Smart Attendance System Applying QR Code
Smart Attendance System Applying QR Code
https://doi.org/10.15242/IIE.E0517002 1
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)
inserting, retrieving and deleting information, scanning QR QR code therefore that it then also holds the original data
code, viewing and producing reports. expressed as a polynomial.
There are four error correction levels used for QR codes as
depicted in Table 1.
TABLE I
QR CODE ERROR CORRECTION LEVEL
Error Correction Level Damage (%)
Level 1 7
Level 2 15
Level 3 25
Level 4 30
C. Masking
This process is used to avoid features in the symbol where
that can be might confuse a scanner, such as misrepresentative
shapes that looks the locator patterns and large blank areas.
Masking overturns certain modules of white becomes black
and black becomes white, whereas parting others alone.
https://doi.org/10.15242/IIE.E0517002 2
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)
V. SYSTEM IMPLEMENTATION
Open Application
This attendance system requires minimum hardware
specification of Intel Pentium Dual core i5 with RAM size of
2GB and minimum hard disk capacity of 500 Gb.An
additional device of an Android smartphone with camera
equipment
Register Y First Time The required software used for development process of the
QR codes scan and Web based program requires an operating
N
system Microsoft Windows 7 or Server with 64 bit. A web
basedWAMP server (PHP, MySQL & Apache) with an
Log in the system
additional QR code scanner application.
The welcome page comes with five options as iconized in
Fig. 5.
Take Attendance
Scan QR Code
Send information
to Server
Fig. 3 Flowchart
B. Entity Relationship Diagram (ERD)
The ERDensures all the entities, relationships and the
required attributes for the attendance system are available as
depicted in Fig. 4. The ERD diagram has been widely used in
most structured analysis and conceptual modeling because the
approach is easy to understand, powerful to model real-world
problems and it is readily translated into a database schema
Song et al., 1995).
S.Name
Teacher.id
Student id Subject
Teacher
Month
Status Sems
Attendance
Fig.6 Scanning process
teaches
Belongs The Reed Solomon ECC will detect errors and corrected
Studied
Subject
them if available by producing the masking techniques as
Student
mentioned. This is shown in Fig. 7.
S.Code
S.Name Semester
Teacher.id Student id
Course
Name
https://doi.org/10.15242/IIE.E0517002 3
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)
REFERENCES
[1] J.W. Westerman, L.A. Perez-Batres, B.S. Coffey and R.W. Pouder, “The
relationship between undergraduate attendance and performance
revisited: Alignment of student and instructor goals,”Decision Sciences
Journals of Innovative Education, vol. 9, no. 1, pp. 49-67, 2011.
[2] C. Dobkin, R. Gil and J. Marion, “Skipping class in college and exam
performance: Evidence from a regression discontinuity classroom
experiment,” Economicsof Education Review, vol. 29, no. 4, pp. 566-
Fig. 7 Error correction process 575, 2010.
[3] P.T. Chau and Y. Kuo, “Examining factors relating to classroom
attendance and performance,” Journal of Studies in Education, vol. 2,
The masking transformation is easily applied or removes no. 2, pp. 193-204, 2012.
using the exclusive-or operation. The unmasking of the format [4] T. Lin, “Effects of current and prior skipped classes on current exam
information is shown below. Reading counter-clockwise performance,” Journal of Economic Educators, vol. 11, no. 2, pp. 12-24,
2011.
around the upper-left locator pattern, we have the following [5] V. Shehu and A. Dika, “Using real time computer vision algorithms in
sequence of bits. White modules represent 0 and black automatic attendance management systems,” in Proc. 32nd International
modules represent 1. Conference on Information Technology Interfaces (ITI), 2010, pp. 397-
402.
The checking of attendance is later reported to the relevant [6] C. Saraswat and A. Kumar, “An efficient automatic attendance system
offices for attendance analysis as shown in Fig. 8. using fingerprint verification technique,” International Journal on
Computer Science & Engineering, vol. 2, no. 2, pp. 264-269, 2010.
[7] Q. Xiao and X.D. Yang, “A facial presence monitoring system for
information security,” IEEE Workshop on Computational Intelligence in
Biometrics: Theory, Algorithms, and Applications, 2009, pp. 69-76
[8] T. Jamil, “Automatic attendance recording system using mobile phone,”
Telecommunication Forum (TELFOR), 2011, pp. 1297-1299.
[9] P. Gomis-Porqueras, J. Meinecke and J.A. Rodrigues-Neto, “New
technologies in higher education: Lower attendance and worse learning
outcomes?,” Journal of Policy Analysis and Reform, vol. 18, no. 1, pp.
69-83, 2011.
[10] D.H. Shin J. Jung and B.H. Chang, “The psychology behind QR codes:
User experience perspective,” Computers in Human Behaviour, vol. 28,
2012, pp. 1417-1426.
[11] E. Ohbuchi, H. Hanaizumi and L.A. Hock, “Barcode readers using
camera device in mobile phones,” in Proc. International Conference on
Cyberworlds, 2004, pp. 260-265.
[12] aM.M. Rahim, M.N. Rahman and A.H. Seyal, “Use of software
development techniques: Experiences of Brunei Darussalam,”
Malaysian Journal of Computer Science, vol. 11, no. 1, 1998, pp. 9-21.
[13] bM.M. Rahim, A.H. Seyal and M.N. Rahman, “Use of software
development methods: An empirical study in Brunei Darussalam,”
Information and Software Technology, vol.39, no.14-15, 1998, pp. 949-
963.
[14] M.N. Rahman, A.H. Seyal and A.Y. Mohamed, “An empirical
framework of DBMS usage in Brunei Darussalam,” in Proc. Of the 5th
Annual Global Information Technology Management World Conference
Fig.8 Attendance checklist reporting (GITM), June 2004, pp. 189-192.
[15] I.Y. Song, M. Evans and E.K. Park, “A Comparative Analysis of Entity-
Relationship Diagrams,” Journal of Computer and Software
VI. CONCLUSION Engineering, vol. 3, no. 4, 1995, pp.427-459.
This paper has presented an attendance system that utilizes [16] A. Abdulkareem, D.U. Ike and F. Olowononi, “Development of a radio
frequency identification based attendance management application with
the use of QR code. The proposed system stores all data a pictorial database framework,” International Journal of Research in
repository in a database in a secure and protected database Information Technology, vol. 2, no. 4, 2014, pp. 621-628.
management systems (DBMS) namely the MySQL. [17] O. Shoewu, N.T. Makanjoula and S.O. Olatinwo, “Biometric-based
attendance system: LASU Epe campus as case study,” American Journal
The core of the attendance system is to provide a reliable of Computing Research Repository, vol. 2, no. 1, 2014, pp. 8-14.
and functional attendance tracking and reporting system which [18] S. Dey, S. Barman, R.K. Bhukya, R.K. Das, B.C. Haris, S.R.M.
enables administrator to identify and rectify those students Prasanna and R. Sinha, “Speech biometric based attendance system,” in
Proc. Twentieth National Conference on Communications (NCC), 2014,
who do not meet the minimum attendance as stipulated in the pp. 1-6.
policy and academic regulations of the school. In addition, the [19] M.A. Alia, A.A. Tamimi and O.N.A. Al-Allaf, “Integrated system for
attendance system will ultimately reduce administrative labor monitoring and recognizing students during class session,” The
https://doi.org/10.15242/IIE.E0517002 4
12th International Conference on Latest Trends in Engineering and Technology (ICLTET'2017) May 22-24, 2017 Kuala Lumpur (Malaysia)
https://doi.org/10.15242/IIE.E0517002 5