You are on page 1of 9

Adama Science and Technology UniversitY

School of Electrical Engineering and Computing


ELECTRONICS AND COMMUNICATION DEPARTMENT
Engineering Research and development methodology
Title: Fingerprint attendance management system

Section 6
Name ID
1.Esmael Aman UGR/17061/11
2.Ahmed mohammed UGR/16732/11
3.Chalew Lule UGR/16941/11
4.Belete Andargie UGR/16844/11
5.Biruk Dagne UGR/16913/11

submited to Davinder Singh Rathe(PhD)

Table of Contents
Abstract.......................................................................................................................................................3
1. INTRODUCTION...................................................................................................................................4
2. FINGERPRINT AQUISITION PROCESS..................................................................................................6
2.1 Enrolment.........................................................................................................................................7
2.2 Verification Process..........................................................................................................................8
2.3 Data collection process-------------------------------------------------------------------------------------------------9

3. System overview.....................................................................................................................................9
4. Conclusion.............................................................................................................................................11
5.References..............................................................................................................................................12

List of figures page


Fig 1: A fingerprint picture obtained by an optical sensor------------------------------------------------6

Fig. 2: Fingerprint sensor algorithm------------------------------------------------------------------------8

Fig 3: device block diagram----------------------------------------------------------------------------10

ABSTRACT
In lots of institutions and agencies, pupil and staff attendance is taken severely as maximum
management layout absenteeism and sanction the people concerned. historically, the approach of
attendance taking used to be performed manually the usage of a bodily sign in book.
This approach is liable to manipulation and impersonation. The attendance register ought to get
damaged, stolen or misplaced. consequently, numerous electronic techniques have been
developed to counter a few extraordinary flaws ordinary with the conventional technique. these
include clocking gadget, RFID, biometrics, and so on. while the clocking machine and RFID
methods couldn't remedy the problem of impersonation properly, a few human beings fear the
health outcomes of using biometrics like iris and facial scanner.
Fingerprint scanning has been by using some distance the greater suitable biometric gadget with
the potential to do away with all of the hassle spots stated up to now even though laptop support
is usually required. consequently, this paper gives a fingerprint attendance system designed to
additionally operate as a standalone and hand held system without using a pc, in contrast to
different fingerprint attendance structures.
INTRODUCTION
Fingerprint verification is one of the oldest recognized biometric strategies acknowledged but
nonetheless the most extensively used due to its simplicity and desirable information of accuracy.
the truth that every human being is born with a different pattern on their arms and these
capabilities are used to identify and differentiate between distinct humans.
A fingerprint detecting device wishes to be positioned in each area of any employer and users
would be required to swipe their finger across the sensor so as to signify their presence in the
wanted location. The consumer facts are saved inside the database for verification. the instant a
person swipes a finger throughout the scanner, a test would be carried out for the users .The
attendance machine is actualized the use of the Fingerprint technology and Embedded
structures. The Fingerprint generation serves as an identity evidence to take the attendance of
users. The device reads finger patterns from the fingerprint module and verifies this statistics
with the already saved sample in its database. If the information present within the database fits
with the saved fingerprint, the gadget recognizes the attendance. If the finger info do not match
with the information saved in the database, an alarm machine may be brought about to notify the
security personnel to take further action. The system is designed in this type of way that it can be
used as a standalone device and also can be interfaced with a laptop both to print out the
attendance or to get more complex information of the people whose attendance is taken
Numbers of associated literatures based on electronic device for student attendance record
presently exist as reviewed under. In [1], an embedded laptop based totally lecture attendance
control system changed into proposed. although this became an stepped forward machine with
electronic card reader serially interfaced to a private laptop, the demerit of such device is that
someone can still take attendance for another man or woman if given the man or woman’s digital
card. Authors in [2] used a wi-fi attendance control gadget that authenticates using the iris of the
person. This gadget uses an off-line iris reputation control gadget for photograph taking pictures,
extracting unique information, storing and matching the captured image with one stored in the
database. This system looks after incorrect clocking in or pal-punching. buddy punching is whilst
one employee or scholar inappropriately clocks in for any other. The only hassle this form of
biometric system has is that human beings typically have the fear that the Iris scanner, after
sometimes may make a contribution to the damage in their eye and so tend no longer to embrace
it. The authors in [3] designed and applied a device that authenticates the user primarily based on
passwords. This system still could not take away impersonation since the password can be shared
or tampered with. Passwords many times can be forgotten or the gadget hacked thereby stopping
user’s get entry to to the machine. similarly, we've other answers which include RFID-based
authentication system and GSM-GPRS based authentication device. There are problems with
most of these tool-based answers. The GSM-GPRS primarily based systems use the area of class
for attendance marking which is not dynamic. thus, wrong attendance is probably recorded if
there may be a exchange of venue. problem with RFID [4] primarily based authentication
systems is that RFID playing cards can wander off, stolen, and it requires the set up of RFID
detectors. RFID playing cards can also now not eliminate impersonation.
This fingerprint authentication device, but, is a value effective and simplified method of
identification. The fingerprint is different to each individual. Even identical twins do no longer
share the equal fingerprint capabilities, and it can't be transferred, lost or forgotten like the
password. It allows college students to sign up for lectures effortlessly and get rid of errors which
might be associated with attendance registers due to the fact the gadget generates exports at the
stop of the semester. The advantage of this device is that it may paintings as a standalone
machine unlike other fingerprints identification systems already in life.

2. FINGERPRINT AQUISITION MANNER


A fingerprint [5] can be defined as an affect made by using human finger due to the patterns
created at the pores and skin of our fingers and arms ever considering the fact that beginning.
The marks or pattern on our finger will never go through any exchange alternatively it will
become prominent with age.
figure 1, under shows a fingerprint picture,for his or her permanence and specific nature, they
were used considering that lengthy in criminal and forensic instances. shown underneath, is a
fingerprint sample obtained from an optical sensor. The parent indicates faint and dark lines
rising from a selected factor and spiraling round it all around the finger.

Fig 1: A fingerprint image acquired by an optical sensor

The fingerprint acquisition procedure may be divided into 3 components, these are:

1. The enrolment procedure

2. The verification method

3. The information collection system

2.1 Enrolment
The enrolment method is completed once for absolutely everyone. each person could be required
to register their fingerprint sample with the aid of setting his thumb finger at the fingerprint
scanner. The scanner takes the picture of the finger and determines the unique characteristics of
the fingerprint picture.
The fingerprint includes ridges and valleys that have exclusive varieties of breaks and
discontinuities. it's far the diverse ridges and valleys that form the basis for the loops, arches, and
swirls which can be effortlessly visible on fingertips. After the capturing of the ridge pattern of
the fingerprint, a template is created, and the fingerprint is encrypted into collection of numbers.
those collection of numbers might be one-of-a-kind for each fingerprint sample. After the
procedure should were completed, the fingerprint scanner sends the result of the encryption to a
memory vicinity or database. The manner figure set of rules is proven in discern 2
Fig. 2: Fingerprint sensor algorithm

2.2 Verification manner


the second method is the verification method. that is the most repeated manner. it is a finished on
every occasion the person desires to employ the fingerprint-managed device. whilst he places his
finger on the fingerprint scanner floor, the fingerprint could be processed by using the fingerprint
scanner.
The fingerprint pattern that has been received would be as compared towards the saved
enrolment template this is already saved inside the database or reminiscence vicinity wherein the
enrolment method become performed. whilst the fingerprint pattern passes the evaluation
procedure, it shows an acknowledgement in its show and grants the person get admission to.
2.3 information collection system
The final technique with a view to be performed is the facts collection method. The data
approximately the fingerprint tool utilization or record may be accumulated after a time period
and can be used as a shape of document to realize the attendance of someone or to know the
quantity of times a constrained.

You might also like