this system design. Section 3 outlines the functions ofthis system briefly and describes the hardware andsoftware design of this system. Section 4 introducessome key problems in the implement of this system andfinally Section 5 contains conclusions and future researchplan.
ATTENDANCE MANAGEMENT SYSTEM
Attendance Management System is the easiest way tokeep track of attendance for community organizationssuch as school clubs, scouting units, church groups,athletics, or volunteer groups.
Attendance Management System covers the require-ments of the Personnel Department in terms of Man-power Analysis, day-to-day monitoring of the Attendance,Maintaining Statutory Registers, Monitoring of LeaveRecords, Calculation of Overtime and transfer of relevantinformation to the Payroll System. We can classify theattendance management system to four classes:1. Simple systems: card based. The use of theattendance card is not new. Widely popular for manyyears now, OTR cards or punch cards have been usedfor clocking in working hours. These are paper cards thatare inserted in a machine which will then record the exacttime when the employee has arrived. The paper cardshave eventually been replaced by sturdier cards that aresized just like the bank card or ID. In fact, some ID cardsissued by companies can also be used for time keepingand are inserted into digital time recorders. An issue withthe attendance card is that some workers will actually askco-workers to time in for them. Some have attempted toremedy this dilemma through the use of signature logsthat are attached next to the attendance recorder.2. Large-scale companies: Attendance fingerprint. If youwant something that is more precise and unlikely to betampered with by the naughty employee, the fingerprintbased attendance system is the choice for you. Thesesystems make use of fingerprint readers, or little glasspanels attached to the attendance machine. Theemployees will simply put their fingerprints on the readerwhich will then scan the print and identify the employee.The fingerprint readers will then automatically log in theemployee on an electronic database.3. There are other variants to the fingerprint reader, suchas the iris scanner. Like the fingerprint, no two peoplehave the same eyes. A scanner will scan the eyes andautomatically log the employee in. keep in mind,however, that these high technology systems are muchmore expensive than the usual card reader. You will alsoneed to create a fingerprint or iris database from all ofyour employees so that the scanners will be able to makecomparisons. The theoretical study and the experimentsshow that the Iris recognition mechanism is the mostaccurate and reliable recognition system, for this reasonour article is based on iris recognition (Harper, 2003).4. E-Commerce: performance based systems. Finally,there is performance based attendance keeping systems.These are increasingly being utilized to ensure not onlyemployee attendance, but their productivity and efficiencyas well. an example are the computer companies andonline companies that will log in the employee based onfactors such as when the employee logs in to thecompany web site or computer, and other activities suchas mouse clicks, and keyboard taps. This is still in theexperimental phase, however, but is widely being studiedby many companies. One major limitation, however, isthat these attendance keeping systems will not work forcompanies and business that do not require theemployees to make high use of the computer.Today, biometric recognition is a common and reliableway to authenticate the identity of a living person basedon physiological or behavioral characteristics. Aphysiological characteristic is relatively stable physicalcharacterristics, such as fingerprint, iris pattern, facialfeature, hand silhouette, etc. This kind of measurement isbasically unchanging and unalterable without significantduress. A behavioral characteristic is more a reflection ofan individual’s psychological makeup as signature,speech pattern, or how one types at a keyboard. Thedegree of intra-personal variation in a physicalcharacteristic is smaller than a behavioral characteristic.For examples, a signature is influenced by both control-able actions and less psychological factors, and speechpattern is influenced by current emotional state, whereasfingerprint template is independent. Nevertheless allphysiology-based biometrics does not offer satisfactoryrecognition rates (false acceptance and/or false rejectrates, respectively referenced as FAR and FRR). Theautomated personal identity authentication systemsbased on iris recognition are reputed to be the mostreliable among all biometric methods: We consider thatthe probability of finding two people with identical irispattern is almost zero (Belganoui et al., 2000). That iswhy iris recognition technology is becoming an importantbiometric solution for people identification in accesscontrol as networked access to computer application(Gifford et al., 1999).Compared to fingerprint, iris is protected from theexternal environment behind the cornea and the eyelid.No subject to deleterious effects of aging, the small-scaleradial features of the iris remain stable and fixed fromabout one year of age throughout life. A number ofgroups have explored iris recognition algorithms andsome systems have already been implemented and putinto commercial practice by companies such as IridianTechnologies, Inc.,
whosesystem is based on the use
ofDaugman’s algorithm (Daugman, 1993).A typical iris recognition system generally consists of