Preview

Payroll System Using Biometric Technology for Brgy. Sto Rosario-Kanluran Pateros Metro Manila

Good Essays
Open Document
Open Document
409 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Payroll System Using Biometric Technology for Brgy. Sto Rosario-Kanluran Pateros Metro Manila
CHAPTER I
THE PROBLEM AND ITS BACKGROUND This chapter presents the introduction, background of the study, theoretical framework, conceptual framework, statement of the problem, scope and limitation, significance of the study, and definition of terms of the proposed study.
Introduction
The emerging technology of today’s generation brought up the advancement of processes in people’s lives. Information technology (I.T.) is a more specific term that stresses the role of unified communication and the integration of telecommunication and computers (Murray, 2011). Specifically, computer is a general purpose device that can be programmed to carry out a finite set of arithmetic and logical operations. It lessens the tedious tasks carried out in manual based operations in the society. However, providing efficient security is still considered as one of the arising difficulties in information technology. Security plays a vital role in one’s daily lives and as forms of protection are structure and process that provide or improve security as a condition, it is present in all aspects of life. At present, one of the devices used in maintaining a strict security especially in attendance monitoring and payroll generation is the biometric technology or simply biometrics. Biometrics (MSU, 2012) refers to the automatic identification of a person based on his/her multiple scientific fields. One of which is his anatomical (e.g. fingerprint, iris) characteristics of traits. A biometric system made use of a fingerprint scanner, a sensor that employs the user to be present to enroll in the system so that his biometric template or reference can be captured. This template is securely stored in a central database or smart card issued to the user. The template is used for matching when an individual needs to be identified. Depending on the context, a biometric system can operate either in verification (authentication) or an identification mode. Thus, the identification mode of

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This is a bit more new invention and not a lot of organisations are using it as it is very expensive security measure. Biometric scanners are used to scan people’s face, fingerprints, iris, hand geometry vein or voice as every single person has it different. The most famous and used identification is through fingerprints as it is easy to check. The scanner will take a picture of one of your fingers and then it will be saved and used in a binary code. Furthermore, the algorithm is assigned to one person so if the same person’s is scanned once more, the system will match it straight with the previous binary code and this is enabling recognition.…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Good Essays

    These systems usually use a small camera to take a black-and-white, high-resolution image of the iris. Algorithms then define the boundaries of the iris and create a coordinate grid over the image. All the selected characteristics within the zones are then stored in a database as the individual's biometric…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As the impact of advanced technology, in 1997 Biometrics emerge in the field of information technology. Biometrics used to sustain identification encryption purposes, which meet the criteria of…

    • 858 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There are several ways that schools can use biometric technology. The most obvious of these are for cashless catering, registration and library borrowing. There are advantages in using a fingerprint system for these functions.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In this chapter, the background, problem statement, objectives and justification of the study are discussed. The general and specific objectives are listed and the scopes of the study are described.…

    • 3869 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    AADHAR AS IN MIS

    • 1038 Words
    • 5 Pages

    The UIDAI has been setup by the Government of India with a mandate to issue a unique identification number to all the residents in the country. A key requirement of the Aadhaar is to minimize/eliminate duplicate identity to improve the efficacy of the service delivery. Biometrics features are selected to be the primary mechanism for ensuring uniqueness.…

    • 1038 Words
    • 5 Pages
    Better Essays

Related Topics