DESIGN AND IMPLEMENTATION OF A COMPUTERIZED BIOMETRIC CLOCKING SYSTEM
(A CASE STUDY OF FEDERAL UNIVERSITY OF TECHNOLOGY MINNA)
ABSTRACT
This project was born out of the necessity to address the problem encountered by the employee in the existing system (Case Study of Federal University of Technology Minna). Based on the modern improvement of employee clocking system, implementation of a new design to the old existing system exists. The manual clocking system for employee in Federal University of Technology Minna, has a lot of factors affecting it, more or less problems, which includes the delay of clocking in, poor record keeping, time and energy wastage and existence of human error. The proposed new system is an application form and server architecture in which the user interface, data access are developed and maintained independently. The proposed system’s database is implemented using Microsoft Structure Query Language Server 2008 r2, and visual basic programming language. Waterfall model methodology is used in designing the new system for the organization.This computerization of employee clocking system will make employee boast their productivity, keep tabs on them and increase the organization of records, saves time and increase the efficiency of data retrieval.
TABLE OF CONTENT
CHAPTER ONE: INTRODUCTION
1.1 Background to the Study
1.2 Statement of the Problem
1.3 Significance of study
1.4 Aim and objectives of study
1.5 Scope of study
1.6 Limitations of Study
1.7 Conceptual Definition of Terms
CHAPTER TWO: LITERATURE REVIEW
2.0 Literature Review
2.1 Overview of Biometrics
2.2 Traits of Biometrics
2.2.1 Fingerprint
2.2.2 Face Recognition
2.2.3 Iris
2.3Applications of Biometrics
2.4Significance of Biometrics
2.5Review of Related Work19
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
3.0 Introduction
3.1Analysis of the Existing System
3.2 Limitations of the existing system `
3.3 Justifications of the New System
3.4 Methodology
3.4.1 Waterfall Model
3.5 Data Collection
3.6The Proposed New System
3.6.1 Input Specification
3.6.2 Output Specification
3.6.3 Storage Design
3.6.4 Procedure Chart
3.6.5 System Flowchart
3.6.7 System Requirement
CHAPTER FOUR: SYSTEM IMPLEMENTATION, TESTING AND INTEGRATION
4.0 Introduction
4.1 Choice of programming Language
4.2 The System main menu Implementation
4.3 Implementation of the Subsystem
4.4 Query Subsystem Implementation
4.5 System Testing and Integration
4.6 The Test Plan
4.7 Test Data
CHAPTER FIVE: SUMMARY AND CONCLUSION
5.0 Introduction
5.1Summary
5.2 Suggestion for Further Work
5.3 Recommendation
5.4Conclusion
REFERENCES
APPENDIX47
LIST OF TABLES
Table 3.1: Staff Record Table
LIST OF FIGURES
Figure 1.1 Minutiae
Figure 1.2Characteristics of fingerprint
Figure 2.1 Fingerprint bitmap
Figure 2.2Normalized face
Figure 2.3 Normalized face.
Figure 2.4 Eigen face.
Figure 2.5 Image of iris.
Figure 3.1 Waterfall phases29
Figure 3.2 Flowchart diagram
Figure 3.3 Use case diagram34
Figure 4.1 Main menu of program38
Figure 4.2 Fingerprint enrolment
Figure 4.3 Saving record
Figure 4.4 Clocking
Figure4.5 Database query
LIST OF ABBREVIATION
SQL - Structure Query Language
ACM - Association of Computing Machinery
MSSQL - Microsoft Structure Query Language
DPI - Dots per Inch
FBI - Federal Bureau of Investigation
1.0 INTRODUCTION
1.1 BACKGROUND TO THE STUDY
This part presents biometrics as the engineering used to measure and dissect individual attributes both physiological and behavioural. These attributes incorporate fingerprints, voice examples, hand estimation, irises, are physiological while marks, keystrokes elements and mouse development are behavioural which are all used to distinguish human qualities and confirm character (M. Gasson, M. Meints and K.warwick 2005). These biometrics or qualities are easily associated with an individual and can't be overlooked, imparted, stolen, or effectively hacked (M.tistarelli and M. Nixon 2009). These qualities can exceptionally recognize an individual, supplementing customary security systems by giving two noteworthy enhancements: individual biometrics can't be effortlessly stolen, and an individual does not have to remember passwords or codes. Since biometrics can take care of issues of access control, extortion, burglary, more associations are considering biometrics, as the answer for their security issues.
Finger impression or finger filtering innovation is one of the most used features of the biometrics sciences and uses different peculiarities of the unique mark to distinguish or confirm the character of people. Finger checking engineering is a standout amongst the most ordinarily sent biometric innovation. All fingerprints have distinctive qualities and example. An ordinary finger impression example is made up of lines and spaces. These lines are called edges while the spaces between the edges are called valleys. It is through the example of these edges and valleys that an exceptional finger impression is matched for check and approval. These exceptional unique finger impression characteristics are termed "minutiae" and correlations are made focused around these attributes. As a rule, a common live output delivers 40 "minutiae". The Federal Bureau of Investigation (FBI) has reported that close to 8 basic minutiae can be similar to two people.
There are five stages included in finger examining check and recognizable proof: unique mark picture securing, picture handling, and area of different qualities, layout creation and format matching. A scanner takes a scientific preview of a client's special raw characteristics. This preview is kept in a unique mark database as an issue document. The principal test confronting a finger checking framework is to secure amazing picture of a unique mark. Picture quality is measured in dots per inch (DPI) more specks for every inch imply a higher determination picture. Lower DPI found available are in the 300 350 DPI, however the standard for criminological quality fingerprinting is pictures of 500 DPI. Procurement can be a real test for finger examination, since the nature of print contrasts from individual to individual and from finger to finger. A few populaces are more probable than others to have weak or hard to get fingerprints, whether because of wear or tear or physiological characteristics. Taking a picture in neglect of climate can have an influence likewise. Oils in the finger help deliver a fingerprint. In frosty climate, these oils characteristically become scarce. Pressing harder on the platen (the surface on which the finger is set otherwise called scanner) can help for this situation. Picture transforming is the procedure of changing over the finger picture into a usable arrangement. This results in an arrangement of thick dark edges (the raised piece of the unique mark) differentiated to white valleys. At this stage, picture peculiarities are distinguished and improved for check against the put away minutia document. Picture upgrade is utilized to diminish any twisting of the unique finger impression created by soil, cuts, scars, sweat and dry skin. The following stage in the unique finger impression procedure is to find different qualities. There is a decent arrangement of data on the normal unique mark and this data has a tendency to stay steady for the duration of one's life. Finger impression edges and valleys structures have unique examples, for example, swirls, circles, and curves.
Most fingerprints have a centre, a main point around which swirls, circles, or curves are blended. These edges and valleys are portrayed by irregularities known as minutiae, the different gimmick whereupon finger checking innovations are based. Numerous sorts of minutiae path way, a typical one being edge endings and bifurcation, which is the time when one edge separates into two. An average finger output may deliver somewhere around 15 and 20 details. A layout is then made. This is expert by mapping details and sifting out mutilations and false minutiae. For instance, abnormalities brought on via scars, sweat, or soil can show up as details. False minutiae must be sifted out before a format is made and is upheld diversely with seller particular restrictive calculations. The precarious part is contrasting an enlistment format with a confirmation layout.
FIGURE 1.1 MINUTIAE
Source: (Ganorkar, 2007.)
FIGURE 1.2 CHARACTERISTICS OF FINGERPRINT
Source: (Sanjay, 2007.)
Representative timing frameworks are time framework utilized by organizations to precisely record the quantity of hours worked by every worker on week by week premise (John Furnem, 2007). The clock has developed with time and the foundation still needs a framework that they can utilize worker payroll and guarantee that the workers are paid for every hour they met expectations. Today, representative utilization swipe cards with a negative stripe through an opening that peruses their name and records the time, each time they check in or out, much like the old punch clock arrangement of long back. Toward the end of a work week, the executive processes the aggregate hours worked for each representative and prints it out on a spread sheet. This frees the payroll arrangement of human mistake, making it considerably more effective.
As indicated by Jain (2004) each human has an extraordinary finger impression picture that can't be imitated. Therefore, making the unique mark innovation more proficient, reliable, simple and solid than different qualities of biometrics. It likewise obliges a genuinely little size of memory to store biometric layout. Not at all like the voice identification, amid harmattan period the representative's voice can be coarse because of chilly, subsequently adjusting the voice example and access foreswearing, same case with face identification, when the worker begins maturing or encounters skin responses like pimples it prompts a bargain in the framework. On account of mark it can be effortlessly manufactured, while retina checking is expensively arranged.
The Federal University of Technology, Minna does not make utilization of a modernized representative timing framework. The establishment sets aside a few minutes clock framework, however efficient, is not so much impeccable in light of the fact that it is sporadic. In some cases, the attractive strip on the cover of a card may get harmed on account of punch card system. At the point when the representative swipes the card, the machine may not enrol it. Such insufficiencies are amended in the machine time clock system. This venture guarantees that workers will constantly require an approach to stay informed concerning their time and associations will have the capacity to screen and record a representative's chance to guarantee greatest achievement.
1.2 STATEMENT OF PROBLEM
The problem is centered on how to design and implement a computerized employee clocking system for Federal University of Technology, Minna. From the study layout the problems discovered are; inadequacies of the manual time clock system, and easy impersonation of staff.
1.3 SIGNIFICANCE OF STUDY
The significance of the study is;
To correct the inadequacies of the manual time clock system, to regulate unauthorized entry into the building. To keep track of the time and ensure logical ways to monitor and record an employee’s time and to provide maximum productivity and cultivate punctuality of employees.
1.4 AIM AND OBJECTIVES OF STUDY
The aim of this study is to put to rest the cumbersome and hectic nature of employee time clocking system. The objectives of this study are:
1) To study the existing clocking system.
2) To develop a fingerprint identification based clocking system.
3) To test the performance of the developed system with arbitrary input parameters.
1.5 SCOPE OF THE STUDY
This study is limited to only Federal University of Technology, Minna institution to the non academic staff. Though, the scope above is in such a way that the study can be carried out in one and only one way that is, computerizing the employee clocking system. This will help to eliminate the inherent problems encountered by the management of this institution.
1.6 LIMITATIONS
The factors that militated against this study in the course of gathering facts and figures, went a long way in limiting the intended scope of this study as a result of these, setbacks were encountered.
If the surface of the finger gets damaged and/or has one or more marks on it, identification becomes increasingly hard. Also wet and dirty hands are difficult to enroll thereby producing false acceptance or rejection.
1.7 CONCEPTUAL DEFINITION OF TERMS
o Computer System Software: A set of written instruction, which the program is used to execute tasks in the system.
o Visual Basic Program: This is an object oriented programming language that is used to develop software.
o Computer: A machine is a gadget that works under the control of put away projects, naturally tolerating and putting away, handling information to deliver data that is the after effect of that transforming.
o Program: Set of instructions which are logically related in sequence and which describes actions to be taken by the digital computer in providing a solution on to a given problem.
o Software: Is the general term used to describe all the various programs that may be used on a computer system together with their associated documentation.
o Hardware: This is the general term used to depict all the electronic and mechanical components of the machine together with those gadgets utilized with the machine.
o Operation: The action carried out on an activity or process.
o Modules: This is the act of portioning software’s rationally into elements that performs specific functions and sub functions.
o Data Entry: This is the yardstick input device through which the system gets more of the instructions and commands.