Top Banner
M. Alhaj Mohamed Mohideen N.S. Fousul Ameen M. Mohamed Faheem T.S. Mohamed Thasthakeer FINGER PRINT BASED ATTENDANCE SYSTEM FOR EMPLOYEES Guided By S.P. Raja Co-ordinated By S.M. Abdul Kadar HOD /IT
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Fingerprint

M. Alhaj Mohamed Mohideen

N.S. Fousul Ameen

M. Mohamed Faheem

T.S. Mohamed Thasthakeer

FINGER PRINT BASED ATTENDANCE SYSTEM

FOR EMPLOYEES

FINGER PRINT BASED ATTENDANCE SYSTEM

FOR EMPLOYEES

Guided By

S.P. Raja

Co-ordinated By

S.M. Abdul Kadar

HOD /IT

Page 2: Fingerprint

This Project biometric employee attendance

service is an easy to use attendance clock. The

system avails the gathering of work hours by a

small finger print scanner attached to the

computer. Employees will punch IN and punch

OUT by using their fingerprints, utilizing any

computer connected to the intranet. It will become

possible to gather accurate time attendance of

your employees in real time.

MOTIVATIONMOTIVATION

Page 3: Fingerprint

EXISTING SYSTEMEXISTING SYSTEM

The major problem faced in smart cards is

lack of security and the problem is two fold. The

first issue is that not all smart cards are in fact

secure .

The second issue with security involves

public perception of the technology. People

must believe that the cards are secure

A third issue concerns who holds

responsibility for the card. If the cash balance

is wiped by a memory failure

Page 4: Fingerprint

PROPOSED SYSTEMPROPOSED SYSTEM

Biometric attendance system is one of the

most successful application of biometric

technology. With the integration and use of

biometric technology getting simpler, many

corporations are venturing down the biometric

road to verify the time and attendance of their

employees.

Biometric attendance has taken a starring role

in today's competitive markets. As labor cost

becomes more and more a factor in determining

the profitability of business, the ability to

reduce employee labor theft has become a

principal goal.

Page 5: Fingerprint

INTRODUCTION OF BIOMETRICS

INTRODUCTION OF BIOMETRICSBiometrics: A New Era in Security

Traditionally, authorized users have gained

access to secure information systems, buildings, or

equipment via multiple passwords, personal

identification numbers, secure tokens, keys, codes,

identification cards, and so on. However, these

security methods have important weaknesses—they

can be lost, stolen, forged, or forgotten. Biometric

technology would change security and access control

by providing systems that recognize us by our

biological or behavioral characteristics, such as

fingerprints, iris patterns, facial characteristics, and

speech patterns.

Page 6: Fingerprint

Today, most biometric systems

capture data about biological or behavioral

characteristics via cameras or microphones

and relay the data to a digital signal processor

(DSP) for analysis, digitization, and

processing.

Fingerprint readers cost more than

$1,000 until a year ago. Several vendors are

now promising to deliver finger scanners for

about $100 each later this year.

THE TECHNOLOGYTHE TECHNOLOGY

THE COSTTHE COST

Page 7: Fingerprint

TYPES OF BIOMETRICSTYPES OF BIOMETRICS

Fingerprint scansFingerprint-scanning systems use optical or

capacitative electronic sensors to capture samples of fingerprints. They then conduct vector or minutia analysis of the samples and classify them based on their distinctive pattern of ridges, loops, whorls, and arches.

Voice authenticationVoice-authentication systems typically use a

sound card or a DSP to digitize voice input. The systems then use a matrix to classify the data based on voice characteristics.

Eye scansBiometric devices are sometimes used to scan a

person’s retina or iris.

Page 8: Fingerprint

CHECK AUTHENTICATION PROCESSINGCHECK AUTHENTICATION PROCESSINGFINGER PRINT CORRECT

EMPLOYEE ATTENDANCE REGISTER

INCORRECT PASSOWRD

DATA FLOW DIAGRAM

DATA FLOW DIAGRAM

Page 9: Fingerprint

PROCESS DIAGRAMPROCESS DIAGRAM

FINGER INPUTSTORE THE VERIFIED

FINGER TIP

ANALYSE AND MATCH THE GIVEN FINGER PRINT

Page 10: Fingerprint

Give the input to fingerprint scanner.

The fingerprint scanner analyze the fingerprint image as

fingertip value and verify that fingertip value from the

database

In the database already stored all the fingerprint images

as a fingertip value.

If the fingertip values are matched, then put the

attendance for the particular employee and store into the

database.

If the fingertip values not matched, then the attendance

does not marked. The particular employee should punch

their finger on the fingerprint scanner one more time.

EXPLANATIONEXPLANATION

Page 11: Fingerprint

APPLICATIONSAPPLICATIONS

Hard disk authentication

Door lock system in home

Page 12: Fingerprint

Personal computer / workstation security

Page 13: Fingerprint

e-commerce / e-business Electronic transactions

ATM System

Page 14: Fingerprint

Next Generation Mobile phone

Page 15: Fingerprint

MODULE DESCRIPTIONMODULE DESCRIPTION

Application Design Database Design Hardware Interface Report Preparations

Page 16: Fingerprint

REPORT DESCRIPTIONREPORT DESCRIPTION

Daily Attendance Reports Weekly Attendance Reports Monthly Attendance Reports Absence Reports

Page 17: Fingerprint

SOFTWARE REQUIREMENTS

SOFTWARE REQUIREMENTS

Visual Studio.NET 2005 SQL Server 2005

Page 18: Fingerprint

HARDWARE REQUIREMENTS

HARDWARE REQUIREMENTS

Processor - Pentium IV (1.8 GHz)

RAM - 512 MB Hard Disk - 80 GB Fingerprint Scanner - USB Hamster Keyboard - 110 key enhanced Mouse - Optical Monitor - 14” CRT Monitor.

Page 19: Fingerprint

SAMPLE SNAPESHOTSAMPLE SNAPESHOT

Page 20: Fingerprint

SAMPLE SNAPESHOTSAMPLE SNAPESHOT