OBCAMS: An Online Biometrics-based Class Attendance Management System
|
|
|
- Meryl Harvey
- 10 years ago
- Views:
Transcription
1 OBCAMS: An Online Biometrics-based Class Attendance Management System E. Adetiba & O. Iortim Department of Electrical & Information Engineering Covenant University Canaanland, Ota, Ogun State, Nigeria. A.T. Olajide Department of Computer Science Kwara State Polytechnics Ilorin, Kwara State, Nigeria R. Awoseyin Rollar Cecilee Communications Ibrahim Taiwo Road Ilorin, Kwara State, Nigeria ABSTRACT The importance of attendance taking and processing in educational institutions and corporate organizations cannot be over emphasized. Up till date, most institutions engage in the use of paper and pen in taking and processing of class attendance and this has proven to be very stressful, time consuming, unreliable, inaccurate and inefficient. However, it has been empirically proven over the years that no two human beings have the same fingerprint. Therefore, we adopted fingerprint biometrics in this work to develop an object-oriented web based software application named OBCAMS (Online Biometrics-based Class Attendance Management System) for processing and management of class attendance. The developed system is not only robust but trial tests conducted using 60 sample students in Covenant University, Ota, Nigeria, achieved an average of 89.33% accuracy for first signing attempt. Keywords: Attendance, Biometrics, Fingerprint & OBCAMS Reference Format: E. Adetiba, O.Iortim, A.T. Olajide & R. Awoseyin (2013). OBCAMS: An Online Biometrics-based Class Attendance Management System. Afr J. of Comp & ICTs. Vol 6, No. 3. pp INTRODUCTION The need for an effective and reliable attendance system in any organization (such as schools, banks, factories, hospitals and etc) has become of paramount importance as this can help determine the timeliness of any staff or student. In tertiary institutions in Nigeria for instance, it is mandatory for all students to make 70% attendance before they are eligible to write the exams in a given course. Hence, there has to be reliability and accuracy when taking this attendance. Apart from paper and pens used in taking attendance, a lot of researchers and designers have come up with various other methods in taking attendance. Some of these methods include: Web-Based, Smart Board, Mobile devices, RFID chips and Biometric based attendance systems. In biometric based systems, bio-features of each student such as their fingerprints, voice, face, palmprint and iris can be used to verify student s presence in class. Biometric methods are much more reliable, help to save the cost of producing smart (RFID) identity cards, easy to use and quite affordable. They have proven to be very handy in curbing the problems related to forgotten pins, lost cards, and the potential for misuse due to bullying. Instead of basing identity authentication on what someone possesses or what someone knows, biometric identification is based on what one is, or how one behaves. This approach to identification is made possible by technology developments that enable precise measurement coupled with computational power that allows measurements to be transformed into mathematical representations that can be rapidly compared [1]. 25
2 Fingerprint biometrics is one of the most common biometric methods and it has been used for more than one hundred years as a proof of individual identification for forensic and law enforcement purposes. These days with advancement in technology, fingerprints of individuals are acquired by electronic or optical sensors that turn patterns once only defined as whorls and arches into mathematical representations called biometric templates. A lot of research works have adopted fingerprint biometrics to develop electronic attendance system with remarkable benefits and some inherent shortcomings. Chitresh Saraswat [2] developed an Automatic Attendance System using Fingerprint Verification Technique. This work did not only focus on attendance management, but also on the specification of accuracy of the minutiae during enrolment and verification process. A high degree of accuracy in the enrolment and verification process was reported by the author, however, the attendance management software is a desktop application; hence it can only be used on standalone PCs where the application is installed. Rufai et. al. [3] developed a Biometric Model for Examination Screening and Attendance Monitoring. The model was developed to ensure that impersonation does not take place during examinations. The authors reported that the use of biometric devices helped to reduce impersonation since one student cannot misuse, forge or steal another student s biometric identity. However, it was reported that fingerprint scanners used tend not to read fingerprints properly and this lead to denial of some students from taking their examinations. Mohd Zamzury Bin [4] built an attendance management system using fingerprint scanner to monitor the students in lectures and tutorials in a more efficient way as compared to the traditional means of paper and pen. Meanwhile, the system is a windows desktop application which inherently imposed a constraint on prompt generation of students attendance report. Most fingerprint biometrics-based attendance systems developed so far are prone to the same shortcomings reported by the reviewed works in this paper, some of which include; low sensitivity of fingerprint scanner and standalone desktop based architecture. However, OBCAMS is developed to overcome most of these shortcomings. It is a web-based platform which can be deployed on a server within a campus wide intranet. With this kind of architecture, processing of attendance data that are captured from different classrooms are centralized on the server and reports can be generated, viewed and printed by any host(s) on the same network as the server. Also, SecuGen fingerprint scanner is adopted for capturing of students fingerprints. SecuGen Hamster Plus, the model utilized for OBCAMS is based on minutiae, the feature points around the core of each individual fingerprint. A portion of the minutiae is sampled from a captured fingerprint, processed using extraction algorithm and converted to a template which can be used for enrollment or matching [5]. The subsequent sections contain the design, implementation and performance evaluation details of OBCAMS. Figure 1. System Architecture 26
3 2. SYSTEM ARCHITECTURE The system architecture is comprised of both hardware and software components as shown in Figure 1. As illustrated in the diagram, the hardware components comprises of SecuGen Hamster Plus fingerprint scanner, Personal Computer (PC), IEEE b/g/n access point, Server computer and Printer. The SecuGen fingerprint sensor contains optic module, board with CPU, memory and embedded algorithms. The technical details are shown in Table 1. Table 1: Technical Specification of SecuGen Fingerprint Scanner [6] S/N Description Specification Image Resolution / Size Sensing Area / Platen Size Fingerprint Capture Time Light Source / Typical Lifetime CPU / Flash Memory Storage Capacity Minutiae Extraction Time Matching Time (1:1) Matching Time (1:N) Fingerprint Template Communication Speed (max) External Interface Dimensions / Weight Supply Voltage Current Consumption Operating Temperature Operating Humidity 500 DPI / 260 x 300 pixels 13.2 x 15.2 mm / 16.1 x 18.2 mm 0.2 ~ 0.5 second with Smart Capture LED / 60,000 hours 400 MHz ARM / 32 MB 3,000 Users (1:1 or 1:N) < 0.4 second < 0.1 second < 0.2 second SecuGen, INCITS 378, ISO ,800 bps (RS 232, CMOS Serial) RS232 Serial, Wiegand, GPIO 59 x 43 x 8 mm / 16 g 3.3 V DC 120 ma (idle), 320 ma (operating) -20o ~ 65o C 90% or less RH, noncondensing To achieve optimum result, the proper positioning of the finger on the scanner is essential. The pad of the finger (which is the fleshy part located near the middle of the first segment of the finger) should be placed at the center of the SecuGen scanner [5,6]. This is illustrated in Figure 2. The minimum configurations for the Server computer are; 4 Gigabyte RAM, 160 Gigabyte Hard Disk Drive (HDD), Intel Core 2 Duo Processor with a 22 Monitor. For the Client PCs, the minimum configurations are; 1 Gigabyte RAM, 40 Gigabyte HDD, Intel Dual Core Processor and 15 Monitor. The software components of the Server include Microsoft Operating System (Windows 7) on which Internet Information Server (IIS) is enabled. IIS is the web-server for hosting the OBCAMS web application. MS SQL is also installed on the server computer to serve as the database system for the platform. On the client system, Windows 7 Operating System which contains the Figure 2. Positioning of Fingers on the SecuGen Fingerprint Scanner [5] 27
4 Internet Explorer web browser is installed. The driver for SecuGen fingerprint scanner is also installed on the client system for communication between the fingerprint hardware and the client PC. Online Biometrics-based Class Attendance Management System (OBCAMS) Login module Admin module Lecturer module Student module Help module Figure 3. The Block Diagram of OBCAMS 3. LOGICAL DESIGN AND MODELING OBCAMS is a web application that was thoroughly designed, modeled and implemented with standard tools of software engineering. Software system design is a creative activity in which software components and their relationships, based on customer s requirements are identified. It is the process of defining the modules, interfaces and the architecture of the system to satisfy the user requirements [7]. Figure 3 shows the block diagram of the different modules in OBCAMS. We carried out various requirement analyses in this work in order to make the system very robust. A requirement states the attributes and characteristics that a system is expected to possess so as to meet the need of a user. In the object oriented analysis and design, Unified Modeling Language (UML) is used to model functional and behavioral attributes of software components and modules. The UML diagrams used here are Use Case, Class, Sequence and Activity diagrams [8].These diagrams capture the functional requirements, structure and behavioral dynamics of OBCAMS. 3.1 Use Case Diagram The Use Case model of the UML is used here to specify the functionality of the system from the users point of view and show the way the system and the users interact to achieve its stated functions and perform its goal. Figure 4 shows the Use Case diagram for OBCAMS. 28
5 Figure 4. Use Case model of OBCAMS The Use Case diagram in Figure 4 is explained as follows: Actor: Student Description: login to the application, go to virtual classroom, take attendance, view attendance status and logout Pre-Condition: the student must have his or her matriculation number and password created by the administrator. Flow of Events (Actor s description): i. The student logs into the online attendance management system, ii. The student goes to the classroom, iii. The student proceeds to sign his or her class iv. attendance. The student inputs his or her fingerprint on the scanner to verify his/her identity. v. The student then logs out. vi. Use case ends. 29
6 Actor: Lecturer Description: To view students that have signed, take attendance and view the attendance status of the students taking a particular course at a particular time. Pre Condition: This actor must be a staff of the University with a valid staff ID and password as created by the administrator. Flow of Events (Actor s description): i. The lecturer logs into the system. ii. The Lecturer goes to the classroom. iii. Lecturer views the list of students signed in to his class at the moment and can take his own attendance. iv. Lecturer then views the students attendance status for the day, week, month and semester. v. The lecturer signs out. vi. Use case ends. Actor: Administrator Description: To create accounts for all user groups, create courses, timetables, map out lecturers, student and their respective courses. Pre Condition: This actor must be conversant with how this system works as well as the pro s and con s of the system and has technical expertise. Flow of Events (Actor s description): i. The administrator logs in with his username and password. ii. The administrator creates the course and their respective course codes. iii. The administrator registers lecturers and students. iv. The Administrator creates a timetable as specified by the school management. v. The administrator the maps students and their respective lecturers. vi. Administrator logs out. vii. Use case ends. 3.2 Class Diagram Class diagrams are the most popular UML diagrams used by the object oriented community. It describes the objects in a system and their relationships. Class diagram consists of attributes and functions. A single class diagram describes a specific aspect of the system and the collection of class diagrams represents the whole system. Basically the class diagram represents the static view of a system [8]. The class diagram for the online attendance management system is shown in Figure 5. Figure 5. Class diagram of OBCAMS 30
7 Figure 6. Sequence diagram for student 3.3 Sequence Diagram Sequence diagrams show the relationships between the objects participating in a given use case. They help to identify interaction between objects, describe the flow of messages, events and actions between objects; Figure 6 shows the sequence diagram of the student (a use case actor), OBCAMS and the database. A use case is a collection of interactions between external actors and a system. 3.4 Activity Diagram Activity diagram is another important diagram in UML used to describe the dynamic aspects of a software system. Activity diagram is basically a flow chart of an objectoriented system used to represent the flow from one activity to another. The activity can be described as an operation of the system. So the control flow is drawn from one operation to another. This flow can be sequential, branched or concurrent. The modeled activity diagrams for OBCAMS are as shown in Figures 7,8 and 9 31
8 Figure 7. Activity Diagram for Lecturer Figure 8. Activity Diagram for Students 32
9 Figure 9. Activity Diagram of Administrator 4. WEB INTERFACE AND DATABASE DESIGN In dynamic web development, three main tiers are required which include; web server, server-side codes (using an appropriate server side programming language) and a database. Dynamic means that the user interacts more with the web site beyond just reading pages, and the web site responds accordingly. The function of the web server which in this case is the Internet Information Server (IIS) is to deliver web pages via an assigned IP address or a domain name [9, 10]. OBCAMS, which is a web-based system contains about a total of seventeen (17) web pages (both static and dynamic) which range from the index page, student page, lecturer page, administrator page, lecturer login page, student login page, admin login page and so on. The web pages were designed using a text editor known as Notepad++ and Microsoft Visual Studio 2010 which provides ASP.NET (the server side coding platform), HTML and CSS capabilities. The interconnection of the various web pages is illustrated in Figure 10 33
10 Figure 10. User Interface Interconnection 34
11 When the user enters the IP address of the server, a general homepage comes up. Depending on the login details of the user, the system redirects the user either to the student homepage, staff homepage or the administrator s homepage. If the user is a student he has the ability to redirect to the classroom page where he can take his/ her attendance. In the case where it is a lecturer, the lecturer can either view the compiled attendance list and percentage or go to the classroom page where he can view the students as they take their attendance. If the user is an administrator, he can navigate to create course, create timetable, register staff, register student and also register a course. All the users and activities details are stored or called from the database. Databases are central to all web applications. A database can hold almost any collection of information you may want to search and update. The database that was adopted for this work is MSSQL which is a relational database. It is accessed using the graphical user interface provided by the Microsoft SQL server 2008 Management Studio tool. The tool allows the database to be administered through the desktop application after installation. The database created for OBCAMS is titled TimeAttAspDb and it comprises of 10 tables. A table is a database object used to keep data. It is a set of defined, ordered columns (fields), which can contain any number of rows (records). A field is a single piece of information defined by type, length, and other attributes. A row or a record is a line of data specific to something or someone within a table. Some of the implemented web interfaces in OCAMS are shown in Figure TESTING AND PREFORMANCE EVALUATION The following tests were carried out in the course of and after the full implementation of OBCAMS. i. Unit Testing: The system is made up of several static and dynamic web pages. Tests were carried out on each web page to ensure that they work perfectly and independent of each other. ii. Integration Testing: Integration testing involves tests carried out on the individual web pages as they connect and link up with one another. iii. System Testing: System testing involves integrating all the system components to create a version of the system and then test the system as a whole. The focus here is testing the interactions between components. It checks that the components are compatible, interact correctly and transfer the right data at the right time across the interfaces. iv. Portability Testing: This involves a process of testing the ease with which the software application can be moved from one system or environment to another. In this project, the web application was initially tested using the Google Chrome browser as the default browser; it was then tested on the Internet Explorer browser. We ensured that the application s behavior across the different browsers is seamless. Performance evaluation was carried out to test the accuracy of the system to identify each of the students that was preenrolled in the database. We carried out 5 experiments using 60 final year students at the Electrical and Information Engineering Department, Covenant University, Ota, Nigeria. Each student was given an opportunity of 4 signing trials and the results for each trial was documented. Figure 12 shows the plot of the experimental results. Figure 11. Sample Web Pages in OBCAMS (a) 35
12 Figure 11. Sample Web Pages in OBCAMS (b& c) 36
13 OBCAMS Performance Evaluation EXPERIMENT 5 EXPERIMENT 4 EXPERIMENT 3 EXPERIMENT 2 EXPERIMENT EXPERIMENT 1 EXPERIMENT 2 EXPERIMENT 3 EXPERIMENT 4 EXPERIMENT 5 TRIAL TRIAL TRIAL TRIAL Figure 12. Performance Bar Chart for Students Attendance Signing in OBCAMS Table 2: Performance Results for Students Attendance Signing with OBCAMS S/N Trial Average Acceptance/ Successful Signing Percentage of Successful Signing ID Trial 1 Trial 2 Trial 3 Trial 4 TOTAL % 9.33% 1.00% 0.33% 99.99% As illustrated in the performance bar chart in Figure 12 and Table 2, for the first signing trial, 89.33% of the students were able to sign successfully, 9.33% needed to go for a second signing attempt, 1.00% needed a third signing attempt and only 0.33% of the students needed a fourth signing attempt using OBCAMS. This result is a very promising one since almost all the students (99.99%) can take their attendance within four trials. The Secugen fingerprint scanner utilized for this work is a very sensitive and fast device; hence, almost all the students have the privilege of signing electronically with very high acceptance rate using a biometric approach that out-rightly eliminates impersonation. 6. CONCLUSION The Online Biometrics-based Class Attendance Management System (OBCAMS) developed in this study is a robust platform that has the prospect of enhancing class attendance management in educational institutions. Our experimental results which produced 89.33% of first successful signing attempt are highly encouraging. However, in order to enhance the speed and efficiency of the platform, we hope to fine tune it both in hardware and software so as to achieve first signing attempt of 100% by all users. Also, in future upgrade of OBCAMS, we will incorporate Artificial Neural Networks and other computational intelligence strategies to further enhance the identification capability of the platform. 37
14 Vol 6. No. 3, September 2013 REFERENCES [1] Biometrics Background, Accessed from [2] Chitresh Saraswat, Amit Kumar, An efficient automatic attendance system using fingerprint verification technique, International Journal on Computer Science and Engineering, vol. 02, No. 02, pp , [3] M.M Rufai, J. O Adigun, N. A. Yekini, A biometric model of for examination screening and attendance monitoring in Yaba College of Technology, World of Computer Science and Information Technology Journal (WCSIT) ISSN: Vol. 2, No. 4, , [4] Mohd Zamzury Bin Abdullah Sanni, Attendance Management System Using Fingerprint Scanner, B.Eng. Degree Report, Faculty of Electronic and Computer Engineering, Universiti Teknikal Malaysia, Melaka, April [5] SecuGen USB Fingerprint Reader User Guide; Installation, Usage, Diagnostic Tools and Troubleshooting, , SecuGen Corporation, Accessed from ReaderGuide.pdf [6] Fingerprint Sensor OEM Modules, Accessed from [7] Barbara Kitchenham, Roland Carn, Research and Practice: Software Design Methods and Tools, Psychology of Programming, Academic Press Limited, ISBN , pp , [8] J. A. Hoffer, J. F. George, J. S. Valacich, Object- Oriented Analysis and Design, Modern Systems Analysis and Design Third Edition, 2002, Prentice- Hall, Inc., pp [9] Miles Tracy, Wayne Jansen, Karen Scarfone, Theodore Winograd, Guidelines on Securing PublicWeb Servers, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD , September [10] Available Web Server (IIS) Role Services in IIS 7.5, Microsoft, 2013, Accessed from: Emmanuel Adetiba bagged his first degree (B.Eng.) in Electrical Engineering at University of Ilorin in May After his NYSC, he proceeded to Covenant University to commence an academic career and obtained a masters degree (M.Eng.) in Electrical and Information Engineering in July He is a member of several professional bodies such as the Nigerian Society of Engineers (NSE), Institute of Electrical and Electronics Engineers (IEEE), IEEE Communications Society, IEEE Computational Intelligence Society, IEEE Computer Society, IEEE Engineering in Medicine and Biology Society. Also, he is a registered engineer (R.Engr.) with the Council for the Regulation of Engineering in Nigeria (COREN). He has received several international grants such as the IEEE EMBS Travel Grant (2012), Rockefeller/SAHIA Grant (2010), IMIA/HELINA Grant (2009) and others that have taken him outside the shore of Nigeria for academic conferences and workshops. His research interests include Biomedical Informatics, Applied Computational Intelligence, Genomics Signal Processing and e-learning. He is about to complete his Ph.D degree in Electrical and Information Engineering at Covenant University, Ota, Nigeria. He can be reached through phone( ) or ; [email protected] Oghenetega Iortim obtained his first degree B.Eng.(Hons) in Information and Communications Engineering (ICE) at Covenant University in June He has designed and developed several Web Applications and serves as a consultant to a number of Web hosting companies within and outside Nigeria. His research interests include e-learning and Web Applications development. He can be contacted via ; [email protected] Anthony T. Olajide is a graduate of Computer Science from the Federal University of Technology, Minna, Niger State. He is currently a Lecturer int Kwara State Polytechics at the Computer Science department. His research interests include e- Learnig and Data Mining. [email protected] Richard Awoseyin graduated with a B. Sc degree in Electrical/Electronics Engineering from Obafemi Awolowo University, Ile-Ife, Nigeria. As a result of his depth of knowledge in Information and Communications Technology, He founded Rollar Cecillee Communications; a highly profitable ICT venture as an Undergraduate. Currently, He is a consultant to Kwara State government in Nigeria on e-government. He is also a managing partner of Danite Nig.Ltd and Danite USA. His research interests include e-learning and e-government. He can be reached via ; [email protected]. 38
Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 6, 76-81, 2014 Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
Design of a University Portal with Biometric Lecture Attendance Monitoring System
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):847-856 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
Fingerprint-Based Authentication System for Time and Attendance Management
British Journal of Mathematics & Computer Science 5(6): 735-747, 2015, Article no.bjmcs.2015.053 ISSN: 2231-0851 SCIENCEDOMAIN international www.sciencedomain.org Fingerprint-Based Authentication System
vmedia An introduction to subscription based document and imaging management software June 10, 2015
Vertican Technologies, Inc. vmedia An introduction to subscription based document and imaging management software June 10, 2015 [email protected] www.vertican.com Executive Summary This white paper discusses
Multifunctional Barcode Inventory System for Retailing. Are You Ready for It?
Multifunctional Barcode Inventory System for Retailing. Are You Ready for It? Ling Shi Cai, Leau Yu Beng, Charlie Albert Lasuin, Tan Soo Fun, Chin Pei Yee Abstract This paper explains the development of
Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4
Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Fingerprint-Based Authentication System for Time and Attendance Management
1 2 3 4 5 6 7 8 9 10 11 12 Fingerprint-Based Authentication System for Time and Attendance Management ABSTRACT Ikuomola, Aderonke Justina Ondo State University of Science and Technology, Okitipupa, Ondo
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
OVERVIEW HIGHLIGHTS. Exsys Corvid Datasheet 1
Easy to build and implement knowledge automation systems bring interactive decision-making expertise to Web sites. Here s proven technology that provides customized, specific recommendations to prospects,
Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 06 68 Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System Ibidapo, O. Akinyemi,
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN
ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
Mirtrak 6 Powered by Cyclope
Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough
THE BUSINESS VALUE OF AN ERP SYSTEM
THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based
L-1 Fingerprint Reader Solutions. V-Flex 4G
L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in
Page 1. Overview of System Architecture
Page 1 Contents Introduction to the HR.net Enterprise Framework 1 HR.net Enterprise Administrator Console 3 HR.net Enterprise Document Explorer 4 HR.net Enterprise Server Application 4 HR.net Enterprise
Point of Sale 2015 Enterprise. Installation Guide
Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System
Access Control System Access Control System is designed for the places where need for crucial security.
rt RichtonTec as a company based on biometric and RFID technology has been supplying access control solution and time and attendance terminals for over 6 years. Over this time we developed our own unique
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Design of a web-based courseware authoring and presentation system
Vol.3,.2, 2011 Design of a web-based courseware authoring and presentation system Engr. Prof Hyacinth C. Inyiama Electronic and Computer Engineering Dept Nnamdi Azikiwe University Engr. Dr. Mrs. Christiana
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Microsoft SQL Server Installation Guide
Microsoft SQL Server Installation Guide Version 3.0 For SQL Server 2014 Developer & 2012 Express October 2014 Copyright 2010 2014 Robert Schudy, Warren Mansur and Jack Polnar Permission granted for any
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Cisco IP Communicator (Softphone) Compatibility
Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows
Microsoft SQL Server Installation Guide
Microsoft SQL Server Installation Guide Version 2.1 For SQL Server 2012 January 2013 Copyright 2010 2013 Robert Schudy, Warren Mansur and Jack Polnar Permission granted for any use of Boston University
Easy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
ELEN 115 Computer Components and Peripherals
Course Outline Professor: Philip Ashman, M.Sc., P.Eng., CCAI Prerequisite: None Office: C330 Co-requisite: None Phone: (250) 762-5445 ext 4364 Lecture: 3 hrs/wk, Lab: 2.5 hrs/wk E-mail: [email protected]
Software Requirement Specification For Flea Market System
Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document
System Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5
Practice Management Installation Guide Your computers must meet the Workstation, Server and Network Requirements (see below for specifics). These requirements will ensure that Practice Management will
PROJECT MANAGEMENT SYSTEM
Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU
MyUSBOnly User Guide Menu
MyUSBOnly User Guide Menu Welcome - Lock the Bad Guys out of your USB ports!... 2 System Requirement... 4 Important Notes... 4 FAQ How to install a trial version MyUSBOnly?... 5 FAQ How to buy and install
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
InstaFile. Complete Document management System
InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start
UC Davis School of Medicine Computer Requirements
UC Davis School of Medicine Computer Requirements 1. Computer Ownership Policy 2. Recommended Configurations and Notes 3. Technical Support 4. Purchasing a Computer 5. Financial Aid for Computer Purchases
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
Access Control Using Smartcard And Passcode
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676 Volume 4, Issue 5 (Jan. - Feb. 2013), PP 29-34 Access Control Using Smartcard And Passcode Omorogiuwa Eseosa 1., Uhunmwangho
Electronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
HP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Genetic Algorithm for Event Scheduling System
Genetic Algorithm for Event Scheduling 1 Abd. Samad Hasan Basari, 2 Siti Musliza Jalal, 3 Burairah Hussin and 4 Nabihah Mohd Isa Faculty of Information and Communication Technology UTeM, Hang Tuah Jaya,
ACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
Module: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
This Deployment Guide is intended for administrators in charge of planning, implementing and
YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment
Installation Guide v1.11 and Higher
Progeny Imaging Installation Guide v1.11 and Higher 00-02-1604 Rev. D ECN P3483 Revision Date: 6/2/2015 0120 Contents 1. About This Manual... 3 Text Conventions... 3 2. Welcome to Progeny Imaging... 4
Software Requirement Specification for Web Based Integrated Development Environment. DEVCLOUD Web Based Integrated Development Environment.
Software Requirement Specification for Web Based Integrated Development Environment DEVCLOUD Web Based Integrated Development Environment TinTin Alican Güçlükol Anıl Paçacı Meriç Taze Serbay Arslanhan
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
NTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
TARGETPROCESS INSTALLATION GUIDE
TARGETPROCESS INSTALLATION GUIDE v.2.19 Installation Guide This document describes installation of TargetProcess application and common problems with resolutions. 1 PREREQUISITES... 3 SERVER REQUIREMENTS...
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Expertise for biometric solution
Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the
Sage 200 Online. System Requirements and Prerequisites
Sage 200 Online System Requirements and Prerequisites v2013 Copyright statement Sage (UK) Limited, 2013. All rights reserved. If this documentation includes advice or information relating to any matter
W38 / W35 GLOBAL TIME ATTENDANCE. AGW Systems
W38 / W35 GLOBAL TIME ATTENDANCE AGW Systems TIME ATTENDANCE HOW TO CHOOSE YOUR SYSTEM WHAT IS MY BEST CHOICE? The first step in selecting your time attendance system is to know clearly how much information
SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi 682025
SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi 682025 Phone: 0484-2333603 Email: [email protected] Requirement of biometric time attendance system
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
Propalms TSE Deployment Guide
Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 1 Table of Contents Chapter 1: Installation Overview... 3 Introduction... 3 Minimum Requirements...
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...
DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC
DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC 1,* John B. Oladosu, 2 Oludare Opaleye & 3 Olusayo D. Fenwa Computer Science and Engineering Department,
Hardware, Software and Training Requirements for DMFAS 6
Hardware, Software and Training Requirements for DMFAS 6 DMFAS6/HardwareSoftware/V5 May 2015 2 Hardware, Software and Training Requirements for DMFAS 6 Contents ABOUT THIS DOCUMENT... 4 HARDWARE REQUIREMENTS...
1. Introduction 1.1 Methodology
Table of Contents 1. Introduction 1.1 Methodology 3 1.2 Purpose 4 1.3 Scope 4 1.4 Definitions, Acronyms and Abbreviations 5 1.5 Tools Used 6 1.6 References 7 1.7 Technologies to be used 7 1.8 Overview
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications Product Definition Bode Collection Point software is used to collect and report personal information and other meta
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
SHENZHEN PROYU BIOMETRIC T/A & A/C TERMINAL QUOTATION
Biometric Time Attendance Terminal ITEM NO. MAIN SPECIFICATION PY-B3 * Fingerprint Cap.: 1,500 * Record Cap.: 50,000 * Communication: RS232;485;TCP/IP * Workcode: * Check in/out, Break in/out PY-X628 *
Calibration Control. Calibration Management Software. Tools for Management Systems
Calibration Control Calibration Management Software Calibration Control CREATED FROM THE MANUFACTURING USER S PERSPECTIVE MAJOR FEATURES WINDOWS 7 & 8 21 CFR PART 11 COMPLIANT MS ACCESS OR SQL SERVER DANISH,
