0% found this document useful (0 votes)
277 views

OOSE Case Study Converted 1

The document describes a case study report on implementing a biometric attendance system at Tribhuvan University in Nepal. It includes an introduction to biometric systems, the objectives of studying this system, a description of the case study area, requirements analysis and system design including class diagrams and flowcharts, and implementation details. The system uses facial recognition or fingerprint biometrics to record student attendance in a contactless manner and stores the records in a database, aiming to improve over traditional manual attendance methods.

Uploaded by

Babin Bista
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
277 views

OOSE Case Study Converted 1

The document describes a case study report on implementing a biometric attendance system at Tribhuvan University in Nepal. It includes an introduction to biometric systems, the objectives of studying this system, a description of the case study area, requirements analysis and system design including class diagrams and flowcharts, and implementation details. The system uses facial recognition or fingerprint biometrics to record student attendance in a contactless manner and stores the records in a database, aiming to improve over traditional manual attendance methods.

Uploaded by

Babin Bista
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Tribhuvan University

Central department of Computer Science

And
Information Technology

A Case Study Report


on
Biometric Attendance System

Submitted to
Professor Dr. Subarna Shakya
Lecturer/Supervisor
Department of Computer Science
Kathmandu, Nepal

Submitted by
Rajesh Gautam (Roll No.27)
Babin Bista (Roll No.28)
March, 2022
Table of Contents
LIST OF FIGURES.................................................................................................................................ii
Chapter 1 INTRODUCTION ..................................................................................................................1
1.1 Introduction ........................................................................................................................................ 1
1.2 Objectives of study.............................................................................................................................. 1
1.3 Description of case study area ............................................................................................................ 2
CHAPTER 2 REQUIREMENT .................................................................................................................3
2.1 Functional Requirement ..................................................................................................................... 3
2.2 Non-Functional Requirement ............................................................................................................. 4
CHAPTER 3 ANALYSIS AND DESIGN .....................................................................................................5
3.1 Class Diagram ...................................................................................................................................... 5
3.2 System flow diagram........................................................................................................................... 6
CHAPTER 4 IMPLEMENTATION ...........................................................................................................8
Implementation ........................................................................................................................................ 8
CHATPER 6 CONCLUSION AND RECOMMENDATION ............................................................................9
6.1 Conclusion ........................................................................................................................................... 9
6.2 Recommendation................................................................................................................................ 9
REFERENCES

i
LIST OF FIGURES
Fig 2.1: Use-case diagram of Biometric Attendance System

Fig 3.1: Class diagram of Biometric Attendance System

Fig 3.2: Flowchart of Biometric Attendance System based on face recognition

Fig3.3: Flowchart of Biometric Attendance System based on fingerprint

ii
Chapter 1 INTRODUCTION
1.1 Introduction
The word "biometrics" is derived from the Greek words 'bios' and ‘metric’; which means life and
measurement respectively. This directly translates into "life measurement". Biometrics
technologies measure a particular set of a person's vital statistics in order to determine identity.

A biometric is any measurable, robust, distinctive, physical characteristic or personal quality of


an individual that can be used to identify, or verify the claimed identity of, that individual. The
term biometrics is commonly used today to refer to the authentication of a person by analyzing
physical characteristics, such as fingerprints, faces or behavioral characteristics, such as
signatures. Since many physical and behavioral characteristics are unique to an individual,
biometrics provides a more reliable system of authentication than ID cards, keys, passwords, or
other traditional systems. A biometric system is essentially a pattern recognition system that
operates by acquiring biometric data from an individual, extracting a feature set from the
acquired data, and comparing this feature set against the template set in the database. Depending
on the application context, a biometric system may operate either in verification mode or
identification mode. In the verification mode, the system validates a person’s identity by
comparing the captured biometric data with her own biometric template(s) stored in the system
database. In the identification mode, the system recognizes an individual by searching the
template of user in the database for a match.

1.2 Objectives of study

• To collect and analyze the requirements of the proposed system.

• To study various forms of biometric attendance system.

• To analyze the implementation of the biometric attendance system.

1
1.3 Description of case study area
In the traditional attendance system, it is required for the faculty to take attendance manually
before starting the class. However one needs to move with the times. Nowadays faculty face a lot
of issues like an increase in the student length, proxy attendance, latecomers, covering the entire
syllabus in a short limited period. So to avoid all these hassles a contactless biometric-based
attendance management system in school is highly needed. Today a large number of educational
institutes are using this biometric attendance management system to reorganize the process of
attendance record keeping. In a normal biometric attendance system student, can fix their
fingerprint in a device before entering the class but after the COVID19 situation as a
precautionary measure AI-powered contactless system is being used so that the risk of infection
between students can be avoided or reduced. This system will automatically record students’
attendance while they entered the class by recognizing their faces or fingerprint and not only that
it will also record their in-time and out-time respectively. Given that all tasks will be done
efficiently there is no chance of giving fake attendance since all students have to record their
biometrics identity.

2
CHAPTER 2 REQUIREMENT

2.1 Functional Requirement


The following are the main functions of the system that should be required by the users:

• Keeping (saving) data in the database

• Retrieving of data from the database.

• Avoiding duplication of student attendance records in the database.

• Register student to the data base.

Fig 2.1: Use-case diagram of Biometric Attendance System

3
Fig 2.1: Use-case diagram of Biometric Attendance System

2.2 Non-Functional Requirement


This system is intended to meet the following non-functional requirements:

Reliability:
Reliability based on this system defines the evaluation result of the system, correct identification
and verification of student based on facial and fingerprint.

Ease of Use:
The system is simple, user friendly, graphics user interface implemented so any can use this
system without any difficulties.

4
CHAPTER 3 ANALYSIS AND DESIGN

3.1 Class Diagram


Classes in class diagrams are represented by boxes that are partitioned into three:

• The top partition contains the name of the class.

• The middle part contains the class’s attributes.

• The bottom partition shows the possible operations that are associated with the class.

Fig 3.1: Class diagram of Biometric Attendance System

5
3.2 System flow diagram
The students enroll for the registration process. Image and fingerprint data of student is stored in
the database. The students can use facial recognition or fingerprint for attendance. The
attendance result is shown by displaying student image or student id based on the recognition
method used.

Fig 3.2: Flowchart of Biometric Attendance System based on face recognition

6
Fig3.3: Flowchart of Biometric Attendance System based on fingerprint

7
CHAPTER 4 IMPLEMENTATION

Implementation
The design of the e-attendance system is based on the client/server architecture. A web
application serves as an interface between the users and the service provided by the system. The
general architecture of the system mainly includes the biometrics server, the biometrics database,
and the fingerprint and facial images. The server and the biometrics readers are communicating
over a local area network. Two types of biometrics readers are used to recognize students,
namely facial recognition and fingerprint recognition. The biometric readers are installed in
classrooms and connected to the LAN as shown. Before a lecture starts, students can use either
the fingerprint or facial recognition to record their attendances. Then, the biometrics data is sent
to a server. The server stores the collected biometrics data in a database. After the students’
registration, instructors can login through the web interface to track student’s attendance.

8
CHATPER 6 CONCLUSION AND RECOMMENDATION

6.1 Conclusion
Recent advances in biometric technology have resulted in increased accuracy at reduced cost,
biometric technologies are positioning themselves as the foundation for many highly secure
identification and personal verification solutions. Today's biometric solutions provide a means to
achieve fast, user-friendly authentication with a high level of accuracy and cost savings. Many
areas will benefit from biometric technologies. Highly secure and trustworthy electronic
commerce, for example, will be essential to the healthy growth of the global Internet economy.
Many biometric technology providers are already delivering biometric authentication for a
variety of web-based and client/server based applications to meet these and other needs.
Continued improvements in technology will bring increased performance at a lower cost.

6.2 Recommendation
Auditing processes and procedures on a regular basis during and after installation is an excellent
method of ensuring that the solution is functioning within normal parameters. A well developed
biometric authentication solution should not only prevent and detect fake personnel in
instantaneous, but it should also keep a secure log of the transaction activities.

9
REFERENCES
1. https://www.biometricsinstitute.org/what-is-biometrics

2. (Seng Chun Hoo), 2019, Biometric-Based Attendance System for Education Sector.

3. (Ross, 2004), An Introduction to Biometric Recognition

10

You might also like