M. Alhaj Mohamed Mohideen N.S. Fousul Ameen M. Mohamed Faheem T.S. Mohamed Thasthakeer FINGER PRINT BASED ATTENDANCE SYSTEM FOR EMPLOYEES Guided By S.P. Raja Co-ordinated By S.M. Abdul Kadar HOD /IT
M. Alhaj Mohamed Mohideen
N.S. Fousul Ameen
M. Mohamed Faheem
T.S. Mohamed Thasthakeer
FINGER PRINT BASED ATTENDANCE SYSTEM
FOR EMPLOYEES
FINGER PRINT BASED ATTENDANCE SYSTEM
FOR EMPLOYEES
Guided By
S.P. Raja
Co-ordinated By
S.M. Abdul Kadar
HOD /IT
This Project biometric employee attendance
service is an easy to use attendance clock. The
system avails the gathering of work hours by a
small finger print scanner attached to the
computer. Employees will punch IN and punch
OUT by using their fingerprints, utilizing any
computer connected to the intranet. It will become
possible to gather accurate time attendance of
your employees in real time.
MOTIVATIONMOTIVATION
EXISTING SYSTEMEXISTING SYSTEM
The major problem faced in smart cards is
lack of security and the problem is two fold. The
first issue is that not all smart cards are in fact
secure .
The second issue with security involves
public perception of the technology. People
must believe that the cards are secure
A third issue concerns who holds
responsibility for the card. If the cash balance
is wiped by a memory failure
PROPOSED SYSTEMPROPOSED SYSTEM
Biometric attendance system is one of the
most successful application of biometric
technology. With the integration and use of
biometric technology getting simpler, many
corporations are venturing down the biometric
road to verify the time and attendance of their
employees.
Biometric attendance has taken a starring role
in today's competitive markets. As labor cost
becomes more and more a factor in determining
the profitability of business, the ability to
reduce employee labor theft has become a
principal goal.
INTRODUCTION OF BIOMETRICS
INTRODUCTION OF BIOMETRICSBiometrics: A New Era in Security
Traditionally, authorized users have gained
access to secure information systems, buildings, or
equipment via multiple passwords, personal
identification numbers, secure tokens, keys, codes,
identification cards, and so on. However, these
security methods have important weaknesses—they
can be lost, stolen, forged, or forgotten. Biometric
technology would change security and access control
by providing systems that recognize us by our
biological or behavioral characteristics, such as
fingerprints, iris patterns, facial characteristics, and
speech patterns.
Today, most biometric systems
capture data about biological or behavioral
characteristics via cameras or microphones
and relay the data to a digital signal processor
(DSP) for analysis, digitization, and
processing.
Fingerprint readers cost more than
$1,000 until a year ago. Several vendors are
now promising to deliver finger scanners for
about $100 each later this year.
THE TECHNOLOGYTHE TECHNOLOGY
THE COSTTHE COST
TYPES OF BIOMETRICSTYPES OF BIOMETRICS
Fingerprint scansFingerprint-scanning systems use optical or
capacitative electronic sensors to capture samples of fingerprints. They then conduct vector or minutia analysis of the samples and classify them based on their distinctive pattern of ridges, loops, whorls, and arches.
Voice authenticationVoice-authentication systems typically use a
sound card or a DSP to digitize voice input. The systems then use a matrix to classify the data based on voice characteristics.
Eye scansBiometric devices are sometimes used to scan a
person’s retina or iris.
CHECK AUTHENTICATION PROCESSINGCHECK AUTHENTICATION PROCESSINGFINGER PRINT CORRECT
EMPLOYEE ATTENDANCE REGISTER
INCORRECT PASSOWRD
DATA FLOW DIAGRAM
DATA FLOW DIAGRAM
PROCESS DIAGRAMPROCESS DIAGRAM
FINGER INPUTSTORE THE VERIFIED
FINGER TIP
ANALYSE AND MATCH THE GIVEN FINGER PRINT
Give the input to fingerprint scanner.
The fingerprint scanner analyze the fingerprint image as
fingertip value and verify that fingertip value from the
database
In the database already stored all the fingerprint images
as a fingertip value.
If the fingertip values are matched, then put the
attendance for the particular employee and store into the
database.
If the fingertip values not matched, then the attendance
does not marked. The particular employee should punch
their finger on the fingerprint scanner one more time.
EXPLANATIONEXPLANATION
APPLICATIONSAPPLICATIONS
Hard disk authentication
Door lock system in home
Personal computer / workstation security
e-commerce / e-business Electronic transactions
ATM System
Next Generation Mobile phone
MODULE DESCRIPTIONMODULE DESCRIPTION
Application Design Database Design Hardware Interface Report Preparations
REPORT DESCRIPTIONREPORT DESCRIPTION
Daily Attendance Reports Weekly Attendance Reports Monthly Attendance Reports Absence Reports
SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
Visual Studio.NET 2005 SQL Server 2005
HARDWARE REQUIREMENTS
HARDWARE REQUIREMENTS
Processor - Pentium IV (1.8 GHz)
RAM - 512 MB Hard Disk - 80 GB Fingerprint Scanner - USB Hamster Keyboard - 110 key enhanced Mouse - Optical Monitor - 14” CRT Monitor.
SAMPLE SNAPESHOTSAMPLE SNAPESHOT
SAMPLE SNAPESHOTSAMPLE SNAPESHOT