Get the complete project »
- The Complete Research Material is averagely 44 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
1.1 Background of the study
Quick response (QR) codes are rapidly growing technology for social interaction and advertising. The reason for this rapid uptake is the way in which they can provide a connection between the physical world and the digital world (e.g., Internet resources). In this role, they are increasingly being used in public spaces and on products to provide a bridge to websites (Thompson & Lee, 2013). QR codes provide little more than a physical, machine recognizable representation of a hyperlink; appearing on business cards, posters, newspapers and even television advertisements. Typically, an individual uses their mobile phone camera to quickly capture the QR code which then directs them to a website(Thompson & Lee, 2013).
With the rapid development of Computer network technologies and computer projects, more and more Computers connect together to exchange great information and share system resources. Security is then an important issue for Computer Networks. To prevent the information from being accessed by illegitimate or unauthorized users, remote authentication of users is certainly one of the most important services. User authentication is the essential security mechanism to establish the trust relationship under open network environments. Password-based authentication scheme is the most common method to check the validity of the login message and authenticate the user.(Liao & Lee, 2010)
One of the many challenges facing Schools today is accurately identifying students. The bottom line is that Schools receive Federal and State funds based on accurate and auditable records. In addition, Schools need to provide a safe and secure environment for all their students and staff(Benefits, 2012). Over the past few decades, Schools have been implementing new technologies to both improve student achievement and streamline operations. Smart boards, laptops and real-time Internet resources are just a part of a student’s everyday experience(Benefits, 2012).In this 21st century, Schools are faced with a countless number of problems never encountered in previous decades e.g. security challenges. Security has become a significant concern. It is now crucial that School administrators know who is in their schools and where the students are at all times. Accurate and auditable attendance and reporting is vital in not only securing, but also maintaining essential governmental funding(Benefits, 2012). Accurate identification and tracking of students is now critical in all aspects of the day-to-day management and administration of schools. Schools can’t afford to ignore the threat of crime, assaults on pupils and teachers in schools are increasing in number usually the assailant is a pupil of the school or a parent, but there are also incidents of intruders entering schools and attacking staff or children. While such incidents are still uncommon, the consequences to those involved can be devastating (Benefits, 2012).
In recent time, Smart Phones have become one of the most intelligent consumer devices. They can perform many functions, such as organizing personal data, taking photos and voice telephony(Hikmat & Baban, 2014). The functionality of smart phones has grown to cover some of the functionality of Personal Computers in both professional and social contexts. In addition, smart phones are portable communication devices that work to connect and integrate telecommunication and internet services in a single device. Furthermore, smart phones can be used for network communication between different devices(Hikmat & Baban, 2014). Nowadays technology is running with time, it completely occupied the life style of human beings. It is being used everywhere in man’s daily life to accomplish his requirements. The speed of life can not only increase but also increase in security with good ideas by making use of advanced technology. Information technology (IT) is transforming, the way information is created, searched and reproduced. So as IT security has become part of man’s everyday activities, it becomes obvious the need for introducing IT security awareness in schools.
1.2 Statement of the Problem
The safety of pupils in Schools should be the most priority objective to achieve. The disappearance of pupils in schools is a very big issue to worry about, this is done by the bad guys picking up the pupils on the school premises. Nowadays, in Africa, there are several threats to pupils in the schools, for example, the kidnappers. There is a serious need to adopt a security system to prevent these threats from getting access into the school premises.The system which will automatically send Email/SMS to parent at their comfort seriously need to be adopted.The school management want to get information about the actual number of pupils in school at ease without much time waste and error free.
In most developed countries several school adopt different kind of security systems such as
i. Use of biometrics (finger scanner, facial recognition).
ii. Uses of cameras within the school premises.
But in developing countries such as (Nigeria, Ghana) most schools still depend on manual security and attendance system which is not 100% secured because of human errors which is inevitable.
1.3Aim and Objective of the Study
The aim of this project is to develop a web-based school pupil’s identificationand attendance system using quick response code
To achieve this aim, the following objectives are needed:
i. To design a QR code based pupil’s identification andattendance system.
ii. To implement a web-based system that would send automatic email/SMS.
iii. To validate the system.
1.4 Scope and limitation of the Study
The proposed system focuses on the identification of pupils and the person who brought them to or pick them from school as well as serves as attendance and clearance implicitly. The system cannot track the pupils either in the school premises or outside.
1.5 Significance of the Study
The proposed system will be of benefit to School management, pupils and the parents.
The school management will benefit from the system as it will help limit the incidences of missing of pupils from school and also keep records of the total number of pupils in school per day. The parent and pupils will benefit from the system as it will help limit the parent worries over their children arrival at school in the morning and departure from school after closing hours as well as identifying the person who brings the child or takes the child from school. This will be achieved by sending an email to the parent each time the QR code is scanned indicating time of arrival and departure of the pupil.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
1. DESIGN AND IMPLEMENTATION OF AN EXPERT MANAGEMENT SYSTEM FOR AUTOMOBILE FAULT DETECTION AND DIAGNOSIS» CHAPTER ONE 1.0 INTRODUCTION In present time most households own at least one car. This figure shows that a car is very important to people’s lives ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 Background of the Project Scrabble is an old classic board game, with game rules that are not very complicated. Compared ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.0 BACKGROUND TO THE STUDY The increasing demand for education in Nigeria especially tertiary education has been an issue in...Continue Reading »
» ABSTRACTWith the advent of technology, most tasks undertaken by man have now been overtaken by semi conductor devices applicable in the areas of commu...Continue Reading »
» CHAPTER ONE INTRODUCTION A car rental or car hire agency is a company that rents automobiles for short period of time for a fee whether in a few hours...Continue Reading »
» CHAPTER ONE1.0 INTRODUCTION:This chapter gives an overview on the aims, objectives, background of the study and operation environment of the system.1....Continue Reading »
» ABSTRACTAs the complexity and degree of crimes wider, system Nigeria new technology will have to be utilized to aid lawyers and criminologist to fight...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Clearance is a status granted individuals, typically members of the military, university graduates an...Continue Reading »
» (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S) CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publ...Continue Reading »
10. DESIGN AND IMPLEMENTATION OF AN AUTOMATED PAYROLL SYSTEM (A CASE STUDY OF AKWA IBOM STATE WATER BOARD LIMITED, UYO)» ABSTRACT This research work is a detailed of what is to be obtained in the payroll unit of finance department of Akwa Ibom Water Board Limited, Uyo. T...Continue Reading »