Академический Документы
Профессиональный Документы
Культура Документы
Table of Contents
1.1 Problem Background.......................................................................................................................8
1.2 Problem Statement...........................................................................................................................9
1.3 Project Objective...........................................................................................................................10
1.4 Project Scope.................................................................................................................................11
1.4.1 Functionalities of Fingerprint Identification System.....................................................................12
1.4.1.1 Minutia Extractor.......................................................................................................................12
1.4.1.1.1 Preprocessing Functions.........................................................................................................12
1.4.1.1.2 Minutia Extraction Functions..................................................................................................13
1.4.1.1.3 Post-processing Functions...................................................................................................13
1.4.1.2 Minutia Matcher....................................................................................................................14
1.4.2 Functionalities of Campus Entrance Clocking System.................................................................14
1.4.3 Functionalities of Profiles & Management System.......................................................................14
1.4.3.1 User Authorization.................................................................................................................14
1.4.3.2 User Management..................................................................................................................15
1.4.3.3 Clocking Component.............................................................................................................15
1.4.3.4 Attendance Management........................................................................................................15
1.4.3.5 Leave Component..................................................................................................................16
1.4.3.6 Report Management...............................................................................................................17
1.4.3.7 Bulletin Management.............................................................................................................17
1.4.3.8 Department management.......................................................................................................18
1.5 Project Constraint..................................................................................................................18
1.5.1 Limitations.........................................................................................................................18
1.5.2. Time...................................................................................................................................18
1.5.3 Manpower..........................................................................................................................19
1.6 Project Stakeholders..............................................................................................................19
1.7 Project Framework.................................................................................................................20
1.8 Conclusion.............................................................................................................................21
2.1 Introduction...................................................................................................................................22
2.2 History of the company / Background of Company.......................................................................22
2.3 Literature Review Finding.............................................................................................................23
Case 1 FingerFlex.................................................................................................................................23
Case 3 screen shot of SilverLiners Time Attendance Suite as follow....................................................30
2.4 Comparisons of finding.................................................................................................................32
2.5 Academic/Technology Research:...................................................................................................33
2.5.1 Fingerprint Recognition.........................................................................................................33
2.5.1.1.2 What is Fingerprint Recognition?.......................................................................................34
2.5.1.1.3 Two approaches for Fingerprint recognition.......................................................................36
2.5.1.2 System design – Fingerprint Recognition System..................................................................36
2.5.1.2.1 System Level Design..........................................................................................................36
2.5.1.2.2 Algorithm Level Design......................................................................................................38
2.5.1.3 Fingerprint Image Preprocessing:..............................................................................................39
2.5.1.3.1 Fingerprint Image Enhancement.........................................................................................39
2.5.1.3.2 Fingerprint Image Binarization...........................................................................................41
2.3.3 Fingerprint Image Segmentation...................................................................................................42
2.4.1 Fingerprint Ridge Thinning..........................................................................................................44
2.4.2 Minutia Marking...........................................................................................................................45
2.5.2 Fingerprint Scanner Research.......................................................................................................47
2.5.2.1 DigitalPersona U.are.U 4500.....................................................................................................47
2.5.3 Programming Language Research................................................................................................52
2.5.3.1 MATLAB Programming Language...........................................................................................52
2.5.3.2 Java............................................................................................................................................53
2.5.3.3 C# (C Sharp)..................................................................................................................................55
2.5.3.4 Conclusion of Programming research............................................................................................56
2.5 Target System................................................................................................................................56
2.6 Conclusion.....................................................................................................................................57
Gathering User Requirements............................................................................................................59
3.2.1 Interviews..................................................................................................................................59
3.2.2 Questionnaire............................................................................................................................65
3.3 Software Development Methodology............................................................................................66
3.4 Waterfall Model............................................................................................................................66
3.5 Spiral Methodology......................................................................................................................68
3.6 Rational Unified Process (RUP) Methodology..............................................................................69
List of Tables
List of Figures
Abstract
Attendance system is proposed the time clack in and out of all the staff at the Yemen
university and will be run through device which is located in the entrance of the campus the
system is using the biometric technology by thumb recognition to trace the staff attendance
.so the admin can followed up with the staff attendance trough this system by being alarmed
of each staff will be using the system .the system will be calculated the business hours that
staff spends daily with ability to indicated the absent and duration that staff will be out office
.the system will be help to provide report of the staff statue during the day
Acknowledgement
In the process of completing this project, I have received a lot of help and support from many
people in order for me to complete this project on time and to make this project a success.
First of all, I would like to thank my supervisor Ms. Kohila for the advices, help and
guidance that are provided to me throughout the process of completing the project.
The cooperation and time that Ms. Kohila had spent in guiding me had provided me with
great help and will be greatly appreciated.
I would also like to thank the my friends for their advice, support, financial helps and also
encouragement, which have motivated and kept me going in order to complete this project .
Chapter 1
Introduction
The main aim of this system is to develop an accurate, fast and very efficient automatic
attendance system using fingerprint Identification technique for Yemen University staffs. The
system is proposed in which fingerprint identification is done by using extraction of one of the
techniques available and the system that automates the whole process of taking attendance,
Manually which is a laborious and troublesome work and waste a lot of time, with its managing
and maintaining the records for a period of time is also a burdensome task. For this purpose we
use fingerprint identification system using extraction of minutiae techniques.
First, when the user is enrolled to the system his/her fingerprint should be scanned using the
scanner and stored in the database along with his/her identity information.
There will be two modes in the system: staff mode where the staff can monitor their summarized
weekly/monthly attendance. And Admin mode where the admin can monitor all staff attendance
as well as adding, deleting, and updating staff.
In many institutions and organizations the attendance is a very important factor for
various purposes one of the most basic needs for many universities is tracking how long staff
works. Simple time clocks can get the job done, but they don't offer much in the way of insight
into your university and they're relatively easy for staff to fool.
Modern time and attendance systems provide a couple of key benefits: by computerizing your
staff time tracking, they make it possible to integrate with payroll and HR systems and do
detailed reports on work patterns to get a better understanding of your university .
And its one of the important criteria that is to follow for staff and organization’s employees. The
current approach in which is manually taking and maintaining the attendance records is very
inconvenient task.
There are a number of problems associated with paper staff timesheets method.
Forgetfulness: Some staff forgets to complete their timesheets regularly and have to take their
best guess about when they arrived, went for lunch and left for the day. The staff or the
university may lose out.
Time Wasting: With the pen and paper method, Yemen University staffs waste time signing in
and out. Staff take more time to fill the page of the paper to mark the attendance and thereby
queue used to form for just marking the presence.
Rounding up and fraud: Other employees may routinely increase their hours by rounding up their
times. They may do this without thinking, but a few minutes each day can be equivalent to a
week or so over the course of a year. This equates to a week’s pay without the work to show for
it; and if everyone in your company does the same, there’s an impact on efficiency and profits.
Signature copy and misuse leading to fraud in the system.
Maintenance of records: A company must keep paper timesheets in case problems arise in the
future. You may need the sheets at a disciplinary hearing, for instance. You must therefore have
secure storage, which takes up valuable office space.
The main aim of this system is to develop an accurate, fast and very efficient automatic
attendance system using fingerprint identification technique for Yemen University staffs. The
system is proposed in which fingerprint identification is done by using extraction of one of the
techniques available and the system that automates the whole process of taking attendance,
Manually which is a laborious and troublesome work and waste a lot of time, with its managing
and maintaining the records for a period of time is also a burdensome task. For this purpose we
use fingerprint identification system using extraction of minutiae techniques.
First, when the user is to be enrolled to the system his/her fingerprint should be scanned using
the scanner and stored in the database along with his/her identity information.
There will be two modes in the system: staff mode where the staff can monitor their summarized
weekly/monthly attendance. And Admin mode where the admin can monitor all staff attendance
as well as adding, deleting, and updating staff.
Core Modules:
Enhanced function:
Additional to validating the authenticity of users and capturing the time, the system also aims to
include additional features to make the system more complete. Some such features include:
Generation of appropriate reports that are useful for the management to take appropriate
actions.
User profiling where the user can view their weekly or monthly summarize attendance
Staff management such as monitoring, adding, updating, deleting users.
Project scope of Biometric Yemen University will be defined based on the functionality
of each component.
The system Biometric Yemen University is a desktop application which offers range of
functionalities for Yemen University Staff. The core venture of this system is to deliver Time &
Attendance system using fingerprint scanner to identify the staffs. This system has been alienated
into 4 modules which include various sub modules. Below stated the three major modules allied
with Biometric Yemen University.
Fingerprint Identification system will be an independent library that is responsible for identifying
users based their fingerprint images. Fingerprint Identification System will held all processing
algorithms e.g. image enhancement (pre-processing), Minutia extraction and minutia matching.
Follow are two major functions of Fingerprint Identification System
This function will be to extract minutia from a row fingerprint image. To implement a minutia
extractor, a three-stage approach is widely used by researchers. They are preprocessing, minutia
extraction and post-processing stage
Preprocessing functions are to enhance fingerprint images and perform segmentation mask, and
finally binarize the image to be ready form minutiae extraction. Overview of the preprocess
functions are as follow
GrayScale inverter
Histogram Analysis
Segmentation mask
Image equalization
Orientation estimator
Image binarization
Minutia Extraction takes the final binrized image and does the following processes in order
1- Image thinning
2- Minutia Marking
minutia that can be found in the previous operation are not all true minutia, here comes the post-
processing functions which is responsible for removing false minutia detected in a fingerprint
image. Filter functions to remove false minutia as stated below
The minutia matcher chooses any two minutias as a reference minutia pair and then match their
associated ridges first. If the ridges match well, two fingerprint images are aligned and matching
is conducted for all remaining minutia. The three main functions are as follow
Ridge correlation to specify reference minutia pair
Align two fingerprint images
Minutia match
Campus Entrance Clocking system is to be located in main entrance of the university and its
only purpose is to clock in or out staff automatically when they place their thumb on the
fingerprint scanner. This system uses Fingerprint Identification System to authenticate users. The
main functions of this system are stated below
Get fingerprint row image from the Fingerprint Scanner (Digital Persona u.are.u 4500).
Identify user based on the fingerprint collect using the Fingerprint Identification System.
Clock in or out user.
This function is to authorize user either by scanning fingerprint thumb, which would give the
user his type’s full functionalities in the system, or by their username and password which will
limit some of their functionalities in the system
Admin Functions:
Add user
Edit user
Delete user
Add staffs
Update staffs
Delete staffs
Staff Functions:
Admin Function:
Clock in/out
Admin Functions:
HR Functions:
Admin Functions:
HR Functions:
Staff Functions:
Apply Leave
View his/her leave applications
Get notification when HR/Admin responded to his/her leave application.
Admin Functions:
HR Functions:
Staff Functions:
Staff Functions:
Admin Functions:
1.5.1 Limitations
Thus to complete the system, there are some limitations in the system as the developer will
not be attempting on:
1.5.2. Time
Time needed to develop the attendance system using the finger print for Yemen
University is defined on the Gantt chart attached to the documentation. The Project
includes many tasks that should be completed on less than three months including
analysis, design, implementation, testing evaluation and documentation. However
developing a system in short period of time is a challenging task which requires a
transaction between different project phases and concentration on the critical areas rather
consuming time on tasks that have a little impact on the system.
1.5.3 Manpower
In this project, a single person has to handle all the phases of an industrial based project in
comparatively short period of time. In real situation more than one people
specialized on different areas (project manager Architectural designers, server side and
client side programmers, quality assurance personnel) have to communicate in order to
deliver a quality product that meets, the usually excessive and often unrealistic client’s
requirements. However, it can be consider a great challenge for the author.
Project Stakeholders are anyone who has an interest in the project, or whose interests
maybe affected as a result of project execution or project completion. Project Stakeholders for
This project can divide to:
Project manager: Since this is an individual work, I, the developer, will be responsible for the
development of this project from the start till the end.
User: Users will be the organization that will use the project’s product. Mainly the staff in
Yemen University whose are going to use to the product to clock in and out. An admin in
Yemen University will be responsible to manage and maintain the system.
In the first chapter; Introduction, which will include problem background, problem
statement, project objectives, project scope, project constraints, project stakeholder, and
conclusion of the first chapter.
In the Second chapter; literature review will include introduction, History of the company,
finding and its comparison, target system, failure story, and conclusion.
Chapter three, Methodology which will include introduction, fact-finding methodology, system
development model, and selective of System Development Methodologies
Chapter four, Analysis will include introduction, overview of the system, types of analysis,
quantitative and qualitative analysis, interviews, manual observation, and summary.
Chapter five, Design will include introduction, overview of the system design, types of design,
use case diagram, class diagram, activity diagram, ERD, and conclusion.
Chapter six, Implementation & Testing will include introduction, system implementation
methods and plan, system testing, screenshots of data entry, and data acceptance results.
Chapter seven, Conclusion of the whole system will include introduction, system strength, and
weakness of the system, future enhancement, and critical summary
1.8 Conclusion
In this first chapter, Introduction, developer explained the problems in the current
system Yemen University is facing. Then he illustrated what will be the objectives of the new
system and scaled the scope of the project with some limitations. After that, the developer
identified who would be the stakeholders of the project. And finally a project framework which
states an overview of what each chapter will consist of.
Chapter 2
Literature view
2.1 Introduction
This chapter starts by shading light on all what finger print for Yemen university staff is
all about. Consequently, the chapter continues with the brief history and profile of the finger
print system from the commencement till today and the establishment of the finger print system
offered good and valuable benefit to the staff in the university by using its touch. This chapter
goes on to identify the literature review and comparison of findings.
The earliest dated prints of the ridged skin on human hands and feet were made about
4,000 years ago during the pyramid building era in Egypt. In addition, one small portion of palm
print, not known to be human, has been found impressed in hardened mud at a 10,000-year old
site in Egypt.
It was common practice for the Chinese to use inked fingerprints on official documents, land
sales, contracts, loans and acknowledgments of debts. The oldest existing documents so endorsed
date from the 3rd century BC, and it was still an effective practice until recent times. Even
though it is recorded that the Chinese used their fingerprints to establish identity in courts in
litigation over disputed business dealings, researchers fail to agree as to whether the Chinese
were fully aware of the uniqueness of a fingerprint or whether the physical contact with
documents had some spiritual significance.
Case 1 FingerFlex
Terminal
Records
FingerFlex Time Attendance is designed to be used by most average computer users, with no
database and programming skills required. This means, user can have access to the system
without performing any complex database queries or special commands to get the information
required.
Schedule
Set as many as work groups and time shifts required by your company by using our intuitive
interface. FingerFlex cater to all time management requirements. User can even have different
working hours for different groups. The schedule management also adheres to the Malaysian
government agency work schedule requirements.
Policy
FingerFlex Time Attendance has a trigger alert system on monitoring people who are coming
late consistently. You can set your own rules for late attendance and the system will alert you
automatically.
Leave
Staffs taking leave can be recorded within FingerFlex, and will show up in related reports.
Case 2 PayPunch
PayPunch is a Biometric Time Clock & Attendance tracking system that replaces the typical time
clock used to track employees’ attendance. Instead of employees punching a time-card, they
simply insert their hand or a finger into the reader and enter their employee number. Screenshot
of the main menu of Paypunch illustrated below
Manage Department
Manage Employee Info
Manage Attendance records
Leave Application
Report generations
PayPunch uses a biometric device that makes 96 discreet images of the hand and creates a
sophisticated algorithm to generate and store a unique numerical template. Each time an
employee scans his/her hand, a new number is generated and compared to the one on file. The
device accurately identifies the employee and records, their in/out transaction in the payroll
database... all in about 1-second!
The PayPunch does not store images of your employees' hands, nor can it use any stored
information to create images of employees' hands. It does not x-ray and there is no exposure to
anything harmful whatsoever. It is an accurate measurement device for identification and
reporting purposes.
(Figure 2.3.7; SilverLiner Time Attendance - attendance form. taken SilverLiner demo software)
Attendance records:
(Figure 2.3.8; SilverLiner Time Attendance - attendance records form. taken SilverLiner demo
software)
Clock In/Out
Employee management
Add/update/delete Department
Add/update delete attendance records
Leave Application
Report generations
with fewer steps automatically with more steps with fewer steps
required to perform with detailed info. required to required to
this task however perform this perform this task.
the reports are not action. Generation of
very detailed. report is done
automatically
with detailed info.
[Figure2.3.9 finding comparison]
A fingerprint is the feature pattern of one finger (Figure 1.1.1). It is believed with strong
evidences that each fingerprint is unique. Each person has his own fingerprints with the
permanent uniqueness. So fingerprints have being used for identification and forensic
investigation for a long time.
A fingerprint is composed of many ridges and furrows. These ridges and furrows present good
similarities in each small local window, like parallelism and average width.
[Figure 1.1.2 Minutia. (Valley is also referred as Furrow, Termination is also called Ending,
and Bifurcation is also called Branch) Taken from Handbook of Fingerprint Recognition by
Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar.]
The fingerprint recognition problem can be grouped into two sub-domains: one is fingerprint
verification and the other is fingerprint identification (Figure 1.2.1). In addition, different from
the manual approach for fingerprint recognition by experts, the fingerprint recognition here is
referred as AFRS (Automatic Fingerprint Recognition System), which is program-based.
Fingerprint verification is to verify the authenticity of one person by his fingerprint. The user
provides his fingerprint together with his identity information like his ID number. The fingerprint
verification system retrieves the fingerprint template according to the ID number and matches
the template with the real-time acquired fingerprint from the user. Usually it is the underlying
design principle of AFAS (Automatic Fingerprint Authentication System).
(Nalini Ratha Ruud Bolle, 2003 in their AFIS book) stated that Fingerprint identification is to
specify one person’s identity by his fingerprint(s). Without knowledge of the person’s identity,
the fingerprint identification system tries to match his fingerprint(s) with those in the whole
fingerprint database. It is especially useful for criminal investigation cases. And it is the design
principle of AFIS (Automatic Fingerprint Identification System).
of fingerprints remains the uniqueness and keeps simple, the fingerprint matching, either for the
1-to-1 verification case or 1-to-m identification case, is straightforward and easy.
Two representation forms for fingerprints separate the two approaches for fingerprint
recognition.
The first approach, which is minutia-based, represents the fingerprint by its local features, like
terminations and bifurcations. This approach has been intensively studied, also is the backbone
of the current available fingerprint recognition products. I also concentrate on this approach in
my honors project.
The second approach, which uses image-based methods(L.C. Jain, U.Halici, I. Hayashi, S.B.
Lee and S.Tsutsui, (1999))., tries to do matching based on the global features of a whole
fingerprint image. It is an advanced and newly emerging method for fingerprint recognition. And
it is useful to solve some intractable problems of the first approach. But my project does not aim
at this method, so further study in this direction is not expanded in my thesis.
Figure 2.1.1 Simplified Fingerprint Recognition System. Taken from Handbook of Fingerprint
For fingerprint acquisition, optical or semi-conduct sensors are widely used. They have high
efficiency and acceptable accuracy except for some cases that the user’s finger is too dirty or dry.
Fingerprint sensor is used as will as the testing database for Biometric ASYU system is from the
available fingerprints provided by FVC2002 (Fingerprint Verification Competition 2002).
The minutia extractor and minutia matcher modules are explained in detail in the next part for
algorithm design and other subsequent sections.
Figure 2.2.1 Minutia Extractor; Taken from Handbook of Fingerprint Recognition by Davide
Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar.]
For the fingerprint image preprocessing stage, Histogram Equalization and Fourier
Transform are used to do image enhancement. And then the fingerprint image is binarized using
the locally adaptive threshold method (L.C. Jain, U.Halici, I. Hayashi, S.B. Lee and S.Tsutsui,
(1999)). The image segmentation task is fulfilled by a three-step approach: block direction
estimation, segmentation by direction intensity (N. Ratha, S. Chen and A.K. Jain, (1995). pp.
1657-1672) and Region of Interest extraction by Morphological operations. Most methods used
in the preprocessing stage are developed by other researchers but they form a brand new
combination in this project through trial and error.
For minutia extraction stage, three thinning algorithms (L.C. Jain, U.Halici, I. Hayashi, S.B.
Lee and S.Tsutsui, (1999); D.Maio and D. Maltoni, (1997). 19(1):27-40) are tested and the
Morphological thinning operation is finally bid out with high efficiency and pretty good thinning
quality. The minutia marking is a simple task as most literatures reported but one special case is
found during my implementation and an additional check mechanism is enforced to avoid such
kind of oversight.
For the post processing stage, a more rigorous algorithm is developed to remove false minutia
based on (Lin Hong, (1998); L.C. Jain, U.Halici, I. Hayashi, S.B. Lee and S.Tsutsui, (1999)).
Also a novel representation for bifurcations is proposed to unify terminations and bifurcations.
Figure2.2.2 Minutia Matcher; Taken from Handbook of Fingerprint Recognition by Davide Maltoni,
Dario Maio, Anil K. Jain, Salil Prabhakar.
The minutia matcher chooses any two n match well, two fingerprint images are aligned and
matching is conducted for all remaining minutia [Figure 2.2.2].
Fingerprint Image enhancement is to make the image clearer for easy further operations.
Since the fingerprint images acquired from sensors or other Medias are not assured with perfect
quality, those enhancement methods, for increasing the contrast between ridges and furrows and
for connecting the false broken points of ridges due to insufficient amount of ink, are very useful
for keep a higher accuracy to fingerprint recognition.
Two Methods are adopted in this project: the first one is Histogram Equalization; the next
Figure 3.1.1 the Original histogram Figure 3.1.2 Histogram after the
Figure 2.1.3: Histogram Enhancement; Original Image (Left). Enhanced image (Right)
Taken from Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil
Prabhakar.
Fingerprint Image Binarization is to transform the 8-bit Gray fingerprint image to a 1-bit image
with 0-value for ridges and 1-value for furrows. After the operation, ridges in the fingerprint are
highlighted with black color while furrows are white.
A locally adaptive binarization method is performed to binarize the fingerprint image. Such a
named method comes from the mechanism of transforming a pixel value to 1 if the value is
larger than the mean intensity value of the current block (16x16) to which the pixel belongs
Figure 3.2.1.
Figure 3.2.1 the Fingerprint image after adaptive binarization; Binarized image(left), Enhanced gray
image(right); Taken from Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain,
Salil Prabhakar.
In general, only a Region of Interest (ROI) is useful to be recognized for each fingerprint
image. The image area without effective ridges and furrows is first discarded since it only holds
background information. Then the bound of the remaining effective area is sketched out since the
minutias in the bound region are confusing with those spurious minutias that are generated when
the ridges are out of the sensor.
To extract the ROI, a two-step method is used. The first step is block direction estimation and
direction variety check (N. Ratha, S. Chen and A.K. Jain, (1995). pp. 1657-1672), while the
The direction map is shown in the following diagram. We assume there is only one fingerprint in
each image.
Figure 3.3.1.1 Direction map. Binarized fingerprint (left), Direction map (right);
Taken from Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil
Prabhakar.
They show the interest fingerprint image area and it’s bound. The bound is the
subtraction of the closed area from the opened area. Then the algorithm throws away those
leftmost, rightmost, uppermost and bottommost blocks out of the bound so as to get the tightly
bounded region just containing the bound and inner area.
Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one
pixel wide. (L.C. Jain, U.Halici, I. Hayashi, S.B. Lee and S.Tsutsui, 1999) uses an iterative,
parallel thinning algorithm. In each scan of the full fingerprint image, the algorithm marks down
redundant pixels in each small image window (3x3). And finally removes all those marked pixels
after several scans. (D.Maio and D. Maltoni, (1997). IEEE 19(1):27-40) uses a one-in-all method
to extract thinned ridges from gray-level fingerprint images directly. Their method traces along
the ridges having maximum gray intensity value. However, binarization is implicitly enforced
since only pixels with maximum gray intensity value are remained.
The thinned ridge map is then filtered by other three Morphological operation to remove
After the fingerprint ridge thinning, marking minutia points is relatively easy. But it is
still not a trivial task as most literatures declared because at least one special case evokes my
caution during the minutia marking stage.
In general, for each 3x3 window, if the central pixel is 1 and has exactly 3 one-value neighbors,
then the central pixel is a ridge branch [Figure 4.2.1]. If the central pixel is 1 and has only 1 one-
value neighbor, then the central pixel is a ridge ending [Figure3.2.5].
0 1 0 0 0 0 0 1 0
0 1 0 0 1 0 0 1 1
1 0 1 0 0 1 1 0 0
Figure 4.2. Bifurcation Figure 4.2.2 Termination Figure 4.2.3 Triple counting
branch
Taken from Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil
Prabhakar.
Figure 4.2.3 illustrates a special case that a genuine branch is triple counted. Suppose both the
uppermost pixel with value 1 and the rightmost pixel with value 1 have another neighbor outside
the 3x3 window, so the two pixels will be marked as branches too. But actually, only one branch
is located in the small region. So a check routine requiring that none of the neighbors of a branch
are branches is added.
Also the average inter-ridge width D is estimated at this stage. The average inter-ridge width
refers to the average distance between two neighboring ridges. The way to approximate the D
value is simple. Scan a row of the thinned ridge image and sum up all pixels in the row whose
value is one. Then divide the row length with the above summation to get an inter-ridge width.
For more accuracy, such kind of row scan is performed upon several other rows and column
scans are also conducted, finally all the inter-ridge widths are averaged to get the D.
Together with the minutia marking, all thinned ridges in the fingerprint image are labeled with a
unique ID for further operation. The labeling operation is realized by using the Morphological
operation.
The developer of Biometric ASYU system stated that the fingerprint image would be
acquired using a fingerprint sensor/scanner. Research has been conducted to find the suitable
affordable Fingerprint scanner for the system.
Developer has narrowed down the choices to two sensors from two different companies, Digital
Persona U.are.U 4500 and SecuGen Hamster Plus.
Blue LED Soft, cool blue glow fits into any environment. Provides a
pleasing presence; does not compete in low light environments,
such as restaurants, or conflict with alarm condition colors, such
as in healthcare.
Rotation invariant Touch it from any direction, it still provides a high quality image
and matching performance, perfect for shared environments.
Works well with dry, Reliable performance over the widest population of users. Reads
moist, or rough even the most difficult fingerprints.
fingerprints
(DigitalPersona, Inc. website) The 4500HD was specifically designed for business critical
applications that require a high-level of durability from fingerprint readers but still need a high
degree of accuracy. When deployed in a shared environment, fingerprint readers are commonly
subjected to harsh use and outright vandalism that can significantly reduce their performance or
break the device. To counter this, the 4500HD Reader has a super tough coating that stands up to
physical and chemical abuse while delivering unequaled accuracy and performance for hard-to-
read fingerprints.
The U.are.U 4500 and 4500HD fingerprint readers are designed for use with Digital Persona's
full range of software: Digital Persona Pro for Active Directory and Digital Personal SDKs for
your own applications.
Easy-to-use
To use, simply place a finger on the reader window and the reader quickly and automatically
captures and encrypts the fingerprint image before sending it to the Digital Persona ID entity
Engine for verification.
SDK/API is very important to invoke the functionalities of the reader. SDK comes with
simple fingerprint verification algorithm but Biometric ASYU system requires Fingerprint
Identification and the scanner SDK/API would be used only to get a row image of the
fingerprint, and then the system itself will do its job buy processing the image, extract the
features and store the template in the database.
SecuGen Hamster Plus can be used for authentication, identification and verification functions
that let your fingerprints act like digital passwords that cannot be lost, forgotten or stolen. Check
with your software provider to ensure that the software works with Auto-On.
Features
Technical Specifications
SDK/API is very important to invoke the functionalities of the reader. SDK comes with
simple fingerprint verification algorithm but Biometric ASYU system requires Fingerprint
Identification and the scanner SDK/API would be used only to get a row image of the
fingerprint, and then the system itself will do its job buy processing the image, extract the
features and store the template in the database.
Following are some features and requirement that would be related to the development of
Biometric ASYU system.
Requirements
Includes
Runtime modules
INI file
Skin modules
BioAPI sample application
User Manual
The most popular programming language in design such Biometric ASYU system are
Java, C#, Visual Basic, and MATLAB. Since C# and Visual Basic share the same .Net
framework, the developer decided to compared one of the mentioned .NET programming
language, Java, and MATLAB.
Programmers can use MATLAB in a wide range of applications, including signal and image
processing, communications, control design, test and measurement, financial modeling and
analysis, and computational biology. Add-on toolboxes (collections of special-purpose
MATLAB functions, available separately) extend the MATLAB environment to solve particular
classes of problems in these application areas.
MATLAB provides a number of features for documenting and sharing programmer’s work.
MATLAB code can be integrated with other languages and applications, and distribute
MATLAB algorithms and applications.
Key Features
2.5.3.2 Java
Java has Java Advanced Imaging which would be very useful in design such at Biometric
ASYU system that has extensive image processing programming. Sun Developer Network SDN
states that “The Java Advanced Imaging API broadens the reach of the Java platform to allow
sophisticated, high performance image processing functionality to be incorporated into Java
applets and applications”.
Java Advanced Imaging API offers unique advantages for imaging professionals
Reduce Time-to-Market:
Its easy-to-use programming model simplifies the tasks required to creating imaging
software, therefore, reducing the time to develop applications.
Network-Centric:
Because it is built on the network-centric Java Platform, developers can use this to build
collaborative applications for high-end image processing and visualization over the
network.
It offers the first Java based open-specification, cross platform, extensible imaging API,
and enabling developers to focus on creating the right applications regardless of the
disparate computing platforms.
Programs written in Java have a reputation for being slower and requiring more memory
than those written in C. (Jelovic, Dejan, "Why Java Will Always Be Slower than C++")
However, Java programs' execution speed improved significantly with the introduction of Just-
in-time compilation in 1997/1998 for Java 1.1, (Andy Patrizio (2006)) the addition of language
features supporting better code analysis (such as inner classes, StringBuffer class, optional
assertions, etc.), and optimizations in the Java Virtual Machine itself, such as HotSpot becoming
the default for Sun's JVM in 2000.
2.5.3.3 C# (C Sharp)
from the C, C++, and Java programming languages with some features of Microsoft's Visual
Basic in the mix.
C# is used to develop applications for the Microsoft .NET environment. .NET offers an
alternative to Java development. Microsoft's Visual Studio .NET development environment
incorporates several different languages including ASP.NET, C#, C++, and J# (Microsoft Java
for .NET), all of which compile to the Common Language Runtime.
Biometric ASYU system require extensive of image processing methods. .Net Framework has
The System.Drawing.Imaging Namespace that allows the programmer to interact with
images. .Net framework support different image format. all the image formats that the .NET
Framework supports. BMP is the standard image format used by Windows to store images.
Additionally, you can set the number of colors a BMP image can support. The number of bits
used to store each pixel determines the total number of possible colors that could be assigned to
that pixel and subsequently the color map of the image itself. The number of bits per pixel for
BMP files is specified in the file header and can vary from 1 to 64. Commonly used values are 1,
4, 8, and 24. BMP files are usually not compressed and therefore are not well-suited for transfer
across the Internet
The .NET framework is a toolset developed for the Windows platform to allow the developer to
interact with the host system or any external entity whether it be another process, or another
computer. The .NET platform is a Windows platform specific implementation. Other operating
systems have their own implementations due to the differences in the operating systems I/O
management, security models and interfaces.
Matlab would be the best in implementing complex mathematical algorithms but when it
comes to GUI and database connection it is not helpful as the other two. Due to mostly the
familiarity developer chose C# programming language. Detailed analysis of the chosen
programming language is in analysis chapter
The comparison made for the pros and cons between two online ordering/purchase systems as
aforementioned, has provided a clearer understanding and concept in constructing the new
system proposed in this project.
1. Profiles
Each user of the system will have a profile where they can monitor and track their
attendance summary and clock in/out.
2. Leaves
Leave function will be supported to allow the user to apply for leave and the
administration & HR will be notified to response to the leave application requested by the
user.
3. Usability
Forms will be constant with grouped functions to easily navigate from one form/function
to another, buttons and links shall be visible, and feedback to inform the users what is
currently going on or has been done.
4. Reports
Attendance record reports will be generated for all users or each user of the system and a
report of the current status of all users.
2.6 Conclusion
In summary, after done the background and history of the company and the literature
review and the comparison of the sample system. Structure for the new system is planed base
on the idea, concept which gathered in this chapter. A new technology fingerflex is able to
improve the features and user interface of this system and it might include in the future
enhancement.
Chapter 3
Methodology
3.1 Introduction
Methodology is defined as the analysis of the principles of methods, rules, and postulates
employed by a discipline and it’s includes the following concepts as they related to a particular
discipline or field of inquiry.
Fact finding is the process of using research, interviews, questionnaires, samplings and
Other techniques to collect information about systems, requirements and preferences. It is also
known as information gathering or data collection.
Fact finding is important in system planning and system analysis phases because it is during
these phases that the analyst learns about the vocabulary, problems, opportunities, constraints,
requirements, and priorities of a system.
There are seven common fact-finding techniques as below
Sampling of existing documentation, forms, and databases.
Research and site visits
Observation
Questionnaires
Interview
(General Information on Fact-Finding. Colorado University. Accessed 17 November 2008)
Computer systems developers rarely have as good an idea of how a business runs and
should run, compared with a business user,
Business users have little idea of what a computer system could achieve for them.
As a result paralysis sets in and business management time is concentrated on meeting timescales
and budgets, rather than what is going to be delivered.
3.2.1 Interviews
Goals are important information that can be gleaned from interviewing. The Facts that the
developer obtain from hard data may explain past performance, but goals project the
organization’s future. Developer may not be able to determine goals through any other data-
gathering methods.
In doing qualitative research there is often the need to conduct interviews for the purpose of data
collection.
Developer had a good understanding of the context of the situation before beginning the
interview. While both interviews conducted with YEMENI UNIVERSITY staff, the developer as
the analyst had to understand the organization and its industry setting and a clear understanding
of the objectives and aims of the research project.
Interview
The interview used a general guide and a list of topics and question. This type of interview has
the advantage of allowing an interviewer (developer) to concentrate on specific topics and issues
regarding the current staff time and attendance system.
Interview
Interview Proceeding: No 1
Interviewer Mr. Raed mohammed Mubarak
Interviewee Mr. mohammed Adnana
Position Yemen University Human Resource Manager
Location Yemen University level ground
Date & Time
Objective To understand the current work environment, the flows
prevailing in the currents systems and which would be the
possible remedies expected by the staffs.
Table 3.1 interview proceeding table
Question: What is the current method the staffs use to clock in and out? Briefly describe.
Question: What is the college policy in dealing with a staff who forgets to sign in or out from
the system?
Question: what are the procedures taken by the management if a staff clock in 10 minutes late or
clock out before the time he or she suppose to leave?
Question: Is the starting and ending time or work different from department to another?
The list of questions were asked and their answers are in next chapter in the analysis section
Survey
The main objective of this survey it to gather information which will be used for the
development of Attendance System using Fingerprint for Yemen University staff
Question
Personal Information:
38-55
Above 55
4) Your working days: (Pick the days you are working on)
Variable
Question
In your opinion the current staff attendance system (paper-based) in Yemen University is:
Excellent
Good
Satisfactory
Average
Poor
Question
What is the approximate time taken to sign in and off to record your attendance?
___________Minute(s).
Question
“Buddy punching” in manually attendance system is when somebody signs for somebody
in his/her absence. Do you agree these problems happen in the real world in such
attendance systems?
Yes No
Question
In your opinion if the “buddy punching” problem is really happening, what is the best
strategy to overcome these problems?
Using a biometric system, such as fingerprint so that the person would be validated
based on the biological structure of the finger rather than any type.
Using Card swipe, to avoid “buddy punching” an additional staff is needed to be
employed to make sure nobody misuses the system.
Using the same manual system, employ additional staff to make sure that nobody
misuses the system
Question
What do you like about the current staff attendance system? Please state two
1- _________________________________________
2- _________________________________________
Question
What do you dislike about the current system? Please state two
1-_________________________________________
2-_________________________________________
Question
Do you have any experience with any biometric user authenticating system?
Yes No
Question
Would you encourage using Fingerprint Identification staff time & attendance?
Yes No I don’t know
Question
(In the proposed system, each staff would be able to not only clock-in and out to record
the time but also to log in and to view his/her profile and report)
What would you like to see in your profile other than your attendance summary?
The purpose of this survey is to identify the requirement of the system and more specifically to
get advice on the technical aspects from the system.
The list of questions were asked and their answers are in section next chapter in the analysis
section
3.2.2 Questionnaire
Questionnaires are an inexpensive way to gather data from a potentially large number of
respondents (Bell, J (1998)). Often they are the only feasible way to reach a number of reviewers
large enough to allow statistically analysis of the results. A well-designed questionnaire was
distributed among the staff of YEMENI UNIVERSITY to gather information on both the overall
performance of the current system as well as information for the system being developed.
The questionnaire conducted and its answers are in next chapter analysis chapter.
Software engineering is the practice of using selected process techniques to improve the
quality of a software development effort. This is based on the assumption, subject to endless
debate and supported by patient experience, that a methodical approach to software development
results in fewer defects and, therefore, ultimately provides shorter delivery times and better value
(James R, 2004).The documented collection of policies, processes and procedures used by a
development team or organization to practice software engineering is called its software
development methodology (SDM) or system development life cycle (SDLC).
Rather than try to give an all-encompassing definition for methodologies that should be
classified as waterfall approaches, it easier to describe just some common
characteristics. Primarily, a waterfall methodology structures a project into distinct phases with
defined deliverables from each phase. The phases are always named something different,
depending on which company is trying to differentiate its own particular flavor, but the basic
idea is that the first phase tries to capture What the system will do its requirements, the second
determines How it will be designed, in the middle is the actual programming, the fourth phase is
the full system Testing, and the final phase is focused on Implementation tasks such as go-live,
training, and documentation.
Figure 3.1.: Steps in a typical waterfall development method life cycle (Leonid information-
systems image, 2009)
A project schedule with 20-40% of the time budgeted for the first two phases, 30-40% of
the time to the programming, and the rest allocated to testing and implementation time. The
actual project organization tends to be highly structured. Most medium to large size projects will
include a rigidly detailed set of procedures and controls to cover everything from the types of
communications to use in various situations, to authorizing and tracking change orders, to the
specific ways that defects are logged, communicated, resolved, and re-tested.
While the waterfall methodology offers an orderly structure for software development,
demands for reduced time-to-market make its series steps inappropriate. The next evolutionary
step from the waterfall is where the various steps are staged for multiple deliveries or handoffs.
The ultimate evolution from the water fall is the spiral, taking advantage of the fact that
development projects work best when they are both incremental and iterative, where the team is
able to start small and benefit from enlightened trial and error along the way.
(Behl, “Information Tech For Mgmt”, P. 467) mentions that the spiral methodology
reflects the relationship of tasks with rapid prototyping, increased parallelism, and concurrency
in design and builds activities. The spiral method should still be planned methodically, with tasks
and deliverables identified for each step in the spiral.
(Figure 3.3: Rational Unified Process image taken from IBM RUP website)
Business modeling explains how to describe a vision of the organization in which the
system will be deployed and how to then use this vision as a basis to outline the process,
roles and responsibilities
Requirements Discipline
Requirements explain how to elicit stakeholder requests and transform them into a set of
requirements work products that scope the system to be built and provide detailed
requirements for what the system must do.
The goal of analysis and design is to show how the system will be realized. The aim is to
build a system that:
Designs results into a design model and analysis optionally into an analysis model. The
design model serves as an abstraction of the source code; that is, the design model acts as
a 'blueprint' of how the source code is structured and written. The design model consists
of design classes structured into packages and subsystems with well-defined interfaces,
representing what will become components in the implementation.
Implementation Discipline
Deployment Discipline
The purpose of deployment is to successfully produce product releases, and to deliver the
software to its end users. It covers a wide range of activities including producing external
releases of the software
After analyzing the methodologies, there were reasons for not choosing or choosing a
particular methodology. Waterfall methodology is not suitable to be used for the project because
it requires the requirements of the project to be stated at an early stage. The project requirements
cannot be stated early as there is no experience in developing this kind of project and the project
is not about modifying an existing system but building a new one. Thus if the methodology is
followed, it will be a trouble if any new requirement that are found in the middle of the project as
waterfall methodology does not allow reverse back mechanism. Besides that a poor design
choice will not discovered until the final phase of testing or implementation and If mistakes are
made in the main design, it will not be discovered until the project reaches the programming
stage.
Meanwhile, since the spiral model is best to be implemented for large projects where risk
assessment expertise is highly required, it no essential of the adoption of this methodology for
the project as this is not a large project. In the other hand, the risks that might occur in the project
will not as complicated as large projects and even if a risk occurs, it can be handled.
The desktop application Biometric for attendance system for Yemen University has a
number of key criteria that a methodology must support in order for it to meet its objectives.
However, after analyzing all the methodologies it is found that RUP offers more plus points than
the other two methodologies. With the assistance of RUP it is able to effectively structure and
manage the development of Desktop applications such as Biometric attendance system for
Yemen University, focusing on the vital areas of image processing, HCI and user involvement.
However, because RUP allows for the flexible integration of other techniques, the benefits of
other methods will be used to complement it at various stages in its lifecycle.
The table showed above underlines the fact that RUP is the closest match to Desktop
application requirement. Besides that one important aspect of RUP is that it allows much
flexibility in the changing of requirement anytime unlike the waterfall methodology, as it is
impossible to identify all project requirements. RUP can be used effectively during the
Organizational Analysis stage to identify individual stakeholder requirements, and given that the
UML diagram types support the modeling of complex actor-system interaction, they will be used
during the Information Analysis stage. In addition, RUP’s entity modeling technique can be
employed during the Technical design stage to develop Biometric attendance system for Yemen
University desktop application’s underlying database and to design the user interfaces during the
HCI stage.
Another important feature of this methodology is that each iteration leads to an executable
release of the project hence there will be evidence on the progress of the project.
RUP has many advantages witch help in developing a sturdy desktop application over other
system development methodologies which are
An iterative approach helps the developer increasing understanding of the problems of Biometric
attendance system for Yemen University through successive refinement, and to incrementally
grow an effective solution over multiple iterations. This will help the developer in mitigating the
risk at early stages of system development. At any stage of the development process it is easy to
manage changes in system. This mode of development provides a higher level of reusability and
better overall quality as well.
2 - Manage requirements
Managing requirements is the primary goal of system developing process. With the help of
notions of use case and scenarios proscribed in RUP it is possible to capture functional
requirement of Biometric attendance system for Yemen University and to ensure that these drive
of the design, implementation and testing of software, making it more likely that the final system
fulfills the end user needs.
The Rational Unified Process supports component-base development. Components are not-trivial
modules, subsystems that fulfill a clear function. Biometric attendance system for Yemen
University is alienated into two main components which are Campus Entrance Clocking and
User Profiling Clocking.
Poor application performance and poor reliability are common factors which dramatically inhibit
the acceptability of today’s system. With the aid of RUP it would be easy to plan, design,
implement, execute, and evaluate Biometric attendance system for Yemen University and can
make it a reliable system.
3.7 Conclusion
Chapter 4
Analysis
4.1 Introduction
The major objective of Analysis phase of this chapter is to analyze the various researches
done by the developer and to state the finding developer acquired from it. This section includes
the discussion and analysis of the finding of the primary research conducted. The details are then
justified with the analysis of secondary research carried out by the developer including the
reasonable explanations.
There are two different but similar types of data analysis; these are Qualitative analysis
and Quantitative Analysis, below are the details of the two different types of analysis.
In order to learn the prospects of the problems facing by Yemen University staffs, the developer
conducted interview with Mr. Mohammed Adnana Human Resource Manager in Yemen
University. The purpose of this interview is to mainly understand their current work
environment, the flows prevailing in the currents systems and which would be the possible
remedies expected by the staffs. The interview proceeding along with the reason and conclusion
of each question is stated below.
Interview Proceeding: No 1
Interviewer Mr. Raed Mohammed Mubarak
Interviewee Mr. Mohammed Adnana
Position Yemen University - Human Resource Manager
Location Yemen University level ground
Date & Time
Objective To understand the current work environment, the flows
prevailing in the currents systems and which would be the
possible remedies expected by the staffs.
Question: What is the current method the staffs use to clock in and out? Briefly describe.
Answer: “Presently we just record it manually on a paper. Staffs sign in and out on a paper
which placed in a relevant point.”
Conclusion: when staffs come or leave college, they have to sign in and out on the attendance
paper manually. That attendance paper is located in a relevant place.
Reason: to know the current staffs attendance tracking and study that for the new developing
system.
Answer: “We rely on that attendance paper, the information that is collected by end of the day or
week from each department. And then we discuss that. That use to track staff attendance”
Conclusion: the staff attendance records can be viewed in the new system. Tracking the
attendance will be automatic operation instead of manually.
Question: What is the college policy in dealing with a staff who forgets to sign in or out from
the system?
Reason: to implement in the new system what action should be taken if staff does not sign in or
out.
Answer: “Usually if somebody forgot to sign in or out, we have sometime flexibility. Staffs
sometimes come and tell us they have forgotten to sign in or out previous day. We know that
staff is telling the truth because he/she attended classes and/or was around. So, normally we warn
him/her not to do that again”
Question: Is the starting and ending time or work different from department to another?
Reason: to know if the all departments have the same work starting and ending time so when
implementing the new system all departments will have fixed starting and ending time.
Answer: “It may vary from department to another. If a lecturer has part time classes for example
from 6:45 to 9:45 let’s say a lecturer has classes from. Every lecturer has to come by ‘core hours’
9:30am to 5pm even though if they don’t have classes in the morning”
Conclusion: while all departments do not have fixed time, each department’s times will be set
independently.
Reason: because the new system is going to be automatic, overtime work attendance would be
independent or integrated to the official work hours.
Answer: “Yes, some staffs work overtime and some teach classes part time at night. They fill up
the overtime log book. The staff has to verify that from Anthony’s office, when it’s signed off,
payment would be approved”
Questions
Personal Information:
5) Your job position: ________________________.
6) Department : _______________________.
7) What is your age range?
Below 18
18-27
28-37
38-55
Above 55
8) Your working days: (Pick the days you are working on)
Mon Tue Wed Thu Fri Sat Sun
Reason To know which department they are working in and days of work. And to analyze
Whether each a specific department has a specific working days
Analysis
Age Range
50.00%
45.00%
40.00%
35.00%
30.00%
25.00% Age Range
20.00%
15.00%
10.00%
5.00%
0.00%
Below 18
18-27
28-37
38-55
Above 55
Question
Your working time:
Fixed; Start at: ______ AM/PM End at: _________ AM/PM.
Variable
Reason To know if all staff in a specific department has a fixed working time.
That would help the developer to set a fixed time for each department when
registering in the system
Analysis
Sales
80.00%
60.00% Sales
76.67%
40.00%
20.00%
0.00% 23.33%
4.35%
100.00%
13.04%
80.00% 4.35%
4.35% 8:00am-12:00pm
8:00am-5:00pm
60.00% 8:00am-7:00pm
9:00am-6:00pm
8:30am-6:00pm
40.00%
73.91%
20.00%
0.00%
Fixed Working Time
Majority of the staffs work fixed time. analysis is done to see whether each
department have a fixed time but it turned out that staffs work time may vary even if
they are in the same department. Of all the staffs responded to the questionnaire and
fixed working time, 73.91% of them start work at 8:30am and end at 6:00pm.
Question In your opinion the current staff attendance system (paper-based) in Yemen
University is:
Excellent
Good
Satisfactory
Average
Poor
Reason This question would help the developer to analyze whether the staffs are happy with
the current system, in this case, the good features in the current system to be studied
and applied in the new system
Analysis
100.00% 13.33%
90.00%
80.00%
70.00% 16.67%
Poor
60.00% Average
13.33%
50.00% Good
13.33% Excellent
40.00%
Satisfactory
30.00%
20.00%
43.33%
10.00%
0.00%
43.33% of the staffs who participated and responded to the questionnaire are
satisfied with the current system. the current system is to be carefully revised for
features that could be implemented in the new system
Question What is the approximate time taken to sign in and off to record your
attendance?
___________Minute(s).
Reason To know the average time taken for a staff to clock in and out, the result to be
compare with the result of the time taken in the new system.
Analysis The average result: 2.30 minutes the time taken to clock in or out.
100
80
60 83.33%
40
20
0 16.67%
Yes
No
83.33% of the respondents think the “Buddy Punching” problem do exist in such
the current attendance system. needs for upgrade would be favorable to avoid such
a problem.
Question In your opinion if the “buddy punching” problem is really happening, what
is the best strategy to overcome these problems?
Using a biometric system, such as fingerprint so that the person would
be validated based on the biological structure of the finger rather than any
type.
Using Card swipe, to avoid “buddy punching” an additional staff is
needed to be employed to make sure nobody misuses the system.
Using the same manual system, employ additional staff to make sure
that nobody misuses the system
Reason This question is to the staff who think “buddy punching” problem do exist in the
previous question. This question is to know which of these three selected options
the best in eliminating such a problem.
Analysis
Biometric
80.00%
70.00%
60.00%
50.00%
40.00% 73.33%
30.00%
20.00%
10.00% 23.33%
0.00%
Biometric 3.33%
Swipe Card
Paper-based
73.33% of the respondents think that Biometric authentication is the best solution to
the problem.
Question What do you like about the current staff attendance system? Please state two
3- _________________________________________
4- _________________________________________
Reason To note the best the staff like about the current system, so that, it can be studied and
applied in the new system if within the scope of the project.
Analysis The abstract of the features they like is the following:
Getting evaluation from other staff
Easy and fast
Simple
Flexibility
Other staff can sign in for me
Need an ID to access
Flexibility
Convenient
Easy
Require signature of staff
“buddy punching”
Some of the above features like; easy and fast, simple, flexible, and convenient are
within the requirement of the project.
“Require signature of staff” feature will be upgraded to Biometric authentication.
Question What do you dislike about the current system? Please state two
1-_________________________________________
2-_________________________________________
Reason To note what the staff do not like about the current system, so that, it can be avoided in the
new system.
Analysis The abstract of the ….
Anybody can punch for others
Staff my sign in at different time
Manual and slow
Not accurate
Sign in time not constant
Writing manually
Not accurate
Can be misused
Can’t sign in if nobody at the counter
Not systematic
Manual
Waste time/time consuming
Not safe
Wasting Paper
Sometime my name is not there/rewrite
Question Do you have any experience with any biometric user authenticating system?
Yes No
50.00%
20.00% 40.00%
10.00%
0.00%
No
Yes
Question Would you encourage using Fingerprint Identification staff time &
attendance?
Yes No I don’t know
Reason to see whether the staff would prefer to use biometric attendance system
Analysis
Encourage Biometric Attendance System?
80
70
60 Have experience with
50 Biometric system before?
40
73.33%
30
20
10
6.67% 20.00%
0
No
Yes
I don't ...
Question
(In the proposed system, each staff would be able to not only clock-in and
out to record the time but also to log in and to view his/her profile and
report)
What would you like to see in your profile other than your attendance
summary?
__________________________________________________________
Reason To get what the staff would like to see in their profile other than their attendance
summary so they can be studied and applied to the new system if within the scope
of the project
Analysis The abstract of the ….
The overall weekly work with some notes from my boss
Who is on leave for the day
Reason for absence e.g. MC, personal reason
In practice, the meaning of the feasibility studies, in assumption are not necessarily
straight appropriate. In creative writing the terms costs and means on one hand and qualities and
objectives on the other are very closely related to feasibility.
However, in the framework of project, the terms rational and achievable are more related to the
term project feasibility. Project feasibility can be defined as the overall feasibility of a creation
project; therefore, base on these definitions, I conclude that it is important to the development of
the proposed Attendance system. And there is a need for assessment as result of the high-risk
involved in the project. Hence, I will discuss three types of feasibility that need to be put into
reflection
The term technical feasibility establishes that the product or service can operate in the desired
behavior. Technical feasibility means “achievable” (Whitten&Jeffrey, 2001).
I feel that this has to be confirmed without building the system. The proof is defining a complete
number of technical options that are feasible within known and demanded resources and
requirements. At such, I will use a standardize questions according to Shelly Cashman in his
book entitled” System Analysis and Design" in order to will help determine the state of technical
feasibility
In terms of technology availability and requirement for the development of the proposed system,
it is very feasible as it is widely available, reasonably cheap and has very low maintenance cost
requirements. The technology to be used is not a very sophisticated one. Hence, it is going to be
in consideration of the level of technical expertness among the target users which are time
attendance.
Hence, training will be required. And on the author’s part, the system will be produce in such
way that even a lay man could understand easily in view of achieving technical feasibility.
Hardware cost
Total RM 89.000
Total RM 26,250
miscellaneous
expenses
Total RM 123,250
Total RM 1.337.046.5
4.10 conclusions
I have analyzed by different types such as the Questionnaire, interview and as well as the
different kind of studies areas such as Quantitative analysis Qualitative analysis
To conclude this Chapter, It is considered very important steps to be studied before start
the design stage to build that whatever will be designed should be in the right way. This
means that the system must be designed in a way that is as user friendly as probable and
that the crossing point of the use be kept simple and efficient so as to avoid
understanding.
Chapter 5
Design
5.1 Introduction
In system design the process architecture, component, models interface and data will be
discussed furthermore all the requirement will be analyzed and documented in the form of details
such as use case, class diagram, activity diagram that can be used for strong communication. It
describes all important aspect of a system. Also it represents the system with structural and
behavioral language models and those designing modeling include the architectural mechanical
and detailed design and there is also be an entity relationship to describe the data requirement
and assumption in the system.
UML design methods are becoming the most widely used methods for computer system design.
The UML has become the standard language used in Object-oriented analysis and design it is
widely used for modeling software systems and is increasingly used for high designing non-
software systems and organizations
Use case presents a graphical overview of the functionality provided by a system in terms of
actors, their goals and any dependencies between those use cases.
The main purpose of a use case diagram for my system is to show what system functions are
performed for which actor. Roles of the actors in the system can be depicted.
«extends»
Clock Out
«extends»
«uses»
Login Password
Verification
«uses»
All
View Attendance
Record Fingerprint
identification
HR
View Staffs Report
View HR report
Manage Staff
Attendance
Manage HR
Attendance
Admin
Enhance Image
«extends»
«extends»
Analyze Histogram
«extends» Generate Template
«extends»
«extends»
Equalize Image
«extends»
«extends»
Compute orientation Exctract Minutia
Fingerprint
Processor
Binarize Image
«extends»
get probe Template
Thin Image «extends» «uses»
«uses»
Match Templates
Detect Minutia
«uses»
«extends»
Remove Tails
«uses»
«extends»
Remove pores
«uses»
Remove Dots
Class diagram in the Unified Modeling Language (UML) is a type of static structure diagram
that describes the structure of my system by showing the system's classes, their attributes, and
the relationships between the classes.
Identify Staff
* *
Confirm Clocking to Staff
Fi
gure 5.3.15Campus Entrance clocking
[HR | Admin]
[Staff]
[HR]
[Staff]
[Logged by Biometric]
Sign in
Tap thumb
Check in
Check in
Manage Staff
5.8 ERD
Fp_id image template type Fp_id image template type Admin_id Name
id
Admin
Fingerprint Admin
Fingerprint deptName
User_id
m
password startTime
1
Has m Has
firstName
endTime
1 Contains
LastName m 1 Department
User id
Status
1
isNew
Active 1
Associated
to
1 Notification
date
Gender 1
Has
m
dob m 1
photo
5.10 Conclusion
There are different software design model that exit today and all these different development
model have their own advantages and disadvantages .however in this present day the
combination of all these methodologies is integrated .timing is very essential in development and
if the days happened the at the moment could be taken over by the competitors diagrams
Chapter 6
6.1 Introduction
The purpose of Implementation plan is to take all possible steps to guarantee that the
Future system deployment and alteration occurs well, efficiently, and perfectly. The sequencing
of operation activities is just as important as it was with earlier Activities. This sequence of
proceedings should be encompass in the deployment and alteration plan part of the technical
requirement, and will address and prioritize any necessary training activities, setup activities
needed to prepare the production setting (PC/Server, are U are device , etc), and data conversion
and rationale activities. This implementation plan will define the steps for physically migrate the
system and any associated utilities to production, and for validating the accuracy and wholeness
of this migration after these steps have been performed. Proper planning and sequencing of the
Deployment can help to reduce the chance of any missteps that could result in having to restart
the deployment process, or lengthen the implementation schedule.
Testing is the process of used to evaluate software qualities such as reliability, usability,
maintainability and level of performance. Test results are used to compare the actual properties
of the software to those specified in the requirement document.
The definition of testing offered by Ilene Burnstein (2002) specified that it is a practice
concerned with achieving a high quality product, whether or not the product is a software
program. In the perspective of Biometric ASYU, quality of the desktop application will be a
quantifiable measure of how well the system meets the initial requirements, how well the system
performs functionally and finally, the level of user acceptance with regards to usability and
robustness to utilize. The various testing methods selected to evaluate Biometric ASYU are Unit
Testing, Functional Testing, Cognitive Walkthrough, Usability Testing and Compatibility
Testing. Below given the brief explanation of each testing method conducted, proposed for
Biometric ASYU
Unit testing is not a formal process and it has been completed during the development phase of
each modules of Biometric ASYU. With the short-term goal of testing concerning the detection
of defects, this method was effective as it led to the minor errors regarding data inputs and
validation. Since the problems found out during unit testing and the solution for that are depicted
previously in the Implementation only the model of the report, designed of unit testing is stated
below.
Test Date: -
Duration -
Test Objective -
- - - -
Functional Testing of Biometric ASYU is tested together with reliability testing to ensure that
the process of each module is functioning as expected and can meet the user requirement
efficiently. This method was also successful to find out that is the modules of the system are
reliable enough for publishing and maintaining delicate information. The testers chosen for
functional testing were individuals without any knowledge of the inner workings, structure or
language of the module being tested. The test reports, of the modules which found tainted during
the functional testing process is stated below.
Student
Administration
Staff
Test Date:
Duration:
Expected Result -Identify the user fingerprint template User Fingerprint image
against all the templates stored in the captured using the
database (1-to-Many). fingerprint sensor, then
processed, and build
- Check the status of the user; if the
temporary template for
status was clocked in, then clock out
identification.
the user and vice versa.
Expected Result -Identify the user fingerprint template User Fingerprint image
against all the templates stored in the captured using the
database (1-to-Many). fingerprint sensor, then
processed, and build
- Check the status of the user; if the
temporary template for
status was clocked in, then clock out
identification.
the user and vice versa.
Test Date:
Duration:
Expected Result Identify the user fingerprint template User Fingerprint image
against the templates stored in the captured using the fingerprint
database. Login process successful. sensor, then processed and
converted to a template.
Expected Result Identify the user fingerprint template User Fingerprint image
against the templates stored in the captured using the fingerprint
database. Login process successful. sensor, then processed and
converted to a template.
Actual Result Identical to the expected result The user successfully logged
into the system
6.5.3.2 Test report of functional testing (Login by Username & Password Module)
Test Date:
Duration:
1st Testing Valid username and password invoke input field obligations
“Login” Button
Expected Result Verifying the user’s username and Invalid inputs are not allowed,
password in the database and display the display error message and
appropriate menu/profile the user profile login process unsuccessful
with the “Login By Username & Password”
limited functionalities.
Actual Result Login was successful but HR user has all invalid input are allowed and
the functionalities that are provided to him error message is not displayed
if he login using his fingerprint.
Remark There was an error in the connection string The textbox validation criteria
declared which resulted in a server error have been changed and tested
2nd Testing Valid username and password invoke input field obligations
“Login” Button
Expected Result Verifying the user’s username and Invalid inputs are not allowed,
password in the database and display the display error message and
appropriate menu/profile the user profile login process unsuccessful
with the “Login By Username & Password”
limited functionalities.
Actual Result Identical to the expected result The user successfully logged
into the system
Test Date:
Duration:
1st Testing Add new user Update existing user Delete existing user
Expected -Scan the new user’s -Retrieve existing user’s -Confirm deletion
Result fingerprint then build a detail
-Delete all data
Actual Result Identical to the expected Identical to the expected Identical to the
result result expected result
Remark - - -
Figure 6.4 Test report of functional testing
Test Date:
Duration:
Actual Result Identical to the expected Identical to the expected Identical to the
result result expected result
Remark - - -
Figure 6.5 Report of functional testing
Usability testing was conducted to evaluate and ensure that the users are able to use the
system without any confusion and find it useful to them. Then volunteers from different
background were tested the system in order to determine the desktop application’s usability
strengths and weaknesses. A questionnaire was used to present the task to the users, who then be
asked to score each task accordingly. The questionnaire mainly covers four major sections of
usability testing which are system compatibility, consistency, flexibility, and minimal actions. Its
contains the sample questionnaire supplied to the ten volunteer’s from different background.
Requirement traceability matrix is used to recognize and bond the system functionalities
to the original requirement specification, in form of the user case diagram. The matrix depicted
below confirms that the entire original requirements are absolutely implemented in the Desktop
application Biometric ASYU.
6.8 Screenshots
To use the fingerprint sensor, Digital Persona Run Time Environment must be installed in
the system. To make it easier to the other end to run the system, installation of the Fingerprint
scanner RTE is done programmatically within the system. In Visual Studio 2008, a folder was
created to hold the silent setup files of the sensor RTE. In the final installed system, a folder
automatically created to hold the sensor RTE to be installed if it is not already installed. It has
setup files for 64bits and 32bits machines which would be installed automatically and silently.
Below are figures of the RTE locations in Visual Studio and the installed system (if the user
installs it)
After the path of silent install batch is stored, now it’s time to run that batch.
System.Dignostic.Process class is used to run the selected batch file. Because it’s going to install
the RTE silently, a dialog pops up as feedback to the user that installation is under processing.
Show the dialog below:
In this form,
two panels were
created; first is to hold
the user type
prompt selection and
the second the
appropriate menu based
on the user selection. The first panel looks as follow:
When one of the three login buttons is click, the above panel will disappear and the second
panel, which has the appropriate user menu, will appear. If the user clicks on Admin Login,
Admin Login panel will show up which look as follow
As shown above, the admin can login by scanner his/her fingerprint using the fingerprint scanner
or by locating his/her fingerprint image (for testing purpose only).
When running the system from Visual Studio, Admin registered fingerprint images can be found
under {Project Directory}\Fingerprint Image\Admin Fingerprint. When running it from installed
release in Program File, Admin registered fingerprint images can be found in {Program
Files}\Biometric ASYU\Admin Fingerprint Images\.
HR and Staff Login cannot browse their fingerprint image, they have to scan their thumb using
the scanner or login using username and password, which has limited functionalities. HR and
Staff Menus look as follow
In Admin case, When Admin fingerprint image scanned or located or in HR or Staff case, when
a fingerprint is scanned or username & password were provided, the system will create an object
of the abstract base class Users Abstract and depend on the user type the object will be initialize.
Admin, as assumed, has all the functionalities of the system. HR users, on the other hand, have
all except they are not allowed to manage department or any other function related to other HR
users or Admin users. Admin and HR main menu looks like the following figure except that the
top menu strip of HR main menu has limited functions
If the HR user login using his/her username & password, clocking users in or out, in the main
menu will be not available.
Staffs Main Menu shows user basic information, Clocking in or out button would be
available only if the staff login in by scanning his fingerprint. Main menu is shows below
Staff can edit their information, view weekly, monthly, or all their attendance reports. They also
can apply for leave and browse Bulletins or notifications sent by HR or admin.
Admin user is allowed to manage all users of the system; HRs and staffs. Whereas an HR user, if
logged in using his/her fingerprint, can only manage staffs. If HR users logged in using their
username & password, they will not be allowed to add new staff or update staffs’ fingerprints
templates.
The Staff Management Menu created with three containers. See the figure below
The left panel has the user functions to manage users. The left panel shows all users categorized
by department and represented using TreeView (Light Green color is department name; white is
the user name, dark green is the currently selected user). The panel on the right shows users
abstract information.
Add user: When “Add user” link label is clicked, Edit Staff Information dialog shows up as
follow;
Staff Detail Tab: filling new user Fingerprint tab: three sample to be
information; captured using the fingerprint sensor
Edit User: function can be clicked either by double clicking on the user on the right panel or
double clicking on the user on the middle panel (TreeView) or on the left panel by clicking on
the “Edit user” link label. If the user performs one of the mentioned above way for edit, Edit
Staff Form shows up filled with selected user information to be updated.
Delete User: when user click on “Delete User” link label on the left panel, system will ask for
user confirmation. See figure below
The Admin only is the one who can mange departments by adding, deleting or updating a
department. When adding or updating a department, Admin has to set the Starting and Ending
work time for that department.
Figure 6.3.5: left: list of all department. Right: adding or updating department Dialog
Leave applications are managed by admin. HR can manage staff leave applications only. If there
is an application request from a user, a button pops up when the HR or Admin login to the
system. See an example below
HR & Admin main menu checks for notifications when it starts by checking if there are new
notifications. Each notification has leave_id relationship.
Leave Application Form display leave depend on the user type. If Admin, all leaves would be
display; if HR, only staff Leave would be displayed. Staff can also view they own leave
applications. Leave Application form will display leave application depending on the user type.
HR and Admin can decide what to response to the leave applications; by accept, reject or review
the leave application. See the figure below
6.8.8 Report
Component:
Staff current status report can also be viewed by Admin and HR users. It displays all users who
are currently online (clocked in) and offline (clocked out). See an example of this below
Admin and HR manage the staff attendance record; add new, edit, and delete. For adding new
record, the staffs, who Admin or HR wants to add new record to, should be clocked out. Form
developer for managing attendance record is shown below
6.9 Conclusion
In the end of this chapter, it can be seen obviously that the system is working as we expected
after several rounds of testing and training to the users.
Even though we been through some of the errors that come up during the first round of that
testing after the implementation stage, but we tried to solve the it and perform another round
until we make sure that all the functions are working efficiency.
Implementing such a project required a lot of time consumed and must get to know all the
weaknesses to be avoid of having a sudden problem in the future.
Chapter 7
Conclusion
7.1 Introduction
To determine the degree of success of the system, the developer finds it important to
answer this question, which would give the developer a whole overview of the success of
the system.
Fingerprint Identification system is the main objective of this proposed system; thus, it
successfully identify users based on their scanned fingerprints, using Digital Persona
fingerprint scanner, with satisfied response time.
Identification of project challenges and selection of proper methods for meeting
these challenges: The challenges that the developer would be facing were successfully
identified at the preliminary stage of the project. Due to this, the developer was
successfully able to meet these challenges with solutions before it grew out to become a
major problem. Hence, the developer was able to ensure the successful creation of
Biometric ASYU by being prepared to face the challenges of the system.
Effective research work: research had been done effectively which help the user to
study and compare different algorithms in use today to implement fingerprint
identification system. and affective research to help the system as a whole.
Response from the end user; response from the end user were satisfied and that
demonstrate their satisfactory with the system.
These skills will benefit me in my future undertakings. The main air of a project for the
developer is to gain experience which will help him in future in the development of potential
software products. Although the developer has had many hurls to cross and encountered
many problems, he gained valuable skills. Success of a project also can be considered in
terms of the knowledge gained by developing the project. The project assisted the developer
in gaining immense knowledge in different areas, mainly being:
Understanding more about the human computer interaction factor that could affect the
usability of my syste
Integration with Payroll system; in the future this system could be integrated with the
payroll system.
Upgrade to run on network environment
More efficient algorithms may be applied
In the future this system will be changed and improve to become an expert system which
is capable I doing various type of decision making.
7.5 Conclusion
Most importantly, as explained earlier sections, the project has helped the developer to build up a
broader perception of how project are developed in an industrial ambiance. Meeting deadlines,
conduction interviews, analyzing observations and every other skill picked up during the period
of the itinerary as a student in YEMEN UNIVERSITY, has been successfully un-doubtfully
added value to the developer’s professional and academic proficiency & knowledge. The
developer has learnt the value of research & development and how it can be applied for real life
problems.
Generally speaking, after the completion of the project, the developer realized that it was an
indispensable experience before finally stepping off the train that is a college education onto the
platform entitled the Real World.
Books
A. K. Jain, L. Hong, and R. Bolle “On-line fingerprint verification” IEEE Trans. Pattern
Anal. Machine Intell., 19(4):302–314, 1997.
B. W. Boehm, “A Spiral Model of Software Development and Enhancement,” IEEE
Computer, 21 (May 1988), pp. 61–72.
Chitresh Saraswat, Amit Kumar “An Efficient Automatic Attendance System using
Fingerprint Verification Technique” IEEE Computer Science and EngineeringVol. 02,
No. 02, 2010, 264-269
B.G. Sherlock. D.M. Monro. K. Millard., “Fingerprint enhancement by directional
Fourier filtering,” IEE hoc.-Vis. Image Signal Processing, Vol. 141, No. 2, April 1994.
Websites
Salil Prabhakar, Anil Jain, “Fingerprint Identification” [online] march 2010, Available at:
http://www.cse.msu.edu/biometrics/fingerprint.html
MathWorks, “Perform image processing, analysis, and algorithm development”, [online]
march 2010, available at : http://www.mathworks.com/products/image/
Wiki, “Image processing”, [online] available at :
http://en.wikipedia.org/wiki/Image_processing
Keith Price's Annotated Computer Vision Bibliography
Andrew Kirillov, “Image Processing Lab in C#”, [online], july 2010, available at
http://www.codeproject.com/KB/GDI-plus/Image_Processing_Lab.aspx
Appendices
Proposal
Project background.
Other one is Image based method or matching pattern, which take account of global feature of
any fingerprint image.
The main aim of this system is to develop an accurate, fast and very efficient automatic
attendance system using fingerprint verification technique for Yemen’s university staff. The
system is proposed in which fingerprint verification is done by using extraction of one of the
techniques available and the system that automates the whole process of taking attendance,
Manually which is a laborious and troublesome work and waste a lot of time, with its managing
and maintaining the records for a period of time is also a burdensome task. For this purpose we
use fingerprint verification system using extraction of minutiae techniques.
First, when the user is to be enrolled to the system his/her fingerprint should be scanned using
the scanner and stored in the database along with his/her identity information.
There will be two modes in the system: staff mode where the staff can monitor their summarized
weekly/monthly attendance. And Admin mode where the admin can monitor all staff attendance
as well as adding, deleting, and updating staff.
Problem statements:
In many institutions and organization the attendance is a very important factor for various
purposes and its one of the important criteria that is to follow for students and organization
employees. The previous approach in which manually taking and maintains the attendance
records was very inconvenient task.
Forgetfulness : Some employees forget to complete their timesheets regularly and have to take
their best guess about when they arrived, went for lunch and left for the day. The employees or
the company may lose out.
Time Wasting. With the pen and paper method, Yemen’s university staff suffers from the
wastage of time. Staff take more time to fill the page of the paper to mark the attendance and
thereby queue used to form for just marking the presence.
Rounding up and fraud . Other employees may routinely increase their hours by rounding up
their times. They may do this without thinking, but a few minutes each day can be equivalent to a
week or so over the course of a year. This equates to a week’s pay without the work to show for
it; and if everyone in your company does the same, there’s an impact on efficiency and
profits.Signature copy and misuse leading to fraud.
Administrative headaches . Producing an accurate total for a manual employee timesheet can be
time-consuming and contentious. Employees may make mistakes, so a senior officer has to
check the figures. This officer must then explain any adjustments to the staff member in time to
meet the payroll deadline. If the employee isn’t available, the senior officer has to submit a
revised time sheet that may reduce the amount of pay the employee expects – and this is certain
to cause annoyance.
Maintenance of records. A company must keep paper timesheets in case problems arise in the
future. You may need the sheets at a disciplinary hearing, for instance. You must therefore have
secure storage, which takes up valuable office space.
Rationale:
Biometric ASYU the automated time and attendance system can solve these problems. The
hardware provides a point at which each staff must clock on and off; the timesheet software turns
the information into a simple record of attendance.
The fingerprint verification can be defined as the system that confirm the authenticity of one
person by comparing his captured fingerprint templates against the stored templates in database.
Productivity and social ties among staff will increase due to improved employee morale
and motivation from the procedural justice within the proposed system and elimination of
unethical and misconduct facilitated from the current system.
Staff won’t have to waste their precious working time only to fill the hand book and they
do not need to stand in the long queue for marking the attendance.
Due to the use of biometric technology and that each user’s fingerprint is unique,
signature copying and “buddy-punching” is impossible.
The main challenge in developing this system is implementing fingerprint verification process.
The system must get user’s fingerprint image, acquire it, process it, extract the features from it,
and create/match templates. I have to understand how image processing works and how to apply
it, writing and understanding different complex algorithms in image processing and manipulating
and understanding them to make a complete Fingerprint recognition system. The system must be
able to match a person’s fingerprint correctly and consistently. The techniques and algorithms
involved require extensive research and data gathering to be done to understand fully how the
process of verification are done and the best tools that are required to develop the system.
Finding the appropriate Fingerprint scanner device and integrate it with the system is challenging
process.
Core Modules:
Fingerprint(template) matching
Database module for storing the fingerprint images.
Enhanced function:
Additional to validating the authenticity of users and capturing the time, the system also aims to
include additional features to make the system more complete. Some such features include:
Generation of appropriate reports that are useful for the management to take appropriate
actions.
User profiling where the user can view their weekly or monthly summarize attendance
Staff management such as monitoring, adding, updating, deleting users.
Special Features:
Based on my research and if I have the time, these are the advanced features the developer is
going to develop the system that could be implement in a network environment.
Thus to complete the system, there are some limitation in the system as I will not be attempting
on:
Learning objectives
The main learning objective of this project is to research various methods of extracting features
and template matching methods in use today. This includes two broad categories: minutiae-based
and correlation based.
Therefore I need to research various algorithms used to implements the mentioned methods.
Furthermore, I also need to compare and contrast these algorithms and identify the best suited
algorithm for the selected choices
Apart from this, it is also a learning objective to study image processing methods and algorithms
such as binarization, thinning, segmentation and down sampling.
In order to implement the system, an object oriented programming languages is necessary. For
this reason I mush master one of them, I chose C#. I have to master C# in processing images,
interacting with the SDK component that comes with the fingerprint scanner in order to invoke
the functionality such as capturing image from the scanner.
Access to information/expertise
The main source of information for doing this system will be conducting interviews,
questionnaires, books, journals, whitepapers, and research papers. These resources will be
offering the necessary information to develop the system.
Besides that, various websites will also help to accomplish my goal of developing a consistent
and precise system.
Forums also assist me in accessing the information by posting questions to other members in the
forum and it is essential for knowledge exchanging among other members who are keen in
biometric and image processing. Also, the website of the scanner’s company would probably
have its own forum where users exchange their knowledge with interacting with the sensor.
Gants chart
Questionnaire
Thank you for participating in Biometric ASYU Data Gathering. Biometric ASYU is my
proposed Project as a final year project. It is proposed as a replacement to the current staff
attendance system. In the proposed system staffs would be able to clock-in and out by placing
their thumb on a fingerprint scanner instead of the current method. Besides, it allows the users to
login to the system and check their attendance and time summery reports. If you have any
questions regarding the completion of this questionnaire please contact Raed Mohammed by
phone 019-3709185 or email
raed_alawliqi@diplomats.com
1) In your opinion the current staff attendance system (paper-based) in Yemen University is:
Excellent
Good
Satisfactory
Average
Poor
2) What is the approximate time taken to sign in and off to record your attendance?
___________Minute(s).
3) “Buddy punching” in manually attendance system is when somebody signs for somebody
in his/her absence. Do you agree these problems happen in the real world in such
attendance systems?
Yes No
4) In your opinion if the “buddy punching” problem is really happening, what is the best
strategy to overcome these problems?
Using a biometric system, such as fingerprint so that the person would be validated
based on the biological structure of the finger rather than any type.
Using Card swipe, to avoid “buddy punching” an additional staff is needed to be
employed to make sure nobody misuses the system.
Using the same manual system, employ additional staff to make sure that nobody
misuses the system
5) What do you like about the current staff attendance system? Please state two
5- _________________________________________
6- _________________________________________
6) What do you dislike about the current system? Please state two
1- __________________________________________
2- __________________________________________
Section C: About the new Biometric ASYU (YEMEN UNIVERSITY Staff Time &
Attendance) system
1) Do you have any experience with any biometric user authenticating system?
Yes No
2) Would you encourage using Fingerprint Verification staff time & attendance?
Yes No I don’t know
3) (In the proposed system, each staff would be able to not only clock-in and out to record
the time but also to log in and to view his/her profile)
What would you like to see in your profile other than your attendance summary?
I would like to know your outlook subsequent to the testing of Biometric ASYU
Consistency
is the assignment of color codes conventional?
is the coding consistent across display, menu options?
is the display format consistent?
are symbols for graphic data standard?
are the user actions required consistent?
is the format within date fields consistent?
Does the confirmation feedback find consistent?
Flexibility
is the design for data entry flexible?
are the menu options dependent on context?
does it provide flexible sequence control?
If mistake were done, do you think that the system help you
to recover from it?
Minimal Actions
Does it provide default values?
Is the shifting among windows easy?
Does it require minimal steps in sequential menu selection?
does it require minimal user control actions
Is the return to general menu required only one simple key
action?
Name:…………..
Designation:………………
Signature:……………