0% found this document useful (0 votes)
286 views

Smart Attendance System Applying QR Code

This document summarizes a research paper presented at the 12th International Conference on Latest Trends in Engineering and Technology about developing a smart attendance system using QR codes. The proposed system scans student QR codes using a webcam to record attendance. Reed Solomon error correction is applied to authenticate scanned codes. If a student's attendance falls below 85%, a warning letter will be issued. The full paper presents the background, system design, findings, and conclusion.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views

Smart Attendance System Applying QR Code

This document summarizes a research paper presented at the 12th International Conference on Latest Trends in Engineering and Technology about developing a smart attendance system using QR codes. The proposed system scans student QR codes using a webcam to record attendance. Reed Solomon error correction is applied to authenticate scanned codes. If a student's attendance falls below 85%, a warning letter will be issued. The full paper presents the background, system design, findings, and conclusion.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)

Smart Attendance System Applying QR Code


Md Rizal Md Hendry, Mohd Noah A. Rahman and Afzaal. H. Seyal

 In this project, the proposed attendance system is developed


Abstract—The cardinal aim of this study to report an automated by scanning the QR code using a webcam attached to a
student attendance system modeled and developed for use at a computer. Subsequently the data is recorded and deposited in
Vocational school. This paper focuses on developing an application a database for further retrieval and reporting purposes. The
by using a QR code. This system enables us to speed up the process Reed Solomon error code correction is applied to determine
of taking attendance and would save us valuable teaching time. This
is planned to help students avoid consequences that may result from the authenticity of the code scanned through the webcam. A
poor attendances which will eventually penalized them from sitting report is produced and submitted to the administrator. If there
their final examination as required by the administrators. exists a penalty in case attendance percentages fall below 85%
set in the school’s policy, a warning letter will be issued to the
Keywords—QR code, Reed Solomon,error correction code, student.
system design. The presentation of this paper is organized in the following
sequences. A related background study is compiled and
I. INTRODUCTION discussed. Next, a detailed system design and workflow is
Punctuality and regular attendance are the prerequisites that proposed. Subsequently a discussion on the findings is
are commonly imposed in most schools. They are connected portrayed and finally a conclusion is drawn.
to emerging character behaviors such as initiative, respect,
integrity and responsibility. Many established studies have II. RELATED BACKGROUND STUDY
shown that student attendance during lectures have positive There exist various modes of attendance system
correlations with their academic performances (Westerman et applications being used in various situations such as in schools
al., 2011; Dobkin et al., 2010; Chau and Kuo, 2012; Lin, and higher institutions of learning. The most notable changes
2011). Students determine commitment, initiative, respect and in most educational landscape today are the capitalization of
responsibility when they are in class and on time, at all times. technology in managing the attendance of students (Gomis-
The less class time students miss or absent, the more likely Porqueras et al., 2011).
they will do well academically. A Learning Management Systems (LMS) proposed the use
The traditional and normal way of taking attendance is by of real time face detection algorithms which automatically
using pen and paper manually which is seemed as detects and registers student attending the class (Shehu and
unproductive, repetitive and tedious processes. This mode of Dika, 2010).
taking attendance will incur time lost instead of delivering A system which uses fingerprint verification technique was
lecture effectively especially if the population of a class is big. proposed by applying a technique known as extraction of
As new technology rapidly evolves, there are various ways minutiae which automates the process of attendance taking
of capturing students’ attendances. The widespread uses of (Saraswat and Kumar, 2010).
smartphones at an unprecedented rate have revolutionized the A prototype system which uses facial recognition and
way people access to information particularly in the education detection technology combining with a neural network
sector. There are various technologies available that enable algorithm was developed to perform face detection and an
and assist educators to streamline their attendance taking eigenface method to perform facial recognition was
activities. A few available solutions are hardware incline such implemented (Xiao and Yang, 2009).
asusingradio frequency identification (Abdulkareem et al., Another study which confirmed the presence of a student
2014), biometrics (Shoewu et al., 2014; Dey et al., 2014; Alia attending a class was developed using a mobile phone via a
et al., 2013), software based solutions for attendance Bluetooth connection. It will further query the existence of the
management (Kumbhar et al, 2014; Al-Shammari, 2012) or student through the transfer of student’s Media Access Control
both using software and hardware (Lokhande et al., 2013; (MAC) address to the instructor’s mobile phone (Jamil, 2011).
Reda et al., 2011). A few studies were conducted on the use of QR code for
attendance systems (Deugo, 2015; Baban, 2014; Masalha and
Mohd Noah A. Rahman is with the UniversitiTeknologi Brunei,Bandar
Seri Begawan, BE 1410,Brunei Darussalam (phone: 673-246-1020; fax: 673-
Hirzallah, 2014; Singh and Munukoti, 2013).
246-1035; (e-mail: noah.rahman@ utb.edu.bn).
Afzaal H. Seyal is with the UniversitiTeknologi Brunei, Bandar Seri III. RESEARCH APPROACH
Begawan, BE 1410,Brunei Darussalam (phone: 673-246-1020; fax: 673-246-
1035;( e-mail: [email protected]). As presented in Fig. 1 below, this project focuses on
Md Rizal Md Hendrywas with the UniversitiTeknologi Brunei. developing a prototype to perform the basic function of

https://doi.org/10.15242/IIE.E0517002 1
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)

inserting, retrieving and deleting information, scanning QR QR code therefore that it then also holds the original data
code, viewing and producing reports. expressed as a polynomial.
There are four error correction levels used for QR codes as
depicted in Table 1.
TABLE I
QR CODE ERROR CORRECTION LEVEL
Error Correction Level Damage (%)
Level 1 7
Level 2 15
Level 3 25
Level 4 30
C. Masking
This process is used to avoid features in the symbol where
that can be might confuse a scanner, such as misrepresentative
shapes that looks the locator patterns and large blank areas.
Masking overturns certain modules of white becomes black
and black becomes white, whereas parting others alone.

Fig. 1 Overall architecture of an attendance system


A. Quick Response (QR) Code
A (QR) code is a two dimensional code used to record
thousands of characters and numbers in a small image created
by Denso-Wave Corporation of Japan in 1994. The QR code is
arranged in columns and rows of black and white colours
Fig. 2 Masking transformation
designed to be read by smartphone users (Shin et al., 2012).
Users utilize the QR code can simply use the software decode The masking transformation is easily applied or removes
built-in into the applications to convert scanned code images using the exclusive-or operation. The unmasking of the format
into the coded information and save it into the database information is shown below. Reading counter-clockwise
(Ohbuchi et al., 2004). around the upper-left locator pattern, we have the following
B. Reed Solomon Error Correction Code (ECC) sequence of bits. The white modules representa 0 and the
Regardless of the design of the two-dimensional barcode, black modules represent a 1 as a binary coded representation.
there will be errors. The image of the barcode may be
damaged or unclear. In other words, the barcode obtained Input 101101101001011
from scanning differs from the original. Therefore, it is Mask ^ 101010000010010
essential to be able to detect and correct errors which may Output 000111101011001
occur.
The error correction which is widely used is Reed-Solomon IV. SYSTEM DESIGN
code. This is because it is easier to encode than other encoding A. System Flowchart
techniques and the error correction code is small. Moreover, The system flowchart as shown in Fig. 3 clearly
error detection and error correction can be performed quickly demonstrates the process flow from the beginning of the
and efficiently.It allows correct reading even the bar code is application until the repository of data resided in the database.
damaged a lot. The reason is when the bar code scanner This software development technique and methodology still
cannot recognize a bar code symbol, it will consider as an remains as one of the preferred technique used among
erasure. software developers (Rahim et al, 1998a; Rahim et al,1998b)
Part of the strength of QR codes in the physical Once registration is done, users then begin to login to the
environment is their ability to withstand damage and remain to system. Thereafter, the scanning of QR code will proceed.
function even when a part of the QR code image is disguised, After the scanning process is completed, the information is
vandalized or indifferent. submitted by using the copy clipboard procedure and pasted
This is accomplished by using the Reed-Solomon Error on the insert form. Consequently, the data is stored in the
Correction Code algorithm where several serious algebra that database which has a profound benefit and ease of use
occurs in the background when the QR code is created. The (Rahman et al., 2004). This database is currently stored in a
inventive data in the QR code is converted into a polynomial WAMP server.
and number of unique points required to uniquely describe that
polynomial is resolute, and the point set is added back into the

https://doi.org/10.15242/IIE.E0517002 2
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)

V. SYSTEM IMPLEMENTATION
Open Application
This attendance system requires minimum hardware
specification of Intel Pentium Dual core i5 with RAM size of
2GB and minimum hard disk capacity of 500 Gb.An
additional device of an Android smartphone with camera
equipment
Register Y First Time The required software used for development process of the
QR codes scan and Web based program requires an operating
N
system Microsoft Windows 7 or Server with 64 bit. A web
basedWAMP server (PHP, MySQL & Apache) with an
Log in the system
additional QR code scanner application.
The welcome page comes with five options as iconized in
Fig. 5.

Take Attendance

Scan QR Code

Send information
to Server

Fig.5 Welcome page


Store to
database The scanning process of the QR codes is shown in Fig. 6.

Fig. 3 Flowchart
B. Entity Relationship Diagram (ERD)
The ERDensures all the entities, relationships and the
required attributes for the attendance system are available as
depicted in Fig. 4. The ERD diagram has been widely used in
most structured analysis and conceptual modeling because the
approach is easy to understand, powerful to model real-world
problems and it is readily translated into a database schema
Song et al., 1995).
S.Name
Teacher.id

Student id Subject
Teacher
Month
Status Sems

Attendance
Fig.6 Scanning process
teaches

Belongs The Reed Solomon ECC will detect errors and corrected
Studied

Subject
them if available by producing the masking techniques as
Student
mentioned. This is shown in Fig. 7.
S.Code

S.Name Semester
Teacher.id Student id

Course
Name

Fig. 4 Entity-Relationship Diagram

https://doi.org/10.15242/IIE.E0517002 3
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)

manually and minimized paper usage.


In future, we will provide an efficient algorithm to be
developed as a networked version without the need to install
the open source scanning application scanner.

REFERENCES

[1] J.W. Westerman, L.A. Perez-Batres, B.S. Coffey and R.W. Pouder, “The
relationship between undergraduate attendance and performance
revisited: Alignment of student and instructor goals,”Decision Sciences
Journals of Innovative Education, vol. 9, no. 1, pp. 49-67, 2011.
[2] C. Dobkin, R. Gil and J. Marion, “Skipping class in college and exam
performance: Evidence from a regression discontinuity classroom
experiment,” Economicsof Education Review, vol. 29, no. 4, pp. 566-
Fig. 7 Error correction process 575, 2010.
[3] P.T. Chau and Y. Kuo, “Examining factors relating to classroom
attendance and performance,” Journal of Studies in Education, vol. 2,
The masking transformation is easily applied or removes no. 2, pp. 193-204, 2012.
using the exclusive-or operation. The unmasking of the format [4] T. Lin, “Effects of current and prior skipped classes on current exam
information is shown below. Reading counter-clockwise performance,” Journal of Economic Educators, vol. 11, no. 2, pp. 12-24,
2011.
around the upper-left locator pattern, we have the following [5] V. Shehu and A. Dika, “Using real time computer vision algorithms in
sequence of bits. White modules represent 0 and black automatic attendance management systems,” in Proc. 32nd International
modules represent 1. Conference on Information Technology Interfaces (ITI), 2010, pp. 397-
402.
The checking of attendance is later reported to the relevant [6] C. Saraswat and A. Kumar, “An efficient automatic attendance system
offices for attendance analysis as shown in Fig. 8. using fingerprint verification technique,” International Journal on
Computer Science & Engineering, vol. 2, no. 2, pp. 264-269, 2010.
[7] Q. Xiao and X.D. Yang, “A facial presence monitoring system for
information security,” IEEE Workshop on Computational Intelligence in
Biometrics: Theory, Algorithms, and Applications, 2009, pp. 69-76
[8] T. Jamil, “Automatic attendance recording system using mobile phone,”
Telecommunication Forum (TELFOR), 2011, pp. 1297-1299.
[9] P. Gomis-Porqueras, J. Meinecke and J.A. Rodrigues-Neto, “New
technologies in higher education: Lower attendance and worse learning
outcomes?,” Journal of Policy Analysis and Reform, vol. 18, no. 1, pp.
69-83, 2011.
[10] D.H. Shin J. Jung and B.H. Chang, “The psychology behind QR codes:
User experience perspective,” Computers in Human Behaviour, vol. 28,
2012, pp. 1417-1426.
[11] E. Ohbuchi, H. Hanaizumi and L.A. Hock, “Barcode readers using
camera device in mobile phones,” in Proc. International Conference on
Cyberworlds, 2004, pp. 260-265.
[12] aM.M. Rahim, M.N. Rahman and A.H. Seyal, “Use of software
development techniques: Experiences of Brunei Darussalam,”
Malaysian Journal of Computer Science, vol. 11, no. 1, 1998, pp. 9-21.
[13] bM.M. Rahim, A.H. Seyal and M.N. Rahman, “Use of software
development methods: An empirical study in Brunei Darussalam,”
Information and Software Technology, vol.39, no.14-15, 1998, pp. 949-
963.
[14] M.N. Rahman, A.H. Seyal and A.Y. Mohamed, “An empirical
framework of DBMS usage in Brunei Darussalam,” in Proc. Of the 5th
Annual Global Information Technology Management World Conference
Fig.8 Attendance checklist reporting (GITM), June 2004, pp. 189-192.
[15] I.Y. Song, M. Evans and E.K. Park, “A Comparative Analysis of Entity-
Relationship Diagrams,” Journal of Computer and Software
VI. CONCLUSION Engineering, vol. 3, no. 4, 1995, pp.427-459.
This paper has presented an attendance system that utilizes [16] A. Abdulkareem, D.U. Ike and F. Olowononi, “Development of a radio
frequency identification based attendance management application with
the use of QR code. The proposed system stores all data a pictorial database framework,” International Journal of Research in
repository in a database in a secure and protected database Information Technology, vol. 2, no. 4, 2014, pp. 621-628.
management systems (DBMS) namely the MySQL. [17] O. Shoewu, N.T. Makanjoula and S.O. Olatinwo, “Biometric-based
attendance system: LASU Epe campus as case study,” American Journal
The core of the attendance system is to provide a reliable of Computing Research Repository, vol. 2, no. 1, 2014, pp. 8-14.
and functional attendance tracking and reporting system which [18] S. Dey, S. Barman, R.K. Bhukya, R.K. Das, B.C. Haris, S.R.M.
enables administrator to identify and rectify those students Prasanna and R. Sinha, “Speech biometric based attendance system,” in
Proc. Twentieth National Conference on Communications (NCC), 2014,
who do not meet the minimum attendance as stipulated in the pp. 1-6.
policy and academic regulations of the school. In addition, the [19] M.A. Alia, A.A. Tamimi and O.N.A. Al-Allaf, “Integrated system for
attendance system will ultimately reduce administrative labor monitoring and recognizing students during class session,” The

https://doi.org/10.15242/IIE.E0517002 4
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)

International Journal of Multimedia & Its Applications (IJMA), vol. 5,


no. 6, 2013, pp. 45-52.
[20] A.A. Kumbhar, K.S Wanjara, D.H. Trivedi, A.U. Khairatkar and D.
sharma, “Automated attendance monitoring system using the android
platform,” International Journal of Current Engineering & Technology,
vol. 4, no. 2, 2014, pp. 1096-1099.
[21] Z. Al-Shammari, “ Benefits of using tested attendance system to
enhance student attendance and achievement in higher education,”
Journal of Advanced Social Research, vol. 2, no. 3, 2012, pp. 120-125.
[22] P. Lokhande, D. Kotkar and P. Nikam, “Combined RFID-Biometric
based MIS for student information, “ International Journal of
Engineering Trends and Technology, vol. 4, no. 3, 2013, pp. 307-310.
[23] A. Reda, S. Panjwani and E. Cutrell, “ Hyke: Alow cost remote
attendance tracking system for developing regions,” in Proc. The 5th
ACM Workshop on Networked Systems For Developing Regions, 2011,
pp. 15-20.
[24] D. Deugo, “Using QR-codes for attendance tracking,” in Proc. 11th
International Conference on Frontiers in Education: Computer Science
and Computer Engineering (FECS 2015), 2015, pp. 267-273.
[25] F. Masalha and N. Hirzallah, “A student attendance system using QR
code,” International Journal of Advanced Computer Science and
Application, vol. 5, no. 3, 2014, pp. 75-79.
[26] M.H.M. Baban, “Attendance checking system using Quick Code for
students at the University of Sulaimaniyah,” Journal of Mathematics
and Computer Science, vol. 10, 2014, pp. 189-198.
[27] D.N. Singh and C.K. Munukoti, “Attendance monitoring system using
ARM9 with QR code,”, International Journal of Latest Trends in
Engineering and Technology (IJLTET), vol. 2, no. 1, January 2013, pp.
246-250.

https://doi.org/10.15242/IIE.E0517002 5

You might also like