OOSE Case Study Converted 1
OOSE Case Study Converted 1
And
Information Technology
Submitted to
Professor Dr. Subarna Shakya
Lecturer/Supervisor
Department of Computer Science
Kathmandu, Nepal
Submitted by
Rajesh Gautam (Roll No.27)
Babin Bista (Roll No.28)
March, 2022
Table of Contents
LIST OF FIGURES.................................................................................................................................ii
Chapter 1 INTRODUCTION ..................................................................................................................1
1.1 Introduction ........................................................................................................................................ 1
1.2 Objectives of study.............................................................................................................................. 1
1.3 Description of case study area ............................................................................................................ 2
CHAPTER 2 REQUIREMENT .................................................................................................................3
2.1 Functional Requirement ..................................................................................................................... 3
2.2 Non-Functional Requirement ............................................................................................................. 4
CHAPTER 3 ANALYSIS AND DESIGN .....................................................................................................5
3.1 Class Diagram ...................................................................................................................................... 5
3.2 System flow diagram........................................................................................................................... 6
CHAPTER 4 IMPLEMENTATION ...........................................................................................................8
Implementation ........................................................................................................................................ 8
CHATPER 6 CONCLUSION AND RECOMMENDATION ............................................................................9
6.1 Conclusion ........................................................................................................................................... 9
6.2 Recommendation................................................................................................................................ 9
REFERENCES
i
LIST OF FIGURES
Fig 2.1: Use-case diagram of Biometric Attendance System
ii
Chapter 1 INTRODUCTION
1.1 Introduction
The word "biometrics" is derived from the Greek words 'bios' and ‘metric’; which means life and
measurement respectively. This directly translates into "life measurement". Biometrics
technologies measure a particular set of a person's vital statistics in order to determine identity.
1
1.3 Description of case study area
In the traditional attendance system, it is required for the faculty to take attendance manually
before starting the class. However one needs to move with the times. Nowadays faculty face a lot
of issues like an increase in the student length, proxy attendance, latecomers, covering the entire
syllabus in a short limited period. So to avoid all these hassles a contactless biometric-based
attendance management system in school is highly needed. Today a large number of educational
institutes are using this biometric attendance management system to reorganize the process of
attendance record keeping. In a normal biometric attendance system student, can fix their
fingerprint in a device before entering the class but after the COVID19 situation as a
precautionary measure AI-powered contactless system is being used so that the risk of infection
between students can be avoided or reduced. This system will automatically record students’
attendance while they entered the class by recognizing their faces or fingerprint and not only that
it will also record their in-time and out-time respectively. Given that all tasks will be done
efficiently there is no chance of giving fake attendance since all students have to record their
biometrics identity.
2
CHAPTER 2 REQUIREMENT
3
Fig 2.1: Use-case diagram of Biometric Attendance System
Reliability:
Reliability based on this system defines the evaluation result of the system, correct identification
and verification of student based on facial and fingerprint.
Ease of Use:
The system is simple, user friendly, graphics user interface implemented so any can use this
system without any difficulties.
4
CHAPTER 3 ANALYSIS AND DESIGN
• The bottom partition shows the possible operations that are associated with the class.
5
3.2 System flow diagram
The students enroll for the registration process. Image and fingerprint data of student is stored in
the database. The students can use facial recognition or fingerprint for attendance. The
attendance result is shown by displaying student image or student id based on the recognition
method used.
6
Fig3.3: Flowchart of Biometric Attendance System based on fingerprint
7
CHAPTER 4 IMPLEMENTATION
Implementation
The design of the e-attendance system is based on the client/server architecture. A web
application serves as an interface between the users and the service provided by the system. The
general architecture of the system mainly includes the biometrics server, the biometrics database,
and the fingerprint and facial images. The server and the biometrics readers are communicating
over a local area network. Two types of biometrics readers are used to recognize students,
namely facial recognition and fingerprint recognition. The biometric readers are installed in
classrooms and connected to the LAN as shown. Before a lecture starts, students can use either
the fingerprint or facial recognition to record their attendances. Then, the biometrics data is sent
to a server. The server stores the collected biometrics data in a database. After the students’
registration, instructors can login through the web interface to track student’s attendance.
8
CHATPER 6 CONCLUSION AND RECOMMENDATION
6.1 Conclusion
Recent advances in biometric technology have resulted in increased accuracy at reduced cost,
biometric technologies are positioning themselves as the foundation for many highly secure
identification and personal verification solutions. Today's biometric solutions provide a means to
achieve fast, user-friendly authentication with a high level of accuracy and cost savings. Many
areas will benefit from biometric technologies. Highly secure and trustworthy electronic
commerce, for example, will be essential to the healthy growth of the global Internet economy.
Many biometric technology providers are already delivering biometric authentication for a
variety of web-based and client/server based applications to meet these and other needs.
Continued improvements in technology will bring increased performance at a lower cost.
6.2 Recommendation
Auditing processes and procedures on a regular basis during and after installation is an excellent
method of ensuring that the solution is functioning within normal parameters. A well developed
biometric authentication solution should not only prevent and detect fake personnel in
instantaneous, but it should also keep a secure log of the transaction activities.
9
REFERENCES
1. https://www.biometricsinstitute.org/what-is-biometrics
2. (Seng Chun Hoo), 2019, Biometric-Based Attendance System for Education Sector.
10