Академический Документы
Профессиональный Документы
Культура Документы
PRESENTED BY
J.DHEERAJ REDDY (15J41A0225)
K.SUPRAJA (15J41A0228)
GUIDE NAME S.REVATHI (15J41A0252)
Mrs.Y.SUDHA
Assistant.Professor
CONTENTS
Introduction
History
Block Diagram
Working
Circuit diagram
Advantages
Disadvantages
Application
Future scope
Conclusion
INTRODUCTION
Biometric attendance system based on Aadhaar Authentication
(Fingerprints and Iris Based Authentication)
Attendance System with real time monitoring
Comprehensive MIS
Lightweight system-Does not requires any special hardware or
algorithm
Work on multiple platforms(Windows, Android, etc.) and form
factors(Laptop, Desktop and Tablets, etc.)
Robust System-Self sustained for small power cuts
Time taken to Record Attendance:
1-2 seconds on Wi-Fi
8-11 seconds on GPRS(SIM)
HISTORY
1788-Johan Mayer
noted that the arrangement of skin ridges is never
duplicated in two persons. He was probably the first
scientist to recognize this fact.
1880-Henry Fauld
working in Japan publishes fingerprints identify after case
where print was left on whitewashed wall
Rejected for Bertillon system for 20 years then adopted.
1892-Francis Galton
assigned fingerprints into 3years
Loops Whorls, and Arches
BLOCK DIAGRAM
WORKING
Attendance Request originated from the system to centralized
Attendance sever with fingerprints or iris, User ID and date/time
stamp.
Authentication response received on the centralized attendance
server. On valid authentication, attendance record stored on the
server.
Client Response from the attendance server (success/Failed)
CIRCUIT DIAGRAM
DIFFERENT TYPE OF FINGER PRINTS
DIGITAL FINGER PRINT
APPLICATIONS
Added security
Primary application being used in classroom to take the attendance
of the Students.
Decrease false attendance
ADVANTAGES
Employ cannot
Mark attendance in backdate
Mark someone elses attendance
Tracks time of entry, exit hence MIS can track
hours spent in office.
Easy online registration
DISADVANTAGES
Biometric identification machines are traditionally more expensive
to buy than traditional ones.
Some users may reject biometrics as whole, seeing it as an invasion
of privacy.
Biometric identification are not always entirely accurate.
Change in users physical or behavioral characteristics will result in
loss of access to data.
FUTURE SCOPE
Performance can be increased in terms of speed and memory.
A speaking voice alarm can be used to indicate unauthorized
person accessing the ATM.
The system can be made to communicate with moderns or mobile
phones.
CONCLUSION
Wireless sensor network are increasingly applied in the field of fire
safety and monitoring.
With the help of our proposal ,we pointed out unique advantage of
safety in signal transmission ,flexibility in network set up and low
cost.
We propose this system as a first attempt and compliment to
Indian railways fire monitoring system.