DESIGN AND IMPLEMENTATION OF A COMPUTERIZED BIOMETRIC CLOCKING SYSTEM

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0756
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 60 Pages
  • Methodology: Nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2.3K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

 DESIGN AND IMPLEMENTATION OF A COMPUTERIZED BIOMETRIC CLOCKING SYSTEM
(A CASE STUDY OF FEDERAL UNIVERSITY OF TECHNOLOGY MINNA)
ABSTRACT

This project was born out of the necessity to address the problem encountered by the employee in the existing system (Case Study of Federal University of Technology Minna).  Based on the modern improvement of employee clocking system, implementation of a new design to the old existing system exists. The manual clocking system for employee in Federal University of Technology Minna, has a lot of factors affecting it, more or less problems, which includes the delay of clocking in, poor record keeping, time and energy wastage and existence of human error. The proposed new system is an application form and server architecture in which the user interface, data access are developed and maintained independently. The proposed system’s database is implemented using Microsoft Structure Query Language Server 2008 r2, and visual basic programming language. Waterfall model methodology is used in designing the new system for the organization.This computerization of employee clocking system will make employee boast their productivity, keep tabs on them and increase the organization of records, saves time and increase the efficiency of data retrieval.
TABLE OF CONTENT
CHAPTER ONE: INTRODUCTION
1.1    Background to the Study                       
1.2    Statement of the Problem                   
1.3       Significance of study                       
1.4         Aim and objectives of study                                                
1.5        Scope of study                                        
1.6    Limitations of Study                       
    1.7        Conceptual Definition of Terms                                                                                 
CHAPTER TWO: LITERATURE REVIEW
2.0    Literature Review               
2.1     Overview of Biometrics                                            
2.2    Traits of Biometrics       
    2.2.1    Fingerprint                       
    2.2.2    Face Recognition                                    
2.2.3    Iris                       
2.3Applications of Biometrics   
2.4Significance of Biometrics           
    2.5Review of Related Work19
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
3.0     Introduction                                           
3.1Analysis of the Existing System       
3.2    Limitations of the existing system         `                       
3.3     Justifications of the New System                               
3.4     Methodology                                           
3.4.1   Waterfall Model   
  3.5     Data Collection                                         
3.6The Proposed New System                                                     
         3.6.1 Input Specification                   
         3.6.2 Output Specification               
  3.6.3 Storage Design               
  3.6.4 Procedure Chart                   
3.6.5 System Flowchart                                               
 3.6.7   System Requirement                   
CHAPTER FOUR: SYSTEM IMPLEMENTATION, TESTING AND INTEGRATION
4.0     Introduction                                           
4.1     Choice of programming Language                               
  4.2    The System main menu Implementation                             
4.3     Implementation of the Subsystem           
4.4    Query Subsystem Implementation   
  4.5     System Testing and Integration   
4.6     The Test Plan               
  4.7     Test Data               
CHAPTER FIVE: SUMMARY AND CONCLUSION
5.0    Introduction                                           
5.1Summary                           
 5.2     Suggestion for Further Work                       
 5.3       Recommendation                           
5.4Conclusion                           
REFERENCES                       
APPENDIX47
LIST OF TABLES                               
Table 3.1: Staff Record Table                                                 

LIST OF FIGURES                               
Figure 1.1 Minutiae                   
  Figure 1.2Characteristics of fingerprint        
  Figure 2.1 Fingerprint bitmap               
  Figure 2.2Normalized face               
  Figure 2.3 Normalized face.               
  Figure 2.4 Eigen face.               
  Figure 2.5 Image of iris.           
 Figure 3.1 Waterfall phases29
  Figure 3.2 Flowchart diagram                   
  Figure 3.3 Use case diagram34
Figure 4.1 Main menu of program38
Figure 4.2 Fingerprint enrolment                                                               
Figure 4.3 Saving record                                                                                                            
Figure 4.4 Clocking
Figure4.5 Database query
LIST OF ABBREVIATION
SQL          -   Structure Query Language
ACM        -   Association of Computing Machinery
MSSQL      -   Microsoft Structure Query Language
DPI                -   Dots per Inch
FBI            -   Federal Bureau of Investigation

CHAPTER ONE

1.0                                           INTRODUCTION

 

1.1 BACKGROUND TO THE STUDY

This part presents biometrics as the engineering used to measure and dissect individual attributes both physiological and behavioural. These attributes incorporate fingerprints, voice examples, hand estimation, irises, are physiological while marks, keystrokes elements and mouse development are behavioural which are all used to distinguish human qualities and confirm character (M. Gasson, M. Meints and K.warwick 2005). These biometrics or qualities are easily associated with an individual and can't be overlooked, imparted, stolen, or effectively hacked (M.tistarelli and M. Nixon 2009). These qualities can exceptionally recognize an individual, supplementing customary security systems by giving two noteworthy enhancements: individual biometrics can't be effortlessly stolen, and an individual does not have to remember passwords or codes. Since biometrics can take care of issues of access control, extortion, burglary, more associations are considering biometrics, as the answer for their security issues.

Finger impression or finger filtering innovation is one of the most used features of the biometrics sciences and uses different peculiarities of the unique mark to distinguish or confirm the character of people. Finger checking engineering is a standout amongst the most ordinarily sent biometric innovation. All fingerprints have distinctive qualities and example. An ordinary finger impression example is made up of lines and spaces. These lines are called edges while the spaces between the edges are called valleys. It is through the example of these edges and valleys that an exceptional finger impression is matched for check and approval. These exceptional unique finger impression characteristics are termed "minutiae" and correlations are made focused around these attributes. As a rule, a common live output delivers 40 "minutiae". The Federal Bureau of Investigation (FBI) has reported that close to 8 basic minutiae can be similar to two people.

There are five stages included in finger examining check and recognizable proof: unique mark picture securing, picture handling, and area of different qualities, layout creation and format matching. A scanner takes a scientific preview of a client's special raw characteristics. This preview is kept in a unique mark database as an issue document. The principal test confronting a finger checking framework is to secure amazing picture of a unique mark. Picture quality is measured in dots per inch (DPI) more specks for every inch imply a higher determination picture. Lower DPI found available are in the 300 350 DPI, however the standard for criminological quality fingerprinting is pictures of 500 DPI. Procurement can be a real test for finger examination, since the nature of print contrasts from individual to individual and from finger to finger. A few populaces are more probable than others to have weak or hard to get fingerprints, whether because of wear or tear or physiological characteristics. Taking a picture in neglect of climate can have an influence likewise. Oils in the finger help deliver a fingerprint. In frosty climate, these oils characteristically become scarce. Pressing harder on the platen (the surface on which the finger is set otherwise called scanner) can help for this situation. Picture transforming is the procedure of changing over the finger picture into a usable arrangement. This results in an arrangement of thick dark edges (the raised piece of the unique mark) differentiated to white valleys. At this stage, picture peculiarities are distinguished and improved for check against the put away minutia document. Picture upgrade is utilized to diminish any twisting of the unique finger impression created by soil, cuts, scars, sweat and dry skin. The following stage in the unique finger impression procedure is to find different qualities. There is a decent arrangement of data on the normal unique mark and this data has a tendency to stay steady for the duration of one's life. Finger impression edges and valleys structures have unique examples, for example, swirls, circles, and curves.

Most fingerprints have a centre, a main point around which swirls, circles, or curves are blended. These edges and valleys are portrayed by irregularities known as minutiae, the different gimmick whereupon finger checking innovations are based. Numerous sorts of minutiae path way, a typical one being edge endings and bifurcation, which is the time when one edge separates into two. An average finger output may deliver somewhere around 15 and 20 details. A layout is then made. This is expert by mapping details and sifting out mutilations and false minutiae. For instance, abnormalities brought on via scars, sweat, or soil can show up as details. False minutiae must be sifted out before a format is made and is upheld diversely with seller particular restrictive calculations. The precarious part is contrasting an enlistment format with a confirmation layout.

FIGURE 1.1 MINUTIAE

Source: (Ganorkar, 2007.)

FIGURE 1.2 CHARACTERISTICS OF FINGERPRINT

Source: (Sanjay, 2007.)

 

Representative timing frameworks are time framework utilized by organizations to precisely record the quantity of hours worked by every worker on week by week premise (John Furnem, 2007). The clock has developed with time and the foundation still needs a framework that they can utilize worker payroll and guarantee that the workers are paid for every hour they met expectations. Today, representative utilization swipe cards with a negative stripe through an opening that peruses their name and records the time, each time they check in or out, much like the old punch clock arrangement of long back. Toward the end of a work week, the executive processes the aggregate hours worked for each representative and prints it out on a spread sheet. This frees the payroll arrangement of human mistake, making it considerably more effective.

As indicated by Jain (2004) each human has an extraordinary finger impression picture that can't be imitated. Therefore, making the unique mark innovation more proficient, reliable, simple and solid than different qualities of biometrics. It likewise obliges a genuinely little size of memory to store biometric layout. Not at all like the voice identification, amid harmattan period the representative's voice can be coarse because of chilly, subsequently adjusting the voice example and access foreswearing, same case with face identification, when the worker begins maturing or encounters skin responses like pimples it prompts a bargain in the framework. On account of mark it can be effortlessly manufactured, while retina checking is expensively arranged.

The Federal University of Technology, Minna does not make utilization of a modernized representative timing framework. The establishment sets aside a few minutes clock framework, however efficient, is not so much impeccable in light of the fact that it is sporadic. In some cases, the attractive strip on the cover of a card may get harmed on account of punch card system. At the point when the representative swipes the card, the machine may not enrol it. Such insufficiencies are amended in the machine time clock system. This venture guarantees that workers will constantly require an approach to stay informed concerning their time and associations will have the capacity to screen and record a representative's chance to guarantee greatest achievement.

1.2       STATEMENT OF PROBLEM

The problem is centered on how to design and implement a computerized employee clocking system for Federal University of Technology, Minna. From the study layout the problems discovered are; inadequacies of the manual time clock system, and easy impersonation of staff.

1.3     SIGNIFICANCE OF STUDY

The significance of the study is;

To correct the inadequacies of the manual time clock system, to regulate unauthorized entry into the building. To keep track of the time and ensure logical ways to monitor and record an employee’s time and to provide maximum productivity and cultivate punctuality of employees.

 

1.4   AIM AND OBJECTIVES OF STUDY

The aim of this study is to put to rest the cumbersome and hectic nature of employee time clocking system. The objectives of this study are:

1)  To study the existing clocking system.

2)  To develop a fingerprint identification based clocking system.

3)  To test the performance of the developed system with arbitrary input parameters.

1.5      SCOPE OF THE STUDY

This study is limited to only Federal University of Technology, Minna institution to the non academic staff. Though, the scope above is in such a way that the study can be carried out in one and only one way that is, computerizing the employee clocking system. This will help to eliminate the inherent problems encountered by the management of this institution.

    

 

 

1.6 LIMITATIONS

The factors that militated against this study in the course of gathering facts and figures, went a long way in limiting the intended scope of this study as a result of these, setbacks were encountered.

If the surface of the finger gets damaged and/or has one or more marks on it, identification becomes increasingly hard. Also wet and dirty hands are difficult to enroll thereby producing false acceptance or rejection.

1.7 CONCEPTUAL DEFINITION OF TERMS

o          Computer System Software: A set of written instruction, which the program is used to execute tasks in the system.

o          Visual Basic Program: This is an object oriented programming language that is used to develop software.

o          Computer: A machine is a gadget that works under the control of put away projects, naturally tolerating and putting away, handling information to deliver data that is the after effect of that transforming.

o          Program: Set of instructions which are logically related in sequence and which describes actions to be taken by the digital computer in providing a solution on to a given problem.

o          Software: Is the general term used to describe all the various programs that may be used on a computer system together with their associated documentation.

o          Hardware: This is the general term used to depict all the electronic and mechanical components of the machine together with those gadgets utilized with the machine.

o          Operation: The action carried out on an activity or process.

o          Modules: This is the act of portioning software’s rationally into elements that performs specific functions and sub functions.

o   Data Entry: This is the yardstick input device through which the system gets more of the instructions and commands.

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED BIOMETRIC CLOCKING SYSTEM
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0756
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 60 Pages
  • Methodology: Nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2.3K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0756
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 60 Pages
    Methodology Nil
    Reference YES
    Format Microsoft Word

    Related Works

    DESIGN AND IMPLEMENTATION COMPUTERIZED EMPLOYEECLOCKING SYSTEM (A CASE STUDY OF MARLUNCONSTRUCTION COMPANY ENUGU) ABSTRACT This project was borne out of the necessity to address the inherent possible encountered by the employee and staff of MALUM organization. And how to implement a new design to the old existing system. Based on the modern... Continue Reading
    ABSTRACT This project was borne out of the necessity to address the inherent possible encountered by the employee and staff of MALUM organization. And how to implement a new design to the old existing system. Based on the modern improvement of employee clocking system. This computerization employee clocking system will make employee boast their... Continue Reading
    ABSTRACT This project was borne out of the necessity to address the inherent possible encountered by the employee and staff of MALUM organization. And how to implement a new design to the old existing system. Based on the modern improvement of employee clocking system. This computerization employee clocking system will make employee boast their... Continue Reading
    ABSTRACT With this manual system, there are cases that some student and staffs cheat by asking their friends to tick or sign for them. This occurs because the students just want to fulfill the 80% of the attendance so that they can seat for the final examination at the end of the semester. Lecturer and administration fine it difficult to take... Continue Reading
    ABSTRACT With this manual system, there are cases that some student and staffs cheat by asking their friends to tick or sign for them. This occurs because the students just want to fulfill the 80% of the attendance so that they can seat for the final examination at the end of the semester. Lecturer and administration fine it difficult to take... Continue Reading
    CHAPTER ONE                                                 INTRODUCTION 1.1        Background to the Study             Punctuality as Thomas Chandler Haliburton(1796 - 1865) said, is the soul of... Continue Reading
    The need for identification leads to the study of biometrics. Over the ages, human beings have been identified by various means, such as the Name, Complexion, Nationality, and even some uniquely assigned codes. Of all these methods, none can be used to uniquely identify an individual distinctly under all circumstances. However, research has shown... Continue Reading
    The need for identification leads to the study of biometrics. Over the ages, human beings have been identified by various means, such as the Name, Complexion, Nationality, and even some uniquely assigned codes. Of all these methods, none can be used to uniquely identify an individual distinctly under all circumstances. However, research has shown... Continue Reading
    ABSTRACT  In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of... Continue Reading
    ABSTRACT The importance of accounting is gradually being recognized as germane to prudent management of any institution firm.  This has necessitated the need for the computerization of structured operations of the Accounting managers structured operations are known with certainly for instance, the computation and decisions based on Accounting... Continue Reading
    Call Us
    whatsappWhatsApp Us