0% found this document useful (0 votes)
45 views29 pages

alamonron

Uploaded by

royalconsultedu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views29 pages

alamonron

Uploaded by

royalconsultedu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CHAPTER ONE

INTRODUCTION

1.0 Background of the Study

Attendance management of students in institution can be rigorous using the conventional


method of paper sheets and old file system method. Every academic institution poses some
standards concerning how attendance is to be confirmed for student in classes, laboratory
sessions and examination halls. That is why keeping the accurate record of attendance is very
important. The approach of using paper sheets and the old file system to confirmed students has
been in use for years. There are so many bottlenecks with the conventional method, one of such
problem is the difficulty for the management to compute the percentage of student attendance in
classes and frequently modify their information. Also in institution, tracking and monitoring
student time of attendance could be tedious task, time consuming and as well prone to errors. As
an alternative to traditional manual clocking process by students in classes or during
examination, biometrics characteristics can be used for authenticating students.

This project on developing Fingerprint and Face Recognition Based Student Attendance
Monitoring System. This two methods is adopted in this research work for the fact they are part
of the most successful applications of authentication technology. In the manual signing
processes, where lecturer give a sheet of paper to student to write their names and signature as a
form of confirming their presence for a particular class session, falsification in student
attendance mostly occur a situation where by a student can sign on behalf of his or her colleague
as being present in the class when not true can be so difficult to prevent from happening
especially for large classes where row count can takes longer time International Journal of
Computer Science and [1].

Biometric is a field of technology that uses automated methods for identifying and
verifying a person based on physiological and behavioral traits. Because some parts of the
human body is use in biometrics, the issue of getting lost is not possible and for password to be
easily guess can be easily avoided. Also, utilizing biometrics in most cases can be said to be
more efficient when speed is considered and convenient than employing password and ID cards
method. Face recognition is a method of identifying or verifying the identity of an individual
using their face. Face recognition systems can be used to identify people in photos, video, or in
real-time. Facial recognition system is a technology potentially capable of matching a human
face from a digital image or a video frame against a database of faces. Using a particular person
fingerprint as a form of authentication is just like using natural physical data as a password. The
benefit of using biometric authentication is that it is absolutely distinct to each person. There are
no two different individuals with the same fingerprint, it is difficult and impossible for one
another to have the same fingerprint, and fingerprints from different people can never be the
same. Also, a fingerprint can never be guess by a criminal, such as a password which imposter
can easily predict using a user birth date or any other common password. Infiltration is very hard
to come by due to the fact that criminal will not be able to snoop around to steal user password
when using ATM with the 4-digit pass code [2].

This embedded system of using both facial and fingerprint recognition can be categorize
as one of the most mature biometric and authentication traits and is accepted in courts of law as a
legitimate proof of evidence. Hence this project will adopt this methods to design a system which
is automate for authentication for attendance system.

1.1 Problem Identification

The traditional system is still mostly used in lecture room or laboratory session in most
institution today. Lecturer or instructor will give out a sheet of paper containing list of student’s
name to sign or in some cases, the student will be the ones to write their names, student id and
matriculation number to indicate their presence for a particular class. Falsification in student
attendance does occur rampantly in the traditional method. For example, another student can
easily sign an attendance on behalf of another student. In other to prevent this problem, it is
necessary to develop an Authentication System for Students using fingerprint and facial
recognition that will be employed to track and keep the attendance of every student in a
particular class. These systems are unique feature for everyone compare to using barcode in
smart cards.

1.2 Aim and Objectives


The aim of the study is to design and develop a reliable, scalable and cost effective
Fingerprint and Facial Recognition Student Attendance Monitoring system. This is to be
achieved by the following objectives:

(i) To carry out the analysis of manual processes involved in class attendance and
examination attendance.
(ii) To design a new system for the (i) above and
(iii) To implement the design using Microsoft Visual Basic.net.

1.3 Significance of the Study

The System for Students using facial and fingerprint authentication will eliminate the use
of paper in manual signing processes and all the risk associated with it. One of the risks of using a
paper in class attendance is that it can be easily misplaced and students cheat by signing for each
other not present in the class thereby defeating the aim of taking the attendance. Tracking and
monitoring students time of attendance could be tedious, time consuming and susceptible to error.
Thus, the System will drastically reduce time needed to verify attendance data.

The System also allows the institution management to track or investigate student class
attendance in a particular course having poor attendance thereby enabling the management to
rectify the situation by providing the necessary interventions. The system provide high level of
security whereby making it impossible for imposters and impersonators in making their ways to
examination halls. The System using fingerprint Biometric will keep historical data making it
easy for lecturers to access and grade students.

1.4 Methodology
The research method used for this project work gives a description on how pharmacy
management system will be developed.

Therefore the method used in the design and collections of information from various sources are
as follows:

i. Studying the present system in detail and the organizational style.


ii. Knowing and understanding the input and output processes of the existing
system.
iii. A qualitative form of interview was conducted in the organization to
understand the mode of operation of the old system.
iv. Primary data: This source has to do with the text book contacted for the
development of this project.
1.5 Scope of the Study

The scope of this work is to develop a Fingerprint and Facial Recognition Based Student
Attendance monitoring System that will improve how attendance management is done by using
fingerprint and student facial as a form authentication for proof of attending a class. The system
will be a window based application developed using Microsoft Visual Basic.net as the preferred
programming language for building the user interface and Microsoft SQL Server for database
design. It does not cover other aspects of biometric. The efficiency of the scanner can be reduced
due to the roughages in the captured images which are often caused by worn-out or cut or dirt’s
found on fingerprint. Therefore, there is every possibility that enrolled users can be rejected by
the system, else the facial authentication can be used. Also the scanner or sensor cannot
distinguish between a real and an artificial finger; therefore it is possible to fool the scanner. In
addition, if an enrolled fingerprint is been duplicated or spoof, it is not possible to change
fingerprint as in the case of password because user finger biometric.
CHAPTER TWO

LITERATURE REVIEW

2.1 Historical Background of the study

Biometrics is the science and technology of measuring of measuring and breaking down
natural information. In data innovation, biometrics relates to technologies that examine and
measure physical human body features, such as DNA, fingerprints, eye retinas and irises, voice
patterns, facial patterns and hand measurements, for validation or authentication purposes
(Rouse, 2008). The process of Biometric validation is way by which an assessing of some
spotting biological or traits can be distinctly identified in an individual. These unique identifiers
constitute retina, earlobe geometry, iris patterns, fingerprints, hand geometry, voice waves,
earlobe geometry DNA, and signatures. The voice waveform recognition method with tape
recordings in telephone wiretaps of verification which has been utilized for so many years is now
majorly being used in research facilities for access to restrictively databanks. Law enforcement
has implemented Facial-recognition technology to fish out people in congregation with
significant unwavering quality and reliability. Mostly industries utilize Hand geometry for
providing physical access to buildings. For people who try to impersonate another individual,
earlobe geometry is utilized to detect their identity. Signature comparison is not referring to as
being dependable or reliable in isolation to other method of biometric verification but provides
an additional level of check or verification when utilized in together with other biometric
verification methods. In Computer Science, biometric identification or biometric authentication
is utilized as a mode of identification and access control and also being implemented to detect
individuals in groups that are being watch or under surveillance [3].

Using biometric verification is turning into a progressively regular for Authentication in


corporate and public security systems, consumer electronics and point of sale (POS) applications.
In addition to security, the motivation behind biometric verification has been convenience to
avert identity theft, biometric data is usually encrypted when it's gathered [4]. The process of
biometric verification process starts by using a software application to spot some specific points
of human physical characteristics which serves as match point or template. The match point
which is stored in the database is then processed using an algorithm that converts the information
captured into a numerical format. The input gotten from user input through biometric scanner is
now being compared to the numerical value stored, and the authentication process if matches that
of the database template is approved or rejected if it differs.

The identification verification process is the same irrespective of the biometric


methodology employed. An individual distinct feature is captured, processed by a software
application and stored as a template into a database. Subsequently, when there is need for
verification of an individual, a new physical feature is captured and compared against the
template stored from a data source. Using biometrics for recognizing users offers some
extraordinary favorable circumstances because only biometrics can recognize an individual as
himself or herself, biometrics could make keys and combination locks could turn out not to be
useful due to biometrics and all data, including biometrics is vulnerable whether in storage or in
processing state [5].

2.2 History of Biometrics

The expression “Biometrics” is gotten from the Greek words “bio” (life) and “metrics”
(to measure) [7] Automated biometric systems have just become useable over the last few
decades, because of substantial improvement in the area of image and computer processing.
Although biometric technology is a subject of twenty first century, nevertheless the Biometrics
has its root as back thousands of years. The ancient Egyptians and the Chinese has a major part
in biometrics history. The focus today is on utilizing biometric face recognition, iris recognition,
fingerprint, retina recognition and recognizing physical features of human being to put a stop to
terrorism predicament and improve security measures. The first recorded systematic capture of
hand and finger images for recognizing purposes was during 1858 utilizes by Sir William
Herschel, Civil Service of India, who recorded a handprint on the back of a contract for each
worker to distinguish employees. During 1870, Alphonse Bertillon created a technology for
recognizing people which is solely dependent on elaborate records of their body measurements,
physical descriptions and photographs. This method was termed as “Bertillonage” or
anthropometrics and the utilization was terminated in 1903 when it was apparent that some
people have same measurements and physical characteristics (State University of New York at
Canton, 2003). Sir Francis Galton, in 1892, created a classification system for fingerprints using
minutiae characteristics that is utilized by educationalists and researchers in this modern day.

The FBI and West Virginia University in year 1920 established a degree program
(Bachelor’s Degree) in biometric system that is after consulting some professional associations
like International Association for Identification. This serves as the first biometrics based degree
program despite some universities having started related courses in biometrics.

In April 2002, a Staff Paper on palm print technology and Integrated Automated Fingerprint
Identification System (IAFIS) palm print capabilities was submitted to the Identification Services
(IS) Subcommittee, Criminal Justice Information Services Division (CJIS) Advisory Policy
Board (APB). The Joint Working Group called “for strong endorsement of the planning, costing,
and development of an integrated latent print capability for palms at the CJIS Division of the
FBI.” As a result of this endorsement and other changing business needs for law enforcement,
the FBI announced the Next Generation IAFIS (NGI) initiative. A major component of the NGI
initiative is development of the requirements for and deployment of an integrated National Palm
Print Service (2002 Palm Print Staff Paper is submitted to Identification Services
Committee).

The National Science & Technology Council, a US Government cabinet-level council,


established a Subcommittee on Biometrics to coordinate biometrics R&D, policy, outreach, and
international collaboration (2003 Formal US Government coordination of biometric activities
begins). On May, 28 2003, The International Civil Aviation Organization (ICAO) adopted a
global, harmonized blueprint for the integration of biometric identification information into
passports and other Machine Readable Travel Documents (MRTDs) … Facial recognition was
selected as the globally interoperable biometric for machine assisted identity confirmation with
MRTDs. The European Biometrics Forum is an independent European organization supported by
the European Commission whose overall vision is to establish the European Union as the World
Leader in Biometrics Excellence by addressing barriers to adoption and fragmentation in the
marketplace. The forum also acts as the driving force for coordination, support and strengthening
of the national bodies (2003 European Biometrics Forum is established).
The United States Visitor and Immigrant Status Indication Technology (US-VISIT)
program is the cornerstone of the DHS visa issuance and entry I exit strategy. The US-VISIT
program is a continuum of security measures that begins overseas at the Department of State’s
visa issuing posts, and continues through arrival to and departure from the US. Using biometrics,
such as digital inkless fingerprints and digital photographs, the identity of visitors requiring a
visa is now matched at each step to ensure that the person crossing the US border is the same
person who received the visa. For visa-waiver travelers, the capture of biometrics first occurs at
the port of entry to the US. By checking the biometrics of a traveler against its databases, US-
VISIT verifies whether the traveler has previously been determined inadmissible, is a known
security risk (including having outstanding wants and warrants), or has previously overstayed the
terms of a visa. These entry I exit procedures address the US critical need for tighter security and
its ongoing commitment to facilitate travel for the millions of legitimate visitors welcomed each
year to conduct business, learn, see family, or tour the country(2004 US-VISIT program
becomes operational). The Automated Biometric Identification System (ABIS) is a Department
of Defense system implemented to improve the US Government’s ability to track and identify
national security threats. The associated collection systems include the ability to collect, from
enemy combatants, captured insurgents, and other persons of interest, ten rolled fingerprints, up
to five mug shots from varying angles, voice samples (utterances), iris images, and an oral swab
to collect DNA(2004 DOD implements ABIS).

2.3 Review of Related Study

There are several types of biometric data use commonly today. Each of these devices has
a different mechanism employed to captures data in different form. The different types of
biometric that are frequently in use today are devices that capture data in various formats using
different mechanism. The method of production and trait of the biometric data indicates the
encroaching of the protocol for enrollment and authentication of users [6]. The associated
changes in the process of measurement and production can give a vicious person an access and
allowing them to alter the security shielded around the biometric system by interfering with the
operation of the mechanism for capturing or by changing features of the biometric. There are
many types of biometric devices employed today. Some of these biometric devices are generally
detected in commonplaces such as movies. Biometrics is essentially the identification of human
features that are distinct to each person. The best way to keep your devices safe and ascertain
people don’t illegally have access to your personal belongings such as files utilizing is to
implement a any biometric technology available in the market.

2.3.1 Retina Scanner

These scan are the distinct biometric feature/pattern in each individual’s iris, and
compares it with a certain number of distinct recognizing patterns which distinguish each
individual separately from other people. In a retinal scan, at the back of the eye, a biometric
format is shaped by recording the patterns of capillary blood vessels. Iris scanning can be carried
out remotely utilizing a high-resolution camera and formats generated by a technique similar to
that of retinal scanning. Iris scanning and retinal scanning are both used to distinguish a person
as indicated by their distinct pattern. Despite their efficiency, implementing them is more costly
and complex. The retina of human being is a thin tissue constituted by neural cell which is
located in the posterior portion of the eye. The composite structure of the capillaries that supply
the retina with blood makes the retina of each individual distinct.

Retinal scanners are regularly used for authentication and identification purposes. Retinal
scanning has been implemented in several places such as several government agencies, prisons,
ATM validation of authentic owners and guiding against fraud, medical application such as
transmitted diseases (AIDS, Malaria, Chicken pox and e.t.c). The network of blood vessels in the
retina of human being cannot be genetically determined in entirety and for that reason even twins
that are identical don’t have same pattern

2.3.2 Iris Scanner

Iris scanning is an automated method of biometric identification which uses mathematical


pattern-recognition techniques on video images of the iris of a person’s eyes, whose complex
random patterns are distinct and be spotted from a far range. Digital formats which are referred
to as template are converted from these patterns by using mathematical and statistical algorithms
which allow the identification of an individual or someone trying to impersonate the legitimate
person. Globally, there are millions of individuals in so many countries that have been enrolled
into the iris recognition systems for the purpose convenience in passport-free automated border-
crossings, and some national ID systems based on this technology are being deployed. The
significant benefit of iris recognition, apart from its utmost resistance to false matches and speed,
is the stability of the iris as an internal, protected, yet externally visible organ of the eye.

Figure2.1 Structure of Iris

The major feature that depicts iris of the eye as the most ideal and accurate section of
human body for biometric recognition is that it is an internal organ which is better guided from
damage and wear by extremely sensitive and transparent membrane (cornea). This characteristic
makes it more better option to fingerprint, which can be difficult after years of rigorous
involvement in some manual labor.
The iris is mostly flat, and its geometric configuration is only controlled by two complementary
muscles (the sphincter pupillae and dilator pupillae) that control the diameter of the pupil. This
makes the iris shape far more predictable than, for instance, that of the face. The iris has a fine
texture that like fingerprints is determined randomly during embryonic gestation. Like the
fingerprint, it is very hard (if not impossible) to prove that the iris is unique [6].

2.3.3 Fingerprint Scanner

When considering the price of biometric identification scanners available in the market
today, fingerprint scanning is always on the lower end. There are some fingerprint scanners that
can only scan the actual print while the costlier scanners can capture the shape and size of the
thumb, presence of blood in the fingerprint and other physical characteristics on a finger. The
expensive scanner can capture a 3D image of the fingerprint which in turn makes it more
difficult for such fingerprint to be duplicated. The process of acquiring image by the scanner is
either though capacitance sensing or optical scanning.

Generation of biometric templates is based on matching minutiae characteristic features


in fingerprints. The examining of fingerprints for the purpose of generally requires the
comparison of so many features of the print format. These comprise of patterns which are
aggregated features of ridges and the minutia points, that are distinct features found within this
patterns. Knowing the attributes of human skin and structure is paramount to successfully utilize
some of the technologies of imaging.

The three fundamental patterns of fingerprint ridges are presented below.

(i) Arch: In arch, the ridges will enter from one side of the finger then rise in the center
forming an arc, and then exit the other side of the finger.
(ii) Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same
side.
(iii) Whorl: Ridges form circularly around a central point on the finger.

The arch pattern the loop pattern the whorl pattern

Figure2.3 Fingerprint patterns


Minutia features

The major minutia features of fingerprint ridges are ridge ending, bifurcation, and short
ridge (or dot). The ridge ending refer to the point at which a ridge terminates. Bifurcations are
points whereby a single ridge is divided into two ridges. Short ridges are ridges which are
importantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are
very important in the examining of fingerprints since there has not been any record of two
fingerprints proven to be identical.

The ridge ending Bifurcation Short ridge (dot)

Fingerprint sensors

A fingerprint sensor is an electronic device used to capture a digital image of the


fingerprint pattern. The image captured from the sensor is referred to as a live scan, which in turn
is processed digitally to develop an accumulation of extracted features (Biometric Template).
This template is stored in a database and utilized for matching. Figure 2.4 presented some
fingerprint sensors.

Figure2.4 Scanners

2.3.4 Facial Biometrics

A new method in facial recognition uses the visual details of the skin, which is captured
in standard digital or scanned images. This technique is referred to as skin texture analysis,
which turns the distinct patterns, lines, and spots obvious in an individual’s skin into a
mathematical space.Facial biometrics is very good when being utilize for facial authentication
than for identification purposes, because of the fact that an individual face can have a physical
damage or altered, disguise with a mask, etc. Environment can also affect the camera during the
process of capturing. Facial biometrics has been confirmed as a method that can improve
validation and authentication of users tremendously.

2.3.5 Voice Recognition


Every individual on the soil of the earth has a distinct voice pattern. Although the
changes can be hardly noticeable to the human hear because it’s a slight change. Nevertheless,
with the aid of exceptional software for voice recognition, those minute variations in each
individual’s speech can be spotted, tested, and authenticated to give access only to the person
owns the tone, pitch, and volume of speech uttered. Voiceprint recognition performs its operation
by comparing the vocal patterns of an individual with template previously stored. This type of
biometric has the ability to determine duress through adequate examining of pattern of stress in
the input voiceprint. This feature gives voice recognition an advantage over other forms

2.3.6 Hand Print Patterns

Similarly to finger print, everybody has distinct handprints. A handprint Biometric


Systems scans hand and finger and the captured feature is compared with the specimen stored for
the user in the system. The user is given access or rejected based on the result of this verification.
Handwriting recognition is the ability of a computer to receive and interpret intelligible
handwritten input from sources such as paper documents, photographs, touch-screens and other
devices. The image of the written text may be sensed "off line" from a piece of paper by optical
scanning (optical character recognition) or intelligent word recognition. Alternatively, the
movements of the pen tip may be sensed "on line", for example by a pen-based computer screen
surface. Handwriting recognition principally entails optical character recognition. However, a
complete handwriting recognition system also handles formatting, performs correct segmentation
into characters and finds the most plausible words.
When a person’s hand is place on a scanner, such user will have a distinct fingerprint pattern, as
well as the size and shape of the entire hand is also very unique. This is a more complex
approach compare to regular fingerprint scanning, and will definitely be more accurate with
minimum occurrence of falsification. Templates generated can be said to be very compact, and
the method is often sensed by users to be less invasive than other types of biometric devices.

2.3.7 DNA Fingerprint

This method works by taking a tissue sample from an individual and then sequencing and
comparing short segments of DNA. DNA technique has a very low acceptance rate because
samples have to be taken from human body and also the speed at which these samples are
processed

2.3.8 Deep Tissue Illumination

A relatively new method that involves illumination of human tissue by specific lighting
conditions and the identification of deep tissue patterns based on light reflection. This method is
claimed to be less prone to falsification than other forms of biometric techniques, b it is very
complex to imitate the process of light reflection [7].

2.3.9 Voice Print Keystroke Pattern

This method works by discovering patterns while an individual is typing on a keyboard


and these patterns are then compared against previous patterns stored. Biometrics that has to do
with keystroke have been utilized to make password entry more complex, to provide certainty
that a password was inputted by the same person that saved it by comparing the speed at which it
was typed.

Some of these products are tend to be expensive than others simply because they employ
technology that is much more complex. Nevertheless, when considering the level of security
level required the amount of to acquire different types of biometric devices will be almost the
same. The features derived from the biometric are then converted into a biometric template. The
process of retrieving features from the captured data and converting it into a template are usually
important. These templates are then used as the foundation for verification during authentication.
The process by which biometric template are acquired, transmitted and stored are important
aspects of biometric security systems, because risks can surface from these are areas and
spurious attacks can be made which will compromise the integrity of the system.

2.5 Related Studies


There are some existing related works on the application of different methods in
managing attendance of students. One of the methods proposed for monitoring attendance is
embedded computer based lecture attendance management system. In this type of system, a card
is reader is interfaced with a digital computer system and an electronic card is provided and
personalizes to each user for authentication. Authors in, used a wireless attendance management
system that authenticates using the iris of the individual. The system uses an off-line iris
recognition management system that can finish all the process including capturing the image of
iris recognition, extracting minutiae, storing and matching.

Attendance Management has also been carried out using attendance software that uses
passwords for authentication. The authors in designed and implemented a system that
authenticates the user based on passwords, this type of system allows for impersonation since the
password can be easily fiddled. There are cases where passwords could be forgotten which inturn
prevents the user from gain access into the system.
There are attendances software’s that are device centric solutions such as RFID-based
student attendance system and GSM-GPRS based student attendance system. The GSM-GPRS
based systems works by using the position of classroom for marking attendance which is not
dynamic. Wrong attendance might be marked if schedule or location of the class changes. One of
the problems with RFID based systems is that students will be compelled to always carry RFID
cards and also the RFID detectors are needed to be installed.
Automated Teller Machine(ATM ) system authentication using fingerprint Biometrics in
the banking sector is a related study to this Personal Authentication System using fingerprint
biometrics of students in institutions, where the students biometrics data are been collected in
their various class, laboratory, examination halls and even tutorial by their lecturer, invigilators
and even securities personnel in the institution to keep track of each student’s attendance
performance in various courses. This biometrics authentication can also be used in the banking
sector to keeping track of all activities been carried out by each customer that performs
transaction through the ATM. With an ATM, a customer or client is able to conduct many
banking activities such as cash withdrawal, paying electricity & phone bills, money transfer,
beyond official hours and physical interaction with bank staff [6].
A newer high-tech method of operating sometimes called card cloning to entangle the
installation of a magnetic card reader over the ATM's card slot & the use of a wireless
surveillance camera to keep the user's Personal Identification Number. Real Card data are then
cloned into a duplicate card & the criminal attempts to cash withdrawal. To overcome this piracy
in money transactions, the idea using fingerprints of customers as password along with the
traditional pin number [8].
Another related study to this personal authentication system using fingerprint biometric is
the Biometric Voting Machine where voters are been registered and vote using the fingerprint
biometric. This machine makes the registration and voting efficient, fast and accurate in order to
avoid cheating or imposter voting more than once. The objective of voting is to allow voters to
exercise their right to express their choices regarding specific issues, pieces of legislation, citizen
initiatives, constitutional amendments, recalls and to choose their government and political
representatives.

Technology is being used more and more as a tool to assist voters to cast their votes. To
allow the exercise of this right, almost all voting systems around the world includes voter
identification and authentication, voting and recording of votes cast, vote counting, publication
of election results and these are achieved using the Biometric Authentication system using
fingerprint. Voter identification is required during two phases of the electoral process: first for
voter registration in order to establish the right to vote and afterwards, at voting time, to allow a
citizen to exercise their right to vote by verifying if the person satisfies all the requirements
needed to vote (authentication). Another important reason fingerprint scanners are used is, they
provide a quick, easy, efficient, and secure measure through which, an individual with the proper
access privileges can authenticate. The fingerprint of an employee for example, is stored in a
database that the scanner queries every time it is used. There are two basic Boolean conditions
the scanner then goes through when an individual’s print is scanned. First, the print is usually
searched for in a database of fingerprints, once it is found it then looks at the print to see what
access privileges are associated with the print and compares them to the access they are trying to
gain.

2.5.1 Integrated Information System

Integrated Information Systems offer administrators with a unified view of heterogeneous


data sources. To provide a single consistent result for every object represented in these data
sources, data fusion is concerned with resolving data inconsistencies present in the sources.
Querying the heterogeneous data sources, combining the results, and presenting them to the
administrator is performed by the integration system. One needs to identify corresponding
attributes that are used to describe the information items in the source. The result of this step is a
schema mapping that is used to transform the data present in the sources into a common
representation;

2.5.2 Database and Database Management System

A database is an integrated collection of data, usually so large that it has to be stored on


secondary storage devices such as disks or tapes. This data can be maintained as a collection of
operating system files, or stored in a DBMS (database management system). A Database
Management System (DBMS) is computer software designed for the purpose of managing
databases based on a variety of data models. A DBMS is a complex set of software programs that
controls the organization, storage, management, and retrieval of data in a database. DBMS are
categorized according to their data structures or types, sometime DBMS is also known as
Database Manager. It is a set of prewritten programs that are used to store, update and retrieve a
Database [7]. When a DBMS is used, information systems can be changed much more easily as
the organization's information requirements change. New categories of data can be added to the
database without disruption to the existing system. Organizations may use one kind of DBMS for
daily transaction processing and then move the detail onto another computer that uses another
DBMS better suited for random inquiries and analysis. Database servers are specially designed
computers that

2.5.3Content management systems

A Content Management System (CMS) is one that is used to manage information, be it


web-based systems or information delivery systems. These kinds of systems carefully manage
data in an organized fashion in documents and borders that can be easily understood and is also
presentable [10]. Content management has been around for a while, but did not eventually
become acceptable till the age of technology such as the Internet, for example, or the portable
computer [11]. The content stored in the system is done in a native format which enables the
easy retrieval of information. Most content management systems have various processes
embedded in them during the retrieval of information. They also enable accessibility features
such as search boxes, user interaction, customization, all of which improve on user experience.
CMS are contained in frameworks which are used for online systems which involve
trading of goods and services. One of such services can be seen in Amazon, which is an
American company that deals with the sale of all kinds of goods from verified vendors.

2.5.4 Inventory management systems

The growing popularity of computers and gadgets in general has in no way slowed
down the birth of new innovative ways in the pharmaceutical management system. These days,
computers have become an essential part of many people’s lives due to the versatility of the
devices, and how much they can do with so little effort. Performing tasks which would have
taken hours and maybe days in the past, have become possible in seconds. The invention of the
Internet and other utilities such as search engines (Google being a prime example), have made
searching for the most remote things possible in very little time. Also, the portability of the
computer systems have helped the cause in making information more portable than it was in
the past.
In the same vein, the management of inventory and taking stock of goods and services
in different organizations have become so much easier with the growth of the computer
system. These days, even phones and tablets have faster processing power than the early
generation computers, which has made it easier to perform tasks. Our economy has been
referred to as the “learning economy”, because of the rate at which new innovations come to
light. In China, a text message system was developed to help in general patient pharmaceutical
care, and promote mobile systems [8]
The management of inventory has taken various shapes and forms, one of which is
called a Vendor-Managed Inventory (VMI) system. The VMI gives a supplier full discretion to
deliver goods and services, as long as the customer can fully optimize these goods and
services. This method or level under the VMI system is called the Maximum Level. The other
level in the system is called Order-up-to policy which allows the supplier to get the inventory
of the customer to its maximum capacity at every delivery.
Various computerized management systems have been useful in helping to save lives
around the world. The earthquake in Haiti in 2010 brought about a need for medicines for the
injured, and also aid for them. Due to the high influx of medicines into the country at the time,
an inventory management system was developed to help the cause. The hospitals in the country
did not at the time have the means to provide medicines to the needy without losing track of
what has been given to who, and what has not been given. Also, the management systems that
were proposed and later implemented helped in tackling shortage problems, thereby saving
countless lives in the process. The Pharmacy Computerized Inventory Program (PCIP) had
four processes which include: needs assessment, the development of the PCIP, implementation
of the PCIP, and outcomes and data analysis. The program proved to be a success and greatly
reduced the turmoil going on in the land at the time of the earthquake [11].
Other parts of the world such as the Middle East have not been left out of the trend. A
group of individuals in King Saud Bin Abdulaziz University for Health Sciences in Saudi
Arabia came together to study and report findings on a pharmacy inventory management
system in a hospital in Saudi Arabia. Their software controlled and monitored existing stock
levels, which allowed them to decide how much quantity of drugs to order in order to be at full
capacity. The application was installed on all computers of the staff in the hospital which was
used and information was directly updated to the database [9].
These various systems have allowed ease of work at the hospitals and pharmacies, and
reduction of errors in drug related practices. Also, with the introduction of these practices, the
prescription drug abuse trend has been
curbed to a considerable extent. These days, applications make use of large databases and
verification processes.
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 Methodology

Top-down model was adopted in designing the Facial and Fingerprint Based Student
Attendance monitoring System. The result of the analysis was broken down into different
components where the design is started from the main component down to the elementary
components. The System was categorized into three (3) major subsystems which are; admin
subsystem, and lecturer subsystem and student subsystem. Each of the listed subsystems above
has a different user privileges to use the system.
Admin subsystem, here the user of this subsystem has the following privileges;
add/delete/update records and information of the entire system. This subsystem is further broken
down into; add Course, assign course, fingerprint enrollment, enroll student, enroll lecturer and
report. In the listed subsystems the administrator can delete, add, and update the subsystem
information. Lecturer subsystem, unlike the admin subsystem here most privileges are taken
away, the user can only activate attendance, view a student record or marked attendance or the
courses he/she was assign to lecture on. The subsystem is further broken down into; (I) course
(II) lecture taken (III) activation duration and (IV) profile.
3.2 Design Analysis
3.2.1 Hardware Requirement
i. A minimum hard disk space of 20 Gigabytes (GB)
ii. RAM size of 1GB
iii. Pentium 4 dual processor CPU
iv. A VGA colour monitor
v. Mouse
vi. Keyboard

3.2.2 Software Requirement

 Windows operating system such as Windows 2000, windows XP, Windows Vista,
Windows 7.
 Visual Studio 2012.
3.3 Block by Block Description of the Study

System

User Start Page

Admin Sub program Lecturer Sub program Student sub program

File Settings Setup Reports Activate Att. Mark Att.

Assign Role Activate D.time View marked


Change PW
Enroll

Fingerprint Enrolment Scan fingerprint

Scan Image
Facial (image) Enrolment

Figure 3.1: Top Down Design approach for the system


3.3.1 Software Consideration

In order to develop a good system, it is important to choose the correct software. Below
are some explanations of the software chosen as development tools for the system.

i. Microsoft Visual Studio 2012

Microsoft Visual Studio 2012 is a freeware to let the computer programmers to develop
software and it is provided by the Microsoft. It allows the programmers to develop applications
and websites in platforms such as Visual Basic, Visual C#, Visual C++, and etc. The Express
Editions is more suitable for novice developers, the programming adopt in this project is C#.
Fig 3.2: Microsoft Visual Studio 2012
ii Database Design

MySQL Database

In any good database design, efforts should be made to remove completely or at best
reduce redundancy. The database design in the software is achieved using MySQL Database.

Fig 3.3: MySQL


3.3.2 Choice of Programming Language

The system was designed using common and popular window development technology
which includes Microsoft Visual Basic.net 2010 and MSSQL Server 2008 R2.

 VB.NET: Vb.net is used to implement the server side logic of the design. The reason for
using this language is because of its fastness and easy way in creating web applications. It
is an object oriented programming language which allows objects to be manipulated
easily and also an event driven programming language.
 .NET Framework: Visual basic programs run on the .Net Framework which is an
integral component of Windows that includes a virtual execution system called the
Common Language Runtime (CLR) and a unified set of class libraries. Source code
written in VISUAL BASIC.NET is compiled into an Intermediate Language (IL) that
conforms to the Common Language Infrastructure (CLI) specification.
 Microsoft SQL Server: MSSQL server is used to implement the back end of the new
system. The server uses relational database management system that offers a variety of
administrative tools to ease the burdens of database development, maintenance and
administrations. It also allows the use of stored procedure which is used to implement
some of the business logic directly from the database.
 T-SQL: Transaction Structured Query Language is used to write stored procedures
embedded in the Microsoft SQL server.

3.4 System Flowchart

System flowchart is a type of diagram that represents an algorithm or process, showing


the steps as boxes of various kinds, and their order by connecting these with arrows. This
diagrammatic representation can give a step-by-step solution to a given problem.

Start
Capture Fingerprint & Image

Verification module

Yes
Is
No Fingerprint/Im
age valid?

Mark As Present

Display Notification

Stop

Fig3.4 Flow Chart for Student Sub Program


3.5 Principle of Operation

This system consists of four modules, i.e. Processor module, Fingerprint Capture module
Image Capturing Modules and Verification and data saving module. The respective modules and
their roles are explained below:
Processor Module: It forms the backbone of the system. It drives the control logic behind every
functionality, some of which are mentioned below:
 Start the Program and initialize it and dependent modules.
 Check for interrupts, faults while the modules get initialized.
 Command the fingerprint and image module to function as requested by the software
interface.
Fingerprint Capture Module (FCM): The fingerprint capture module is essentially a
fingerprint sensor. It is an electronic device that captures a ‘live scan’ of the fingerprint pattern.
Then a number of processing functions are applied to the scan and it is converted into a
biometric template. Generally optical sensors are used, even though ultrasonic and capacitive
sensors are also present.
Image Capturing Module (ICM): The image capture module is essentially a face scanner. It is
an electronic device that captures a ‘live scan’ of facial. Then a number of processing functions
are applied to the scan and it is converted into a grayscale patter understand by the system.
Generally optical sensors are used, even though ultrasonic and capacitive sensors are also
present.
PC based Server-Client Software Management Module: The entire system is run from control
software. The software on the server side consists of a database management and a GUI- based
interactive Student Attendance System. The SQL server is a local host and a system based
database
REFERENCES
[1] Barbara Griggs. Green Pharmacy: The History and Evolution of Western Herbal Medicine,
Second Edition. Viking press, (2018). Pg 93-97.

[2] Charles E. Rosenberg, Morris J. Vogel. The Therapeutic Revolution: Essays in the social
history of American Medicine, Second Edition. University of Pennsylvania press,
(1979).Pg 174.

[3] Peter G Homan, Briony Hudson, Raymond C Row.Popular Medicines: An illustrated

Leslie G. Mathews. History of Pharmacy in Britain. Edinburgh, E&S. Livingstone(2015). Pg


213-223.

[4] History, Fourth Edition.Trade paperback, Pharmaceutical press (2008).Pg. 127.

[5] Stuart Anderson. Making Medicines: A Brief History of Pharmacy and Pharmaceuticals,
Sixth Edition.Jessica Kingsley publisher, (2005).Pg 214.

[6] Charles E. Rosenberg.History of Medicine and Allied Sciences, Seventh Edition.University


of Pennsylvania press, (2015).Pg 197.

[7] George A. Bender. Great moments in Medicine, Cambridge university press (2016). Pg 118.

Introducing Microsoft .NET, Second Edition author David S. Platt.

[8] Joe Mayo, “Microsoft Visual Studio 2010: A Beginner's Guide”, Tata McGraw Hill, 2010.

[9] Alex Mackey, “Introducing .NET 4.0: With Visual Studio 2010”, Press, USA, 2010.

[10] http://www.msdn.net/

[11] http://msdn.microsoft.com/en-us/library/orm-9780596518455-02.aspx

http://www.codeproject.com

You might also like