Академический Документы
Профессиональный Документы
Культура Документы
& MANAGEMENT
DECLARATION
No portion of work referred to in this report has submitted in support of an application for
another degree or qualification of this or any other universities or institution of higher
learning.
_____________________
_______________
(Date)
ii
ACKNOWLEGEMENT
I would like to express my deepest gratitude to my supervisor, Dr. Wang Yin Chai
for his guidance and motivation in making this project a success. I wish to thank him for
being very patient and helpful to me throughout the development process of the system.
Apart from that, I am indebted to my examiner, Mr. Sylvester Arnab for his effort in
helping me to improve the report and providing useful suggestions in the system that has
been developed.
Finally, my thank goes to my friends who have given my full cooperation, advice
and support, without which I could not have completed this project.
iii
TABLE OF CONTENTS
DECLARATION
ii
ACKNOWLEDGEMENTS
iii
TABLE OF CONTENTS
iv
LIST OF FIGURES
LIST OF TABLES
xiii
ABSTRACT
xiv
ABSTRAK
xv
CHAPTER 1: AN OVERVIEW
1.1
Introduction
1.2
Problem Statement
1.3
Objective
1.4
Scope
1.5
Expected Outcome
1.6
Significant
1.6.1
Contribution to Administrator/Lecturer
1.6.2
Contribution to Student
1.7
iv
Introduction
Overview of Biometric
2.3
Biometric Technologies
2.3.1
Introduction
2.3.2
2.3.3
10
10
2.3.4
2.4
History of Fingerprint
11
2.5
Overview of Fingerprint
12
2.6
Fingerprint Identification
12
2.7
13
2.7.1
13
2.7.2
13
14
15
17
2.9
2.8.1
18
2.8.2
20
2.8.3
22
Summary
23
CHAPTER 3: METHODOLOGY
3.1
Introduction
24
3.2
24
3.3
Summary
28
4.2
Introduction
29
4.1.1
29
Purpose
Requirement Specification
29
4.2.1
Administrator Requirement
30
4.2.2
Student Requirement
31
4.3
Hardware Requirements
34
4.4
Software Requirements
34
4.5
Summary
35
Introduction
36
5.2
36
vi
5.3
5.2.1
36
5.2.2
Diagram 0
38
5.2.3
Child Diagram
39
39
40
41
41
42
43
44
45
45
Data Dictionary
46
5.3.1
Data Elements
46
5.3.2
Data Store
47
5.4
Normalization
47
5.5
49
5.6
Database Design
49
5.7
Summary
51
Introduction
53
6.2
System Configuration
53
vii
6.3
6.4
6.5
6.2.1
53
6.2.2
54
6.2.3
54
System Decomposition
55
6.3.1
Login Module
56
6.3.2
57
6.3.3
58
6.3.4
59
6.3.5
Check In Module
60
6.3.6
62
65
6.4.1
Registration Feature
65
6.4.2
Matching Feature
65
Summary
66
Introduction
67
7.2
Objectives
67
7.3
Specification Testing
67
7.3.1
Functional Testing
66
7.3.2
Usability Testing
69
7.3.2.1 Student
70
70
7.3.3
viii
7.4
System Limitation
71
7.5
Summary
72
Introduction
73
8.2
Achievements
73
8.3
Problem Faced
75
8.4
Future Enhancement
75
8.4.1
75
8.5
Summary
76
REFERENCES
77
APPENDIX
Appendix A: Formal Attendance Sheet
79
Appendix B: Questionnaire
80
83
89
91
92
94
96
97
ix
LIST OF FIGURES
Figure 2.1
13
Figure 2.2
14
Figure 2.3
15
Figure 2.4
16
Figure 2.5
17
Figure 2.6
18
1.0
Figure 2.7
19
Figure 2.8
19
Figure 2.9
20
Figure 2.10
21
Figure 2.11
21
Figure 2.12
22
Figure 2.13
23
Figure 3.1
25
Figure 4.1
32
Figure 4.2
32
33
Figure 4.4
33
36
Figure 5.2
38
Figure 5.3
39
Figure 5.4
40
Figure 5.5
41
Figure 5.6
41
Figure 5.7
42
Figure 5.8
43
Figure 5.9
44
Figure 5.10
45
Figure 5.11
45
Figure 5.12
48
Figure 5.13
49
Figure 6.1
55
Figure 6.2
Login Module
56
Figure 6.3
57
Figure 6.4
58
Figure 6.5
59
Figure 6.6
60
Figure 6.7
Check In Module
61
xi
Figure 6.8
62
Figure 6.9
63
Figure 6.10
64
Figure 6.11
64
Figure 7.1
68
Figure 7.2
70
Figure 7.3
71
xii
LIST OF TABLES
Table 2.1
11
Table 5.1
46
Table 5.2
47
Table 5.3
47
xiii
ABSTRACT
xiv
ABSTRAK
ke
semasa.
Selain
itu,
laporan
mengenai
kehadiran
pelajar
telah
xv
CHAPTER 1: AN OVERVIEW
1.1
Introduction
Today, Electronic Attendance or also called as E-attendance is well known by
the entire world. It functions in an accurate way on recording the working hours which
is important for some particular system such as payroll system. Besides that, Eattendance provides a better data integrity and ease of use for users to manage. It works
fast and accurate in terms of processing performance. As for this project, The
Fingerprint Identification for Attendance Analysis and Management works as an Eattendance concept but in the other way, which is using the fingerprint application to
identify and recording the student daily attendance for each lecture they have attended.
Traditionally, the student attendance now is taken in a manual way which is
either using the formal or informal paper attendance sheet. The manually taken student
attendance is uncomfortable in teaching and learning situations to lecturers even to
students.
This project is developed to manage and reduce the current problems faced by
the lecturers and students in a systematic and structured method. The system only can
be functional after it is activated by the administrator or lecturer to identify and record
students attendance. This can prevent the student or other people to access it.
There are some functions provided including adding and editing student
attendance information, calculating the percentage of student attendance and printing
the student attendance sheet.
1.2
Problem Statement
The current problem is the management of students attendance still done in a
manual process. This poses difficulty for lecturers to take the student attendance, which
they have to use valuable time to verify each student who has attended the class.
Besides the lecturer verifying the attendance himself or herself, the other way is
by passing around a sheet of student attendance to the students. This allows
uncomfortable learning lessons to students. The student also faces the problem of
signing their attendance on attendance sheet which sometimes they need to wait until
the end of the lecture just to be able to sign. Moreover, the cheated signature situation
frequently happens in which absent students ask their friend to help them to sign the
attendance sheet.
1.3
Objective
The purpose of this project is to develop a Fingerprint-based Attendance
1.4
Scope
The scope of this project will include automatic management of the check in of
1.5
Expected Outcome
The system automatically searches and records a particular students attendance
after finding the matched fingerprint, which was stored in a certain database. The
database for the particular student will be recorded for each class he or she has attended.
The administrators can view the student attendance information after the class. They can
modify the attendance information through the login to administrator respective
features.
1.6 Significant
This project contributes to both administrator/lecturer and student.
1.7
objective of the project, the scope of project and project contribution. Chapter 2
contains reviews of biometric technologies and existing system, which are implemented
in order to manage the attendance. Chapter 3 explains about methodology used in the
system. The methodology will be a guideline to continue the system development.
Chapter 4 describes the system analysis. This chapter will be reviews the
current system to identify the possible problems. Hence, propose a new system to assist
and solve out the problem. Software and hardware specification are identified for
FAMAS to produces the excellent performance. Chapter 5, system design explains the
design issues. Data Flow Diagram (DFD), Entity Relationship Design (ERD), data
normalization and database design are discussed for FAMAS. Chapter 6 describes the
implementation of FAMAS while Chapter 7 reports the testing and evaluation of the
FAMAS. Lastly, achievements and future enhancements for FAMAS are explained in
Chapter 8.
2.1
Introduction
In this chapter, there is consists of parts. First part, reviewing overall
information concerned with the biometric topics. Besides, the existing biometric
identification technologies have been review through its technology, advantages and
disadvantages aspect. Moreover, it will be an important factor to choose the biometric
identification for this project. Second part, reviews of the interface and functionality of
the existing attendance management system was carried out to assist in designing the
appropriate user interface for the system proposed.
Overview of Biometric
The biometric is refer to identification and verification of a person based on
vii. Signature
Basically, this method of identification a person is preferred over traditional
methods. As rapid increasing used of computer in information technology areas, a
secure restricting access to privacy or personal data must be obtained. The biometric
technique can use in many application area in order to prevent unauthorized access to
use the privacy data such as ATMs, smart card, computer networks, time & attendance
system, desktop PCs and workstation.
Nowadays, there are several types of system developed through biometrics
technique for real-time identification. The face recognition and fingerprint matching are
the most popular biometric technique used to develop the system followed by hand
geometric, iris, retina, and speech.
2.3
Biometric Technologies
2.3.1 Introduction
The biometric technologies can define as an automated system of recognizing a
person based on the person's physical or behavioral characteristics. Nowadays, as an
advanced of biometric technologies may be an option for identification application
rather than uses physical card, documents, passwords or ID numbers. The basic
processes inside the biometric technologies are capture and store the information at
enrollment stage and than compare at a later verification stage.