Preview

Attendance Monitoring System

Best Essays
Open Document
Open Document
2014 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Attendance Monitoring System
Volume 3, Issue 4, April 2013

ISSN: 2277 128X

International Journal of Advanced Research in Computer Science and Software Engineering
Research Paper Available online at: www.ijarcsse.com

An Attendance Monitoring System Using Biometrics Authentication
Seema Rao, Prof.K.J.Satoa CSE,CSVTU Chhattisgarh, India Abstract- Biometric technology that involves the identification and verification of individuals by analyzing the human fingerprint characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of employee attendance. The main aim of this paper is to develop an accurate , fast and very efficient automatic attendance system using fingerprint verification technique. We propose a system in which fingerprint verification is done by using extraction of minutiae technique and the system that automates the whole process of taking attendance, The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on fingerprint matching biometric technologies. The survey involved 6 employees based on stratified random sampling technique. The results however show that fingerprint biometric identifier was found suitable for the employee attendance management system of the organization. Keywords: Biometrics , fingerprint ,employee attendance , identifier ,etc . 1. Introduction In many institutions and organization the attendance is very important factor for various purposes and its one of the important criteria that is to follow for students and organization employees. The previous approach in which manually taking and maintains the attendance records was very inconvenient task. After having these issues in mind we develop an automatic attendance system which automates the whole process of taking attendance and maintaining it.We already know about some commonly used biometric techniques are used for objective identification ,verification are



References: [1] Jianjiang Feng, “Combining minutiae descriptors for fingerprint matching”, Pattern Recognition, pp. 342 – 352, April 2007. [2] Peng Shi, Jie Tian, Qi Su, and Xin Yang, “A Novel Fingerprint Matching Algorithm Based on Minutiae and Global Statistical Features”, IEEE Conference, 2007. [3] Neeta Nain, Deepak B M, Dinesh Kumar, Manisha Baswal, and Biju Gautham “Optimized Minutiae–Based Fingerprint Matching”, Proceedings, 2008. [4] BioLink 2006. Time and attendance, Retrieved 11thDecember,2011fromhttp://www.m3biometrics.co.uk/Portals/2/downloads/BioTime_Time_and_Attendance.pdf. [5] InfoTronics, Inc. 2008. Biometrics: Advantages for employee attendance verification, Michigan: Farmington Hills. Retrieved 11th November, 2011 from www.mwtime.com/biometrics.pdf. [6] Jain, A., Hong, L., Pankanti, S., Bolle, R., 1997. An Identity Authentication System Using Fingerprints. Retrieved 10th June, 2012 from http://biometrics.cse.msu.edu/Publications/Fingerprint/JainEtAlIdentityAuthUsingFp_ProcIEEE97.pdf. [7] K. Asai, Y. Hoshino and K. Kiji, “Automated fingerprint Identification by minutiae-network feature- feature extraction process,” IEICE transactions, Vol.J72-D-II, N0.5, pp 724-732, 1989. [8] Chaur-Chin Chen and Yaw-Yi Wang, “An AFIS Using Fingerprint Classification,” Image and Vision Computing, 2003. [9] Virginia Espinosa-Dur6, “Fingerprints Thinning Algorithm,” IEEE AES Systems Magazine, 2003. [10] U. Halici, L. C. Jain, A. Erol, "Introduction to Fingerprint Recognition,"Intelligent Biometric Techniques in Fingerprint and Face Recognition,L.C. Jain, U. Halici, I.Hayashi, S.B. Lee, S. Tsutsui (editors), CRCPress, 1999. [11] Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S.Sandhu, “Fingerprint Verification System using Minutiae Extraction Technique,” World Academy of Science, Engineering and Technology 46 2008. [12] Anil K. Jain, Arun Ross and Salil Prabhakar, “An introduction to biometric recognition,” Circuits and Systems for Video Technology,IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s):4 – 20. [13] L. O’Gorman, “Overview of fingerprint verification technologies,”Elsevier Information Security Technical Report, Vol. 3, No. 1, 1998. [14]. Eric P. Kukula, Christine R. Blomeke, Shimon K. Modi, and Tephen J. Elliott, “Effect of Human Interaction on Fingerprint Matching Performance, Image Quality, and Minutiae Count”, International Conference on Information Technology and Applications, pp. 771-776, (2008). © 2013, IJARCSSE All Rights Reserved Page | 383

You May Also Find These Documents Helpful

  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Afis Biometrics Report

    • 2101 Words
    • 9 Pages

    [4] D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed, New York: Springer – Verlag, 2009.…

    • 2101 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    It is proven that two persons can hardly possibly have exactly the same fingerprints, as far as two like fingerprints would be found only once every 1048 years. Thus, using door secure system or employee’s time attendance-tracking system with built-in fingerprint recognition is considered to be safe. Because, if your fingerprint sample have already been entered to the database, then the machine will always recognize and match the sample with your fingerprint, while stranger’s fingerprints will be rejected. That is the way fingerprint recognitions enhance our freedom, as long as it allows us keeping our properties private, being safe from criminal strangers.…

    • 996 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Fingerprints are the most widely used and trusted biometrics that uniquely identify an individual and are used for various purposes like authentication, law enforcement etc. Some of the techniques used to match finger prints are: filter based, minutiae or Galton feature’s based, correlation based, pattern matching. The most commonly used technique is minutiae based which involves identifying the various features of a fingerprint like ridge endings, ridge bifurcation, island, core, delta, crossover etc. The accurate locations and directions of these minutiae points identified are stored in the database for testing the methods proposed by the papers. There are around 20-60 minutiae points in a fingerprint. The number of minutiae points considered highly affects the efficiency of the system. The algorithms proposed by the papers under study strive to improve the efficiency of the computation involved. Each of the algorithms is application specific and has their own advantages and disadvantages.…

    • 1955 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The fingerprint-based biometric security system on personal laptop computer is more accessible, secured, accountable and accurate. It is in the registered fingerprint where an account is created for hassle-free admission to the system. Furthermore, transactions do not consume much time and effort since the information needed to connect and to access one’s account is already automated.…

    • 273 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Payroll

    • 884 Words
    • 4 Pages

    The proposed topic “Biometric Fingerprint Scan Log In/Log Out with Payroll System for FH Commercial Inc.” will be created using Code Gear Delphi2010 and Seagate Crystal Report. The Payroll System will be connected with the Biometric Fingerprint Scanner. The scanner, aside from providing accurate and efficient monitoring of the employees’ time and attendance, will also make payroll computation faster. The computerized payroll system will take care of the automatic payroll computations segregating deductibles like PhilHealth contributions, SSS Premiums and SSS Loans, PAG-IBIG Fund, Withholding Tax, and deductions due to absences and for reporting late at work in which the deduction depends on the time the employees log in.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In order to come with good and quality software for the Sydney Hotel, the researchers had undergone into systematic and appropriate stages. Each stage that the researchers choose to venture is surely supplementary to the outcome of the study.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using of electronic device like Computer is the best way of recording data now a days it can automatically compute and record files in just a click. Tremendously Computer Attendance Monitoring System benefits the small and big company as well as school, universities and other educational institution. The main reason of this study is to understand the progress and advantages of this system towards the users. And to be able to have a comparison in using a manual monitoring system in recording attendance file record, as well as other devices that needs a little improvement.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Abstract: Web security is in general taken as providing safeguard at the borders of an organization by keeping out impostors. For this…

    • 3825 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    Biometrics

    • 2828 Words
    • 12 Pages

    A PAPER ON Biometrics Submitted By MR. TAPSE PRAVINKUMAR NARSING T.E.(ENTC) Email:- tapse_pravinkumar@rediffmail.com & MR.…

    • 2828 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    providing logically correct results. This paper reviews pre-requisites for an RTOS to be POSIX 1003.1b…

    • 5651 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    The fingerprint-based biometric security system on personal computer is more accessible, secured, accountable and accurate. It is in the registered fingerprint where an account is created for hassle-free admission to the system. Furthermore, transactions do not consume much time and effort since the information needed to connect and to access one’s account is already automated.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    biometrics

    • 698 Words
    • 3 Pages

    It is important to note that Easy Clocking’s biometric time clocks do not actually collect and store fingerprints. Instead, it saves a mathematical representation of the employee’s biometric data. When the biometric time clock scans a hand or finger during a supervised enrollment…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    fingerprint recognition

    • 5321 Words
    • 23 Pages

    We hereby recommend that the Project submitted by Anjali vats entitled “Fingerprint Recognition” be accepted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Electronics and communication.…

    • 5321 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Success of any company can be attributed to many factors. Financial management is one such vital factor. A company requires finance not just to start a business but also to operate a business, to expand its operations and to modernise it. Therefore it can be said for sure that “Finance is the life blood of business” (Donegan, p.53).…

    • 3057 Words
    • 13 Pages
    Powerful Essays

Related Topics