STUDENT ATTENDANCE MONITORING SYSTEM USING FINGERPRINT


STUDENT ATTENDANCE MONITORING SYSTEM USING FINGERPRINT

                                                            ABSTRACT:    

This project is on the design and development of portable and reliable fingerprint based student attendance monitoring system that can be used to monitor attendance of the student. It will eliminate the problems of manual method. The new system utilizes a portable fingerprint scanner as the input to acquire fingerprint images and notebook personal computer as the mobile terminal for the processing of the images and records attendance. It also include database to store student’s information and attendance records. Visual Basic.net was used as the programming language to develop this system. The system was tested and found working correctly.

TABLE OF CONTENTS

Title                                                               Pages

Cover page                                           

Title page                                                                                                                        i

Certification                                                ii         

Dedication                                            iii   

Acknowledgment                                        iv

Abstract                                            v   

Table of Contents                                        vi

List of Tables                                             x   

List of Figures                                              x       

CHAPTER ONE: INTRODUCTION

1.1    BACKGROUND OF THE STUDY                               1   

1.2 STATEMENT OF THE PROBLEM                               3   

1.3 AIM AND OBJECTIVES                                    4       

1.4 SCOPE OF THE STUDY                                               4   

1.5 LIMITATION OF THE STUDY                                   4   

1.6 SIGNIFICANCE OF THE STUDY                               5

1.7 OPERATIONAL DEFINITION OF TERMS                           6   

CHAPTER TWO: LITERATURE REVIEW

2.1 WHAT IS BIOMETRICS                                        7   

2.2 HISTORY OF BIOMETRICS                                     9   

2.3 TYPES OF BIOMETRIC DEVICES AVAILABLE                       14   

2.3.1 RETINA SCANNER                                       15   

2.3.2 IRIS SCANNER                                       17   

2.3.3 FINGERPRINT SCANNER                                    19

2.3.4 FACIAL BIOMETRICS                                    22   

2.3.5 VOICE RECOGNITION                                    24

2.3.6 HAND PRINT PATTERNS                                    24   

2.3.7 DNA FINGERPRINT                                        26

2.3.8 DEEP TISSUE ILLUMINATION                                26

2.3.9 VOICE PRINT KEYSTROKE PATTERN                            26

2.4 APPLICATION AREAS OF BIOMETRICS                            27

2.5 RELATED STUDIES                                        31

2.6 SUMMARY OF REVIEW                                    34

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN           

3.1 ANALYSIS OF THE EXISTING SYSTEM                           36

3.2 JUSTIFICATIONS OF THE NEW SYSTEM                           37

3.3 METHODOLOGY                                       37

3.4 DATA COLLECTION                                       39

3.5 THE PROPOSED NEW SYSTEM                               39

3.6 DATA STRUCTURE                                       44

CHAPTER FOUR: SYSTEM IMPLEMENTATION, TESTING AND INTEGRATION

4.1 CHOICE OF PROGRAMMING LANGUAGE                           46

4.2 THE SYSTEM MAIN MENU IMPLEMENTATION                       47

4.2.1 MAIN MENU                                           47

4.2.2 ADMIN LOGIN PAGE                                      48

4.2.3 LECTURER ACTIVATOR SETUP PAGE                          49

4.3 IMPLEMENTATION OF THE SUB-SYSTEM                          50

4.4 QUERY SUB-SYSTEM IMPLEMENTATION                          53

4.5 SYSTEM TESTING AND INTEGRATION                          54

4.6 TEST PLAN                                          54

4.7 TEST DATA                                          54

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 SUMMARY                                          55

5.2 RECOMMENDATION                                      56

5.3 CONCLUSION                                          57

REFERENCES

LIST OF TABLES

TABLE 3.1 ADMINISTRATOR DATABASE                        44

TABLE 3.2 COURSE DATABASE                                44

TABLE 3.3 LECTURER DATABASE                            45

TABLE 3.4 STUDENT DATABASE                            45

LIST OF FIGURES

FIG 2.1 STRUCTURE OF IRIS                                17

FIG 2.2 IRIS SCANNER                                    18

FIG 2.3 FINGERPRINT PATTERNS                            20

FIG 2.4 SCANNERS                                        21 

FIG 3.1 TOP DOWN DESIGN APPROACH FOR THE SYSTEM                38

FIG 3.2 FLOW CHART FOR USER START PAGE                    39

FIG 3.3 FLOW CHART FOR ADMIN SUB PROGRAM                    41

FIG 3.4 FLOW CHART FOR STUDENT SUB PROGRAM                43

FIG 4.1 USER START PAGE                                    48

FIG 4.2 ADMIN LOGIN IMPLEMENTATION                        49

FIG 4.3 LECTURER ATTENDANCE SETUP                        50

FIG 4.4 ADMINISTRATOR SUB-MENU                            51

FIG 4.5 STUDENT ENROLLMENT SUBMENU                        52

FIG 4.6 LECTURER ATTENDANCE ACTIVATOR                    52

FIG 4.7 STUDENT FINGERPRINT VERIFIED                        53

CHAPTER ONE

INTRODUCTION

1.1    Background of the Study

Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in classes, laboratory sessions and examination halls. That is why keeping the accurate record of attendance is very important.  The approach of using paper sheets and the old file system to confirmed students has been in use for years. There are so many bottlenecks with the conventional method, one of such problem is the difficulty for the management to compute the percentage of student attendance in classes and frequently modify their information. Also in institution, tracking and monitoring student time of attendance could be tedious task, time consuming and as well prone to errors. As an alternative to traditional manual clocking process by students in classes or during examination, biometrics characteristics can be used for authenticating students. This research will focus on developing Fingerprint based Biometric Student Attendance Monitoring System.  The fingerprint Biometrics is adopted in this research work for the fact it is one of the most successful applications of biometric technology. In the manual signing processes, where lecturer give a sheet of paper to student to write their names and signature as a form of confirming their presence for a particular class session, falsification in student attendance mostly occur a situation where by a student can sign on behalf of his or her colleague as being present in the class when not true can be so difficult to prevent from happening especially for large classes where row count can takes longer time International Journal of Computer Science and Network Security (2009).

 The trending concern in this modern world is regarding national security, identifying theft as well as on-line terrorism. Researcher refers to Biometric as a solution for detecting user’s identity and security challenges emanating in this modern day. Biometric identification is any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identify of an individual. Biometric science utilizes the measurements of a person’s behavioral characteristics (keyboard strokes, mouse movement) or biological characteristics (fingerprint, iris, nose, eyes, jaw, voice pattern, etc). It is the features captures that is being transformed digitally into a template. The recognition software can then be used to discover an individual as the person they claim to be. Fingerprint recognition is the most common biometric method adopted in identification of a person (Ismail 2009).

Biometric is a field of technology that uses automated methods for identifying and verifying a person based on physiological and behavioral traits. Because some parts of the human body is use in biometrics, the issue of getting lost is not possible and for password to be easily guess can be easily avoided.   Also, utilizing biometrics in most cases can be said to be more efficient when speed is considered and convenient than employing password and ID cards method.

Using a particular person fingerprint as a form of authentication is just like using natural physical data as a password. The benefit of using biometric authentication is that it is absolutely distinct to each person. There are no two different individuals with the same fingerprint, it is difficult and impossible for one another to have the same fingerprint, and fingerprints from different people can never be the same. Also, a fingerprint can never be guess by a criminal, such as a password which imposter can easily predict using a user birth date or any other common password. Infiltration is very hard to come by due to the fact that criminal will not be able to snoop around to steal user password when using ATM with the 4-digit pass code (Valasquez 2013).

Fingerprint can be categorize as one of the most mature biometric traits and is accepted in courts of law as a legitimate proof of evidence. Fingerprints are adopted in forensic analysis globally in investigations of criminal. More recently, there are growing numbers of individuals and commercial users that are currently using or strongly putting into consideration of using fingerprint-based identification for no any other reason other than the matching performance biometric technology has demonstrated as well as a better understanding of fingerprints.

Although there are so many positive impacts for using biometric authentication, however, unlike username and password, biometric data is a physical feature of a person that is fixed and cannot be change. If a person could have access to adequate scan another person fingerprint, that scan has the capability to trick the Touch ID system. In that case, the fingerprint features of a person can’t be change consequently a criminal can’t be prevented from having access to your personal information or files. As fingerprint scanning becomes more widely accepted anywhere anytime, this may become a substantial challenge. A criminal can have access to different accounts because with one fingerprint, a criminal may have access to multiple accounts that implemented authentication using fingerprint.

1.2 Statement of the Problem

The traditional system is still mostly used in lecture room or laboratory session in most institution today. Lecturer or instructor will give out a sheet of paper containing list of student’s name to sign or in some cases, the student will be the ones to write their names, student id and matriculation number to indicate their presence for a particular class. Falsification in student attendance does occur rampantly in the traditional method. For example, another student can easily sign an attendance on behalf of another student. In other to prevent this problem, it is necessary to develop an Authentication System for Students using fingerprint Biometric recognition that will be employed to track and keep the attendance of every student in a particular class. Fingerprint is unique feature for everyone compare to using barcode in smart cards. Therefore, this system designed in this project work is not based on the existing barcode system. Tracking and monitoring student time of attendance could be tedious, time consuming and more susceptible to errors. The security of the existing attendance system that are now use in classroom (signature system) can be easily compromised. Some students can master other student’s signature. Thereby, helping their colleague who are absent for a particular class to sign the attendance sheet using the duplicated signature. The Fingerprint Attendance monitoring system designed in this research work for student is a more secure platform where students mark their attendance with their fingerprint.

1.3 Aim and Objectives   

The aim of the study is to design and develop a reliable, scalable and cost effective Fingerprint based Student Attendance Monitoring system. This is to be achieved by the following objectives:

(i)    To carry out the analysis of manual processes involved in class attendance and examination attendance.

(ii)    To design a new system for the (i) above and

(iii)    To implement the design using Microsoft Visual Basic.net.  

1.4 Scope of the Study

The scope of this work is to develop a Fingerprint Based Student Attendance monitoring System that will improve how attendance management is done by using fingerprint as a form authentication for proof of attending a class. The system will be a window based application developed using Microsoft Visual Basic.net as the preferred programming language for building the user interface and Microsoft SQL Server for database design. It does not cover other aspects of biometric.

1.5 Limitations of the Study

The efficiency of the scanner can be reduced due to the roughages in the captured images which are often caused by worn-out or cut or dirt’s found on fingerprint. Therefore, there is every possibility that enrolled users can be rejected by the system. Also the scanner or sensor cannot distinguish between a real and an artificial finger; therefore it is possible to fool the scanner. In addition, if an enrolled fingerprint is been duplicated or spoof, it is not possible to change fingerprint as in the case of password because user finger biometric. Finally, since the system will be design using Visual Basic.net, it won’t be able to run on any other platforms other than Microsoft Window operating system.

1.6 Significance of the Study

The System for Students using fingerprint Biometric will eliminate the use of paper in manual signing processes and all the risk associated with it. One of the risks of using a paper in class attendance is that it can be easily misplaced and students cheat by signing for each other not present in the class thereby defeating the aim of taking the attendance. Tracking and monitoring students time of attendance could be tedious, time consuming and susceptible to error. Thus, the System will drastically reduce time needed to verify attendance data.

The System also allows the institution management to track or investigate student class attendance in a particular course having poor attendance thereby enabling the management to rectify the situation by providing the necessary interventions. The system provide high level of security whereby making it impossible for imposters and impersonators in making their ways to examination halls. The System using fingerprint Biometric will keep historical data making it easy for lecturers to access and grade students.

Fingerprint Based Student Attendance monitoring System is extremely useful in institutions especially during classes, tutorials,  laboratory sessions and examination during which heavy security are normally deploy to validate student’s identity in order to cob imposters, with the use of  Authentication System the number of security personnel will be greatly reduce. Most lecturers’ handout sheet of paper for their class attendance, which can easily be misplaced or damaged and poses a lot of stress in cumulating grades for their students. The system allows the lecturer to monitor each student attendance, track down truants and take the appropriate action. Thus, the system eliminates all these downsides. The Authentication system is not only useful to the institutions and lecturers alone, even the students benefit a great deal by reducing the stress in queuing up which result in delay and often time in the damage of the attendance sheet. It also prevents mistakes and anomaly that is associated with manual signing in which student that attend a class are marked as not present thereby losing the mark accorded to the particular attendance due to multiple attendance sheet.

1.7 Operational Definition of Terms

Biometrics is physiological or behavioral characteristics unique to individuals, this Include Fingerprint, hand geometry, handwriting, iris, retinal, vein and voice.

 PIN personal identification number.

Biometric Verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.

Scanner a device for examining, reading, or monitoring something in particular..

Fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.

Rapid Application Development is a concept that products can be developed faster and of higher quality.

Authentication is the process of determining whether someone or something is, in fact, who or what it declared to be.

Use Case Diagram is used to show scenarios used for understanding the requirements of the system and to show the interaction between the user and the system.

Flow chart or Activity Diagram is a Unified Modeling Language that represents the graphical workflows of stepwise activities and actions with support for iteration, choice and concurrency.

.

STUDENT ATTENDANCE MONITORING SYSTEM USING FINGERPRINT



TYPE IN YOUR TOPIC AND CLICK SEARCH.






RESEARCHWAP.ORG
Researchwap.org is an online repository for free project topics and research materials, articles and custom writing of research works. We’re an online resource centre that provides a vast database for students to access numerous research project topics and materials. Researchwap.org guides and assist Postgraduate, Undergraduate and Final Year Students with well researched and quality project topics, topic ideas, research guides and project materials. We’re reliable and trustworthy, and we really understand what is called “time factor”, that is why we’ve simplified the process so that students can get their research projects ready on time. Our platform provides more educational services, such as hiring a writer, research analysis, and software for computer science research and we also seriously adhere to a timely delivery.

TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • "Researchwap.org is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.org" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.