Sunday, March 3, 2019
Attendance Monitoring System Essay
The main aim of this paper is to develop an accurate, fast and truly efficient automatic attendance constitution using reproduce baulk technique. We propose a system in which reproduce verification is through with(p) by using extraction of minutiae technique and the system that automates the full outgrowth of taking attendance, The study was conducted using a quantitative come near by designing a questionnaire as the data collection instrument found on fingermark unified biometric technologies. The survey involved 6 employees establish on stratified random sampling technique.The results however show that reproduce biometric identifier was found suitable for the employee attendance management system of the organization. Keywords biometrics, fingerprint ,employee attendance, identifier, etc . 1. base In many institutions and organization the attendance is very important work out for different purposes and its unrivalled of the important criteria that is to fol minuscu le for students and organization employees. The previous approach in which manu every break down(predicate)y taking and maintains the attendance evidences was very inconvenient task. afterward having these issues in mind we develop an automatic attendance system which automates the whole process of taking attendance and maintaining it.We already know about virtually commonly apply biometric techniques argon used for objective identification ,verification be like iris recognition, voice identification, fingerprint identification, DNA recognition ,etc .Biometrics techniques atomic number 18 widely used in various areas like building certificate,etc. A fingerprint is an impression of the friction ridges on all parts of thefinger. A friction ridge is a raised particle of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more(prenominal) than connected ridge units of friction ridge skin. These are sometimes cognize as epi cutaneous ridges which caused by the underlying embrasure mingled with the dermal papillae of the dermis A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin.These are sometimes known as epidermal ridges which caused by the underlying interface among the dermal papillae of the dermis The term fingerprint is refers impressions transferred from the pad last joint of fingers and thumbs, though fingerprint cards as well typically record portions of lower joint areas of the fingers (which are also used to reconstruct identifications)6. It is believed that no two people turn in identical fingerprint in world, so the fingerprint verification and identification is most pop way to avouch the authenticity or identity of a soulfulness wherever the security is a problematic question.The reason for popularity of fingerprint technique is uncommonness of person arises from his behavior personal characteristics are like, for instance uniqueness, which indicates that each and every fingerprint is unique, different from one other. Universality ,that means every person enforce the individual characteristics of fingerprint. The trey primary patterns of fingerprint ridges are the puckish, loop, and whorl An arch is a pattern where the ridges enter from one side of the finger, rise in the center numbering an arc, and then exit the other side of the finger13. The loop is a pattern where the ridges enter from one side of a finger, public figure a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a fundamental point on the finger. Scientists become found that family members often share the same general fingerprint patterns, ahead(p) to the belief that these patterns are inherite d 2013, IJARCSSE All Rights Reserved pageboy 379Rao et al., multinational Journal of right look in Computer skill and bundle engineering 3(4), April 2013, pp. 379-3832. attendance Monitoring Model Automatic attendance system using fingerprint verification technique. A fingerprint is captured by substance abuser interface, which are likely to be an optical solid state or an ultrasound sensor. Generally, there are two approaches are used for fingerprint verification system among them first one is Minutiae establish technique, in which minutiae is be by ending or termination and bifurcations. Other one is moving-picture show based method or matching pattern. Minutiae-based matching This is the most popular and widely used technique, being the basis of the fingerprint coincidence do by fingerprint examiners. Minutiae are extracted from the two fingerprints and stored as sets of points in the two- dimensional plane.Minutiae-based matching essentially consists of finding the al ignment between the pathfinder and the stimulation minutiae sets that results in the maximum number of minutiae pairings1 Pattern or Image based matching Pattern based matching use algorithms to compare the basic fingerprint patterns like arch, whorl or loop between a previously stored template and candi epoch fingerprint.For this purpose image is required to be alinment in same orientation. In matching process algorithms finds a central point on the fingerprint image and centre on the image. In pattern based algorithm, the template contains the type, size and orientation of pattern in spite of appearance the aligned fingerprint image.The candidate fingerprint image is graphically compared with the template to determine the degree to which the match. 3.Implementation Of Process This process complete in three phase and also phase description is mention down the stairs conformation 1. fingerprint see and registration fingerprint scans convert peoples fingerprints into digital co des or numerical data that can be enter in a database. Like facial recognition software, fingerprint scanning matches an individuals code against an existing database of codes in order to assert that individuals identity. Proponents of fingerprint scanning point to the conversion of fingerprints into digital data as a privacy protection measureFingerprint scanning is already in use as an identification system that replaces cards or keys to log onto computers. Before scanning the fingerprint everyone has to fill the registration form.These form have the some of the basic details of the individual much(prenominal) as hollo,fathers name,mothers name,date of birth and so on. Fingerprint scanning fitting form 2013, IJARCSSE All Rights ReservedPage 380Rao et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(4), April 2013, pp. 379-383PHASE-2- Fingerprint recognition or authentication Fingerprint recognition or fingerprint authentication r efers to the automated method of verifying a match between two humans fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and quad sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). The analysis of fingerprints for matching purposes generally requires the comparison of several characters of the print pattern.These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns.1 It is also necessary to know the structure and properties of human skin in order to successfully employ some of the resourcefulness technologies.10. Minutiae-based fingerprint matching algorithm has been proposed to solve two problems correspondence and relation computation. For the correspondence problem, use an alignment-based greedy matching algorithm to establish the correspondences between minutiae. Fingerprint recognition systems have the advantages of both ease of use and low cost. 2013, IJARCSSE All Rights ReservedPage 381Rao et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(4), April 2013, pp. 379-383 Phase-3-attendance modifyEmployee Attendance Management software is tightly integrated withthe organizations HR data. The in-time and out-time, lunch and breaks entered by the employees will help the respective authority in charge to keep in track the activities of the employees. Employee Attendance Management ashes helps in keeping track of the attendance of employees based on various events like shift, late, overtime, permission, holiday working and on duty.5Single click suck of all time office events like hours worked, late, permission, on duty, overtime, leave of an employee for date or month period can also be obtained from this Attendance Management system. Employee Att endance Management Software helps to monitor the productivity of the employees and also keep a check on the Employee absenteeism which in turn helps in achieving the organization goals.4. Result The distinguish will be generated with name of the employee matched fingerprint and stored in an attendance system. Attendance log of the month is shown in below tableThis software not only prepare the monthly report but also shows the attendance of the individual day. It not only screening the name of the present employees but it also display the employee which is absent or late on that particular day.This software also display the name of employees which is in preplan live.The individual attendance reports is shown below 2013, IJARCSSE All Rights ReservedPage 382Rao et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(4), April 2013, pp. 379-3835.Conclusion And Future Work The proposed system will make way for perfect management of students and staff attendance and produce more accuracy. Future work on this project would include the creating of a matching algorithm that uses to mention and maintain the different type of leave such as on duty leave,leave without pay ,medical leave and soon.Also timely update the leave of the each employees when it take leave. The efficient matching algorithm have to be developed in theory and in code so that our goal of getting faster and more accurate matched image than with pre-existing software.References 1 Jianjiang Feng, Combining minutiae descriptors for fingerprint matching, Pattern Recognition, pp. 342 352, April 2007. 2 Peng Shi, Jie Tian, Qi Su, and Xin Yang, A sassy Fingerprint Matching Algorithm Based on Minutiae and Global statistical Features, IEEE Conference, 2007. 3 Neeta Nain, Deepak B M, Dinesh Kumar, Manisha Baswal, and Biju Gautham Optimized MinutiaeBased Fingerprint Matching, Proceedings, 2008. 4 BioLink 2006. Time and attendance, Retrieved 11thDecember,2011from http//www.m3biometrics.co.uk/Portals/2/downloads/BioTime_Time_and_Attendance.pdf. 5 InfoTronics, Inc. 2008. Biometrics Advantages for employee attendance verification, Michigan Farmington Hills. Retrieved 11th November, 2011 from www.mwtime.com/biometrics.pdf. 6 Jain, A., Hong, L., Pankanti, S., Bolle, R., 1997.An Identity Authentication System victimization Fingerprints. Retrieved 10th June, 2012 from http//biometrics.cse.msu.edu/Publications/Fingerprint/JainEtAlIdentityAuthUsingFp_ProcIEEE97.pdf. 7 K. Asai, Y. Hoshino and K. Kiji, Automated fingerprint Identification by minutiae-network feature- feature extraction process, IEICE transactions, Vol.J72-D-II, N0.5, pp 724-732, 1989. 8 Chaur-Chin Chen and Yaw-Yi Wang, An AFIS Using Fingerprint Classification, Image and Vision Computing, 2003. 9Virginia Espinosa-Dur6, Fingerprints clipping Algorithm, IEEE AES Systems Magazine, 2003. 10 U. Halici, L. C. Jain, A. Erol, Introduction to Fingerprint Recognition,Intelligent Biometric Techniq ues in Fingerprint and Face Recognition,L.C. Jain, U. Halici, I.Hayashi, S.B. Lee, S. Tsutsui (editors), CRCPress, 1999. 11 Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S.Sandhu, Fingerprint Verification System using Minutiae Extraction Technique, World Academy of Science, Engineering and Technology 46 2008. 12 Anil K. Jain, Arun Ross and Salil Prabhakar, An introduction to biometric recognition, Circuits and Systems for Video Technology,IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s)4 20. 13 L. OGorman, Overview of fingerprint verification technologies,Elsevier discipline Security Technical Report, Vol. 3, No. 1, 1998. 14. Eric P. Kukula, Christine R. Blomeke, Shimon K. Modi, and Tephen J. Elliott, Effect of Human Interaction on Fingerprint Matching Performance, Image Quality, and Minutiae Count,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment