 10.5829/idosi.mejsr.2014.21.07.21578 Access Control and Management System Based on NFC-Technology
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology,
Mobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
Phase 2 The System Specification
Team W2 Video-Conferencing-Based Classroom Extension Sergio Bana Andrew Carland Matt Dyson Sarah Jordan Andrew Wantuch Phase 2 The System Specification 1 P a g e TABLE OF CONTENTS 1. INTRODUCTORY PROBLEM
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
AcroWiFi. Professional WiFi Connectivity Service. Detailed Service Catalog
AcroWiFi. Professional WiFi Connectivity Service. Detailed Service Catalog Service Overview We live in an era of technology and connectivity. With the explosion of mobile devices such as laptops, smart
Instructor: Michael J. May. Semester 1 of 5774
Syllabus for SE 14-428: Advanced Computer Networks Department of Software Engineering Achi Racov School of Engineering Kinneret College on the Sea of Galilee Instructor: Michael J. May Semester 1 of 5774
Continuous Biometric User Authentication in Online Examinations
2010 Seventh International Conference on Information Technology Continuous Biometric User Authentication in Online Examinations Eric Flior, Kazimierz Kowalski Department of Computer Science, California
Summer Project Report. Fingerprint Based Attendance System
Summer Project Report On Fingerprint Based Attendance System Advisor Prof Amey Karkare Submitted by- Rajat Chaudhary Priyaranjan Deepak Kumar Durgesh Deep (Group 02) Introduction The most common means
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Yu-Cheng Lin, Yu-Chih Su, Yen-Pei Chen Department of Civil Engineering, National Taipei University of Technology, No.1.Chung-Hsiao E.
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will
Asset Inventory Reference
www.novell.com/documentation Asset Inventory Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
EMV mobile Point of Sale (mpos) Initial Considerations
EMV mobile Point of Sale EMV mobile Point of Sale (mpos) Initial Considerations Version 1.1 June 2014 2014 EMVCo, LLC ( EMVCo ). All rights reserved. Any and all uses of the EMV Specifications ( Materials
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0
Transforming Healthcare Delivery through Mobility Solutions A Solution White Paper - version 1.0 HTC Global Services HTC Towers, No. 41, GST Road, Guindy, Chennai - 600 032, India. Ph: +91 44 4345 3500
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
Privacy preserving technique to secure cloud
Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India [email protected] Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,
Smart Shopping- An Android Based Shopping Application
Smart Shopping- An Android Based Shopping Application 1 Adarsh Borkar, 2 Madhura Ansingkar, 3 Monali Khobragade, 4 Pooja Nashikkar, 5 Arti Raut 1,2,3,4 Department of Computer Science and Engineering, 5
Mobile Application Performance Testing
StarBase Insight Mobile Application Performance Testing Introduction Purpose This discussion paper aims to educate the reader about mobile applications and demystify their performance testing needs by
Windows Server 2008: Server Administration (ITMT 2351)
Windows Server 2008: Server Administration (ITMT 2351) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Knowledge and skills for the entry-level
SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
Patch Management Reference
Patch Management Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically
A guide to access control for manufacturing sites
A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round
