DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

DESIGN AND CONSTRUCTION OF A BIOMETRIC STUDENTS’ TIME AND ATTENDANCE LOGGING SYSTEM

  • The Complete Research Material is averagely 54 pages long and it is in Ms Word Format, it has 1-5 Chapters.
  • Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
  • Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
  • Full Access Fee: ₦6,000

Get the complete project » Instant Download Active
ABSTRACT
 In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of employee absence in their workforce and the difficulty in managing student attendance during lecture periods. Fingerprints are a form of biometric identification which is unique and does not change in one’s entire lifetime. This paper presents the biometric attendance logging system using fingerprint technology for Students in a university environment. It consists of two processes namely; enrollment and authentication. During enrollment, the fingerprint of the user is captured and its unique features extracted and stored in a database along with the users identity as a template for the subject. During authentication, the fingerprint of the user is captured again and the extracted features compared with the template in the database to determine a match before attendance is made. The fingerprint-based attendance management system was implemented with Arduino Framework for the Hardware and Firmware while Microsoft’s C# on the. NET framework was used for the User Interface and Microsoft’s Structured Query Language (SQL) Server 2005 as the backend database. The experimental result shows that the developed system is highly efficient in the verification of users fingerprint with an accuracy level of 97.4%. The average execution time for the developed system was 4.29 seconds as against 18.48 seconds for the existing system. Moreover, the result shows a well secured and reliable system capable of preventing impersonation.

You either get what you want or your money back. T&C Apply







You can find more project topics easily, just search

Quick Project Topic Search