Final Year Project
Final Year Project
SYSTEM
BY
1
FEBRUARY, 2023.
2
CERTIFICATION
This is to certify that this project was designed and implemented by Adewole Oluwatobiloba
Emmanuel (F/HD/20/3410010), in partial fulfilment of the requirement for the award of Higher
National Diploma in Computer Engineering.
……………………………………….. …..…………………………........
Project Supervisor
…………………………………………. …………………………………..
3
DEDICATION
I dedicate this project to the Almighty God, in whom I give thanks for making this a reality and to our
amazing parents for their unweaning support and encouragement throughout this project. I am
delighted to dedicate this project to our lecturers, especially our supervisor Engr. Yekini N. A. I also
dedicate this project to all our friends, especially my departmental mates who were always ready to
give their full support whenever it is needed.
4
ACKNOWLEDGEMENT
This is to sincerely express my profound appreciation to God Almighty for his grace, strength and
guidance needed in achieving success in our academic pursuit and project execution. We greatly
appreciate the effort and co-operation of my supervisor Engr. N.A. Yekini for dedicating his time to
discuss useful information throughout the entire project execution. He also not only guided and
encouraged me but also stood by me in making the project a success. Finally, I am thankful to my
parents for their financial supports, encouragement and prayers upon me. I really appreciate their
support and co-operation.
5
ABSTRACT
This final year project aims to design and implement a biometric attendance system for use in
various settings, such as schools, universities, and offices. The project involves the
development of a system that captures the biometric information of individuals, such as
fingerprints, facial recognition, and iris scans, to accurately record their attendance. The
system also includes a database management system that stores and manages attendance data.
The project will explore various biometric technologies and implement the most suitable one
for the project. The final product will be a secure and efficient attendance system that is easy
to use and maintain. The system's potential benefits include improving accuracy and reducing
attendance fraud.
6
TABLE OF CONTENTS
CERTIFICATION.........................................................................Error! Bookmark not defined.
ACKNOWLEDGEMENT...............................................................................................................
ABSTRACT ……………………………………………………………………………..5
TABLE OF CONTENTS................................................................................................................
CHAPTER ONE................................................................................................................. 8
INTRODUCTION.............................................................................................................. 8
CHAPTER TWO............................................................................................................... 12
LITERATURE REVIEW................................................................................................12
7
RESEARCH METHODOLOGY AND DESIGN ............................................................ 24
3.1 INTRODUCTION............................................................................................ 24
CHAPTER FOUR.............................................................................................................37
5.1. RECOMMENDATION......................................................................................... 53
5.2. CONCLUSION...................................................................................................... 53
8
5.5. DELIMITATIONS OF THE PROJECT …………………………………………….54
REFERENCES....................................................................................................................55
CHAPTER ONE
INTRODUCTION
Attendance management system refers to the to an organization’s method of tracking
employee’s time and attendance data. Using method of papers, sheets and old file system
method. For instance, a study by Walia and Jain (2016) reveal that attendance has huge
implications on the performance and growth of an organizational while a study by Talaviya,
Ramteke and Shete (2013) considers it to be having an implication on the integrity of the
security system of an organization. This approach has also been introduced to tertiary
institutions and colleges to confirm students’ attendance in classes and examination halls and
it has been in use for years. On the notable sector that is seeing growing incidences in the use
of fingerprint recognition systems is the education sector. This is because there have been a
lot of cases where students would fake their attendance (Ahmed et al., 2016). Moreover,
universities are now in need of new attendance capturing systems that are more timeous and
cost effective (Walia & Jain, 2016). Furthermore, some of the available attendance
recognition systems are considered to be old and ineffective in achieving their intended
purposes and hence pushing pressure on developers to come up with new and improved ways
of capturing student attendance (Dastidar et al., 2017). There are so many bottlenecks with
this usual and accepted method, one of such problem is the difficulty for the management to
compute the percentage of student attendance in classes and frequently modify their
information. Also in institution, tracking and monitoring student time of attendance could be
tedious task, time consuming and as well prone to errors. This research will focus on
developing Fingerprint based Biometric Student Attendance Monitoring System. The
fingerprint Biometrics is adopted in this research work for the fact it is one of the most
successful applications of biometric technology. In the manual signing processes, where
lecturer give a sheet of paper to student to write their names and signature as a form of
confirming their presence for a particular class session, falsification in student attendance
mostly occur a situation where by a student can sign on behalf of his or her colleague as
being present in the class when not true can be so difficult to prevent from happening
especially for large classes where row count can take longer time. According to Tech Target
contributor, Biometric authentication is a security process that relies on the unique biological
9
characteristics of individuals to verify they are who they say they are. Biometric
authentication systems compare physical or behavioural traits to stored, confirmed, authentic
data in a database. If both samples of the biometric data match, authentication is confirmed.
A researcher refers to Biometric as a solution for detecting user’s identity in this modern day.
Biometric identification is any automatically measurable, robust and distinctive physical
characteristic or personal trait that can be used to identify an individual or verify the claimed
identify of an individual. Biometric science utilizes the measurements of a person’s
behavioural characteristics (keyboard strokes, mouse movement) or biological characteristics
(fingerprint, iris, nose, eyes, jaw, voice pattern, etc). A form of biometric authentication,
fingerprint authentication automatically compares a user's fingerprint to a stored fingerprint
template in order to validate a user's identity. Because some parts of the human body are use
in biometrics, the issue of getting lost is not possible and for signing on behalf of another
employee is avoided in work cases. Also, utilizing biometrics in most cases can be said to be
more efficient when speed is considered and convenient than use of signing on paper method.
Using a particular person fingerprint as a form of authentication is just like using natural
physical data as a password. The benefit of using biometric authentication is that it is
absolutely distinct to each person. There are no two different individuals with the same
fingerprint, it is difficult and impossible for one another to have the same fingerprint, and
fingerprints from different people can never be the same. Infiltration is very hard to come by
due to the fact that other people will not be able to use their biometric for someone else.
Although using biometric authentication, comes with few disadvantages like if a person could
have access to scan another person fingerprint, that scan has the capability to trick the Touch
ID system. Hence, a criminal can have access to one’s information that requires
authentication using fingerprint.
10
Inconsistency in data entry and generate errors
Time consuming and costly to produce reports
Entry of false information
Lack of security
Duplication of data entry
11
This project focuses on the designing and implementation of biometric based attendance
system that takes and record the attendance of employers, staff, students or anybody in an
organization or where attendance is been taken. This facility can be used by students in order
to enter their attendance. This project on Biometric attendance system will be utilized in
Yaba College of Technology in order to make attendance recording easier in their various
classrooms. Also, it can be utilized in the examination hall during the school exams to ease
the process of attendance recording. This system provides high level of security whereby
making it impossible for imposters and impersonators in making their ways to class or
examination hall. The System using fingerprint Biometric will keep historical data making it
easy for the lecturers to access and grade students. A dedicated server is maintained for
attendance purpose and every time when a student places his/ her fingerprint on the sensor it
identifies the particular student and attendance is updated on the server. The system is found
to reduce the burden of manual work and also saved the time. Every organization whether it
be an educational institution or business organization, needs a better attendance management
system for students and staffs so that records be maintained with ease and accuracy was an
important key behind motivating this project. This would improve accuracy of attendance
records because it will remove all the hassles of roll calling and will save valuable time of the
students as well as teachers. The scope of this work is to develop a Fingerprint Based Student
Attendance Monitoring System that will improve how attendance management is done by
using fingerprint as a form authentication for proof of attending a class.
12
CHAPTER TWO
LITERATURE REVIEW
2.1 RELEVANCE OF BIOMETRIC ATTENDANCE SYSTEM
High Accuracy: Regardless of any other feature that a biometric attendance system can give,
the capability to directly keep track of attendance might be worth the cost of admission alone.
Thanks to a wealth of different possible biometric labels, it's intolerably delicate for anyone
to fake their attendance. In spite of that, biometric attendance systems allow you to keep track
of any number of people contemporaneously without error or shenanigans.
Eliminates Time Theft: This is also one of the big benefits that a biometric attendance
system offers, and it should not be understated how impactful and useful it can be in the case
of time theft. Even if your employees intend to be upstanding and honorable, people are
imperfect and there will eventually be various occasions where accidental time theft occurs.
Of course, not everyone is as forthright or can be truthful as the best of us, so being able to
identify and stop intentional timesheet fraud is arguably more important. Not only will
stopping malicious time theft save you money, but it will help shape company culture by
demonstrating that there are consequences for bad behavior that can stop the next per son
from trying the same.
Trustworthy Data: The data gathered from a biometric time and attendance system is live
and honest. You have access to the data at any time. It enables you to generate quick reports
and be informed on the attendance of the students or employees. Live and legitimate
information get assembled by the biometric time and attendance framework. Therefore, there
can hardly arise any troublesome processes or issues in verifying attendance in the
workplace, classroom or any organization that it is been used. Also, one can access the data
anytime, anywhere as per the need. Biometric time and attendance thus empower the
lecturers to produce speedy reports, at the same time caution you to issues that need
immediate attention or focus of the management or class.
13
sigh of relief. All that is needed of the students, is their fingerprints on the device. Attendance
records are also easily maintained without the need to store heavy registers and spreadsheets.
During any report of any kind, the time used in gathering or accumulating these heavy
registers will be shortened because the records have been saved on the device and it can be
accessible anytime.
Government
The application of biometrics within the government sector like national ID card, correctional
facility, driver’s license, Social Security, welfare disbursement, border control, and passport
control. Traditionally within the government, they need used token-based systems examples
ID cards and badges which are been given to people or the workers to put on. The govt.
founded a central database of biometric data, like fingerprints and digital passport
photographs of all foreign nationals who apply for residence or are already residing in their
nations. Maintaining a central database would prevent people using another person’s identity
or using false documents to get permission to reside, work or study in their nation.
Fingerprints would be used to match immigrants to their personal identification data and
documentation. Foreign nationals who apply for a residence permit would be required to
produce fingerprints and a passport photograph once, after which their identity may well be
checked against that data using fingerprint scanning and biometric authentication for
comparison. The biometric data would be stored during a central databank and on a chip on
the residence permit. This Method makes it easier to be utilized and accessed by various
public authorities, as an example, the immigration agency when expelling illegal immigrants
and therefore the Custom Agency when incarcerating criminals. The database would also
make it easier for the Immigration agency, the Police and embassies to test the identity of
foreign nationals and thus prevent identity fraud. Foreign nationals themselves also stand to
profit, because the use of biometrics could prevent their falling victim to fraud, which may be
a heavy problem in numerous nations. Biometric systems work within individual agencies,
producing a spread of security and facilitation benefits. The utility of biometric systems may
14
be enhanced through the power, where reasonably necessary, to share biometric data between
agencies and to verify data against other agency holdings. Enhancing the interoperability of
biometric systems can significantly assist in addressing national security and criminal threats
and offer new opportunities for enhanced service delivery. These benefits are going to be
realized through greater opportunities for the lawful sharing of biometric information and
biometric capabilities between governments and greater collaboration on biometric system
development.
Commercial
In this area, biometric is usually applicable for logging in to an electronic network, electronic
data security, e-commerce, Internet access, ATM, Mastercard, physical access control,
mobile phone, PDA, medical records management, and distance learning. The power to spot
a customer had greatly affected trading, as a part of a general group or specifically.
Monitoring the attendance of employees becomes a really easy task as employee can put
down and out the time they get or leave the office using iris scan or thumb print. There are
plenty of biometric solutions available within the market today and more are still within the
course of development. Access control to computer systems (workstations) USB fingerprint
readers, voice and face recognition software using standard camera and microphone hardware
etc. Time and attendance management in institutions are all biometrics. the issues generally
related to time registration and attendance management are peculiar to those encountered
with access control. There are some systems employed today that performs identification
through the employment of pin code or badge, but this approach is often easily compromise
by users. Some employees can misplace their badge or forget their pin code. Also, some
employees can engage the service of their colleagues who gets to work early to use their pin
or badge to the system. Adopting biometric for time registration or attendance management
avoids deceiving the system by users and also reduces overhead for engaging security
personnel when badges are lost or pin codes forgotten. Biometric is extremely useful in
institutions especially during classes, tutorials, laboratory sessions and examination during
which heavy security are normally deploy to validate student’s identity so as to cob
imposters, with the utilization of biometric System the quantity of security personnel are
greatly reduce. (Mr. John Mashurano, 2013)
Forensic
15
In forensic, biometrics is in use for corpse identification, criminal investigation, terrorist
identification, parenthood determination, and missing children. The cost of such
implementations of biometrics is very high and for existing surveillance systems the success
rates vary. The police agencies have used fingerprinting as a means of identifying criminals
for well over a hundred years. Police gain the most benefit because a criminal’s biometric
information such as fingerprints, mugs hot, DNA, etc., may already be held in a database.
This enables forensic information collected at a crime scene to be matched against it. An
Automated Fingerprint Identification System is designed to enable a fingerprint to be
matched extremely quickly against a large number of records in a criminal database. To do
this effectively it will always hold encodings of all fingers of criminals that have been saved
on the database of the police. Biometrics is also used for security in places like churches
where people are been search and take biometrics data before entering in order to prevent
tourist, schools for students during examination or their classes and also for investigation
where suspects are been examined and collection of evidence, in which the evidence are been
matched and identify the deceased using biometrics. (Boulgouris NV, Plataniotis KN,
Micheli-Tzanakou E, 2010)
Sign-in sheets: The most basic form of time and attendance tracking is using a handwritten
sign-in sheet with a calendar. Most of the time, employees will sign into and out of their
shifts by hand by noting the time and date on the page. Of course, this is the cheapest option
when it comes to time and attendance tracking systems. But it is also the riskiest, as it is very
16
prone to error and time theft. If an employee or student arrives or chooses to leave, they must
write down the time in the attendance book. It usually has their name, time of arrival, and
signature too. (Kiran Bajpai 2021)
17
verifying a user's (employee's) identity. Consequently, users are identified by their biometric
characteristics alone, without the use of smart cards, usernames, or other identification
methods.
18
template into a database. Subsequently, when there's need for verification of a private, a
replacement physical feature is captured and compared against the template stored from an
information source. Using biometrics for recognizing users offers some extraordinary
favourable circumstances because only biometrics can recognize a private as himself or
herself, biometrics could make keys and combination locks could end up to not be useful
thanks to biometrics and every one data, including biometrics is vulnerable whether in
storage or in processing state (Kadry, Smaili, 2010)
Retina Scanner: These scans are the distinct biometric feature/pattern in each individual’s
iris, and compares it with a specific number of distinct recognizing patterns which distinguish
each individual separately from people. during a retinal scan, at the rear of the attention, a
biometric format is formed by recording the patterns of capillary blood vessels. biometric
identification may be allotted remotely utilizing a high-resolution camera and formats
generated by a method just like that of biometric authentication. Biometric authentication and
identity verification are both won’t to distinguish someone as indicated by their distinct
pattern. Despite their efficiency, implementing them is more costly and complicated. The
retina of soul may be a thin tissue constituted by neural cell which is found within the
posterior portion of the attention. The composite structure of the capillaries that offer the
19
retina with blood makes the retina of every individual distinct. There are cases where by
retinal patterns is also modified for people full of diabetes, glaucoma or retinal degenerative
disorders, however, the retina generally is permanent from child birth till death. Considering
its distinct and permanence feature, the retina happens to be the foremost accurate, authentic
of all the biometric except DNA. Its accuracy level has been concluded by advocates of
biometric authentication that its error rate is estimated one in an exceedingly million (Homer,
Schell, 2012). A biometric identifier called a retinal scan is employed to represent the distinct
patterns of a personality's retina. The blood vessels within the retina can promptly absorb
light over the subordinate tissue and might be recognized more easily within the presence of
lighting. A retinal scan is performed by absorbing an unperceived beam of low-energy
infrared emission into a person’s eye as they appear through the scanner's eyepiece. This
beam of sunshine draws an identical pattern sort of a path on the retina. During the scan
process, the whole reflection differs because of the absorbent nature of retinal blood vessels
of that light than other a part of the attention. The format of the variations from the scanner is
translated to coding system and stored in an exceedingly database. (Kadry S. and Smaili M,
2010)
Iris Scanner: Iris scanning is an automatic method of biometric authentication which uses
mathematical pattern-recognition techniques on video images of the iris of a person’s eyes,
whose complex random patterns are distinct and be spotted from a far range. Digital formats
which are said as template are converted from these patterns by using mathematical and
statistical algorithms which permit the identification of a personal or someone trying to
impersonate the legitimate person. Globally, there are variant individuals in such a large
number of countries that are enrolled into the iris recognition systems for the aim
convenience in passport-free automated border-crossings, and a few national ID systems
supported this technology are being deployed. the many advantages of iris recognition, other
than its utmost resistance to false matches and speed, is that the stability of the iris as an
inside, protected, yet externally visible organ of the attention. The major feature that depicts
iris of the attention because the most ideal and accurate section of shape for biometric
recognition is that it's an indoor organ which is healthier guided from damage and wear by
extremely sensitive and transparent membrane (cornea). This characteristic makes it more
better choice to fingerprint, which may be difficult after years of rigorous involvement in
some labor. The iris is usually flat, and its geometric configuration is simply controlled by
two complementary muscles (the sphincter pupillae and dilator pupillae) that control the
20
diameter of the pupil. This makes the iris shape much more predictable than, as an example,
that of the face. The iris incorporates a fine texture that like fingerprints is set randomly
during embryonic gestation. just like the fingerprint, it's very hard (if not impossible) to prove
that the iris is exclusive (Christine, Modi, 2008).
Fingerprint Scanner: When considering the value of identification scanners available within
the market today, fingerprint scanning is often on the lower end. There are some fingerprint
scanners that may only scan the particular print while the more expensive scanners can
capture the form and size of the thumb, presence of blood within the fingerprint and other
physical characteristics on a finger. The expensive scanner can capture a 3D image of the
fingerprint which successively makes it tougher for such fingerprint to be duplicated. the
method of acquiring image by the scanner is either though capacitance sensing or optical
scanning. Generation of biometric templates relies on matching minutiae characteristic
features in fingerprints. The examining of fingerprints for the aim of generally requires the
comparison of such a large number of features of the print format. These comprise of patterns
which are aggregated features of ridges and also the minutia points, that are distinct features
found within this pattern. Knowing the attributes of human skin and structure is paramount to
successfully utilize a number of the technologies of imaging.
Fingerprint sensors: A fingerprint sensor is an electronic device use to capture a digital image
of the fingerprint pattern. The image captured from the sensor is mentioned as a live scan,
which successively is processed digitally to develop an accumulation of extracted features
(Biometric Template). This template is stored in a very database and utilized for matching.
Facial Biometrics: The image or video of a person is mostly views by the facial biometrics
devices and so compares it to the template stored in database. when matching is being done
out by the facial biometrics, it compares the ratio, shape and structure of the face, the interval
between the jaw, top outlines of the attention sockets, the perimeters of the mouth, eyes,
mouth, nose, the region of the cheek bones and therefore the positioning of the nose and eyes.
(J.Chandramohan, 2017). A new method in face recognition uses the visual details of the
skin, which is captured in standard digital or scanned images. this system is noted as skin
texture analysis, which turns the distinct patterns, lines, and spots obvious in an individual’s
skin into a space. Facial biometrics is extremely good when being utilize for facial
authentication than for identification purposes, thanks to the very fact that a private face can
have a physical damage or altered, disguise with a mask, etc. Environment also can affect the
21
camera during the method of capturing. Facial biometrics has been confirmed as a technique
which will improve validation and authentication of users tremendously.
Dr. B. Chellaprabha et al. (2016), in their article entitled “A Fingerprint based Attendance
Management System using GSM” This System represents an analysis of different
technologies which are used for taking attendance system. Traditionally students’ attendance
is taken by professor and it will take too much time of lecture. More proxy attendance can be
recorded in manual system. This can be replaced with computerized system. In proposed
system attendance will marked using Fingerprint Recognition. And it will verify the student
which will eliminate the proxy attendance. This system can be implemented for better results
regarding the management attendance. This system will save time, decrease the amount of
work the administration has to do.
Seng Chun Hoo and Haidi Ibrahim (2019), in their work entitled “Biometric-Based
Attendance Tracking System for Education” It remains a challenge for choosing suitable
types of hardware to design a biometric-based attendance system. There are various types of
microcontroller boards, biometric sensors, communication channels, database storages, and
22
other components for researchers to select based on their own needs and requirements. For
microcontroller, 80C51 and PIC were initially used in between the years 2010 and 2014,
followed by ATmega since 2014. After that, in 2016, ARM became popular and started to be
used widely in attendance systems. Basically, 80C51 and PIC are selected for the low
processing task, such as iris and fingerprint recognition, while ATmega and ARM are suited
for tasks with higher processing capability, for instance, face recognition. The choice of
sensor depends on the captured biometric trait.
Ekhlas Ghaleb Abdulkadhim (2021), in his work entitled “Design and Develop an
Attendance System Based on Fingerprint and Arduino Board” In the modern era, there has
been remarkable advancement in information systems and communications technologies.
Fraud could be identified using several technologies, one of the most effective of which is the
biometric technology. In this study, we proposed a fingerprint-based attendance system to
improve detecting the fingerprints of students and employees.
Sifatnur Rahman et al. (2018), in their work "Automated Student Attendance System using
Fingerprint Recognition" There are some limitations of the fingerprint technology. These are
the inability to enroll some users for poor fingerprints. For these cases one need to consider
another biometric feature. Also, it can suffer some small changes along the time. To
overcome this problem, the system may be necessary to re-enrol the fingerprint and/or use
multiple fingerprints enrollment. The system needs to deploy specialized devices for
fingerprint enrollment. In future this project can be extended to store fingerprint databases on
the remote server that can be used over world-wide. A website will be hosted on the server
for online access to attendance reports. The proposed system has been developed using C#
programming paradigm platform. The proposed system can be implemented for all classes of
the university if sufficient funds will be provided to us.
23
Devendra Kumar Yadav et al. (2015), in their study entitled “Fingerprint Based Attendance
System Using Microcontroller and LabView” Here in this project we have tried to automate a
classroom attendance procedure by using a fingerprint recognition module interfaced with
8051 microcontrollers. A fingerprint recognition system can be used for both verification and
identification. In verification, the system compares an input fingerprint to the “enrolled”
fingerprint of a specific user to determine if they are from the same finger (1:1 match). In
identification, the system compares an input fingerprint with the prints of all enrolled users in
the database to determine if the person is already known under a duplicate or false identity.
D. U. Onyishi et al. (2021), in their work entitled "Design and Implementation of a Biometric
Students’ Time and Attendance Logging System" Fingerprint enrollment mode entails the
initial acquisition and registration of the student’s fingerprint template. The RS305
Fingerprint module initially scans the student’s Fingerprint. The finger biometric template is
then extracted from the scanned fingerprints and stored in a register in the RS305 module.
The Atmega328P which is connected to the RS305 senses that a template has been stored and
then sends a signal to the Personal Computer (PC) software to notify it that a template has
been saved. This process is then repeated for each student until all the student’s fingerprint
template has been extracted and stored.
According to Jiexun, Wang and Chen (2011) as quoted in the research work of Oloyede et al.
(2013), the origin of biometrics has been in the public sector; however, biometrics is used for
the identification and verification of criminals. Other sectors where biometrics has also
thrived are the Banking, Education and Health sectors. For example, emerging application
markets include biometrically enabled transactional payment solutions and biometrically
enables wireless for business use. Oloyede et al. (2013) carried out extensive research on
applicability of biometric technology to solve the problem of staff attendance. However, the
researchers did not write any software to address the problems of attendance.
24
CHAPTER THREE
3.1 INTRODUCTION
This chapter gives the overview on how the step-by-step process used in the assemble and
development of the design. This includes the hardware and the required interfacing
programming. This section will briefly discuss the components and materials used.
25
The new system is going to deal with the limitations of the existing system by; keeping
historical data that makes it easy for lecturers to access and grade students, providing high
level of security whereby making it impossible for imposters and impersonators in making
their ways to examination halls. The system will allow the lecturer to monitor each student
attendance, track down truants and take the appropriate action and reduces the stress in
queuing up which result in delay and often time in the damage of the attendance sheet. The
new system will provide user friendly interface which will help to guide each user to use it
correctly without any specialized training.
26
CIRCUIT DIAGRAM OF THE PROPOSED SYSTEM
27
FLOW CHART OF THE SOFTWARE PROGRAM
The working of the Fingerprint Sensor Based Biometric Attendance System. In this project,
we have used a DS3231 RTC Module for time & date display. We used 1 LED for power
indication, and 1 buzzer for different function indications. We have interfaced 16*2 LCD
which displays everything whenever the finger is placed or removed, or registering
attendance or downloading data. We have used 4 push buttons which are used to control the
entire system. The functions of each button are:
1. Register/Back Button – Used for enrolling new fingerprints as well as reversing the back
process or going back
28
2. Delete/OK Button – This Button is used for deleting the earlier stored fingerprint system as
well as granting access as an OK selection.
3. Forward Button – Used for moving forward while selecting the memory location for
storing or deleting fingerprints.
4. Reverse Button – Used for moving backward while selecting memory location for storing
or deleting fingerprints.
29
done based on the functions that our design system most possessed and not only that, the
durability and reliability of each component were also considered. The components are:
Arduino Uno, R305/R307 Fingerprint Sensor, DS3231/DS1307 RTC Module, 16x2 LCD
Display, Potentiometer 10K, Push Buttons, Buzzer 5V, LED 5mm (Red)
Arduino Uno
The Arduino Uno is an open-source microcontroller board based on the Microchip
Atmega328p microcontroller and developed by Arduino.cc and initially released Arduino.cc
in 2010. The board is equipped with sets of digital and analogue input/output (I/O) pins that
may be interfaced to various expansion boards (shields) and other circuits. The board has 14
digital I/O pins (six capable of PWM output), 6 analogue I/O pins, and is programmable with
the Arduino IDE (Integrated Development Environment), via a type B USB cable. It can be
powered by the USB cable or by an external 9-volt battery, though it accepts voltages
between 7 and 20 volts. It is similar to the Arduino Nano and Leonardo. The hardware
reference design is distributed under a Creative Commons Attribution Share-Alike 2.5 license
and is available on the Arduino website. Layout and production files for some versions of the
hardware are also available.
30
such as ARM, DSP and other serial devices with a connection, 3.3V 5V microcontroller can
be connected directly. Needs to connect the computer level conversion, level conversion note,
embodiments such as a MAX232 circuit.
31
This Chip clock/calendar can provide seconds, minutes, hours, day, date, month, and year
information. This IC clock operates in the format of either the 24-hour or 12-hour with
AM/PM indicator. The end of the month date is automatically adjusted the months which has
less than 31 days. It can corrections for leap years.
32
pixels within this LCD can be calculated as 32 x 40 otherwise 1280 pixels. In LCD 16×2, the
term LCD stands for Liquid Crystal Display that uses a plane panel display technology, used
in screens of computer monitors & TVs, smartphones, tablets, mobile devices, etc. Both the
displays like LCD & CRTs look the same but their operation is different. Instead of electrons
diffraction at a glass display, a liquid crystal display has a backlight that provides light to
each pixel that is arranged in a rectangular network.
Every pixel includes a blue, red, green sub-pixel that can be switched ON/OFF. Once all
these pixels are deactivated, then it will appear black and when all the sub-pixels are
activated then it will appear white. By changing the levels of each light, different colour
combinations are achievable. This article discusses an overview of LCD 16X2 & it’s working
with applications.
33
Push Buttons
A push-button (also spelled pushbutton) or simply button is a simple switch mechanism to
control some aspect of a machine or a process. Buttons are typically made out of hard
material, usually plastic or metal.[1] The surface is usually flat or shaped to accommodate the
human finger or hand, so as to be easily depressed or pushed. Buttons are most often biased
switches, although many un-biased buttons (due to their physical nature) still require
a spring to return to their un-pushed state. Terms for the "pushing" of a button
include pressing, depressing, mashing, slapping, hitting, and punching.
Buzzer 5V
Buzzer that operates around the audible 2kHz range. You can drive it directly from a 5V PIC
or Arduino to generate the tones.
34
3.6 SOFTWARE DESIGN OF THE PROPOSED SYSTEM
The major software part of the Finger print attendance system is the graphics designed
interface to take in the data from the Arduino, monitor and manage the database of the
proposed finger print attendance system. The design of the interface consists of the features
needed to control the operation of the system and the interaction. These features are;
Dashboard: The dashboard is to display the information about the ID registered, number of
ID registered, and system time. The Software used and Requirements for this project include:
Operating system: Windows O.S and C Programming Language
35
be a procedural language program which specifies a series of steps for the program to solve
the problem. A procedural language breaks the program into functions, data structures, etc. In
C, variables and function prototypes must be declared before being used. A structured
programming language is a subset of the procedural language. Structure means to break a
program into parts or blocks so that it may be easy to understand. In the C language, we break
the program into parts using functions. It makes the program easier to understand and modify.
C is considered as a middle-level language because it supports the feature of both low-level
and high-level languages. C language program is converted into assembly code, it supports
pointer arithmetic (low-level), but it is machine independent (a feature of high-level). A Low-
level language is specific to one machine, i.e., machine dependent. It is machine dependent,
fast to run. But it is not easy to understand. A High-Level language is not specific to one
machine, i.e., machine independent. It is easy to understand.
3.6.2.1 Programming
These different parts of the system represented the different layers of an application. This
included coding an interface for receiving the user database(input), creating a python script to
pass the database data to the database, and program a system where the parameters from the
python file could be read and executed. For the programming, we used Arduino IDE and
create a new file using terminal (sudo nano fingerprint attendance.py). first we Import
Arduino, then we set numbering of pins according to BOARD pin numbers and also define
some pins as input or output thou this required for a single sensor.
#include<SoftwareSerial.h>
SoftwareSerial fingerprint(2,3)
#include "Adafruit_Fingerprint.h
uint8_t id;
Adafruit_Fingerprint finger = Adafruit_Fingerprint(&fingerPrint);
finger.begin(57600);
uint8_t getFingerprintEnroll()
{
int p = -1;
delay(2000);
while (p != FINGERPRINT_OK)
{
36
p = finger.getImage();
switch (p)
{
case FINGERPRINT_OK:
// Serial.println("Image taken");
break;
case FINGERPRINT_NOFINGER:
// Serial.println("No Finger");
break;
case FINGERPRINT_PACKETRECIEVEERR:
// Serial.println("Communication error");
break;
case FINGERPRINT_IMAGEFAIL:
// Serial.println("Imaging error");
break;
default:
// Serial.println("Unknown error");
break;
}
}
37
CHAPTER FOUR
The implementation of the finger print attendance system using Arduino uno basically
depends mostly of the hardware unit which where the major processing and control of the
system.
The implementation of the system hardware is first implemented on the bread board then
tested to verify the functioning of the system hardware before the implementation on the
printed circuit board (PCB). The following steps were taken to realize the complete
implementation of the hardware.
The first step taken for the hardware implementation is the placement of the Arduino Uno
controller.
In this step the LCD screen has 16-terminals and out of the 16-terminals we made use of only
12-terminals. The 12-terminals are labelled as follows
Pin1=VSS(Ground)
38
Pin2=VDD(+5Volts)
Pin3=VE (Contrast V)
Pin6=Enable
Pin11=Data Pin4
Pin15=LED Positive
Pin16=LED Negative
The input connection of the LCD Display to the main circuit board is shown below
The LED Positive and LED Negative are both connected to the same power source that is
powering the finger print sensor which comes from the microcontroller board
6-terminal pins are connected to the microcontroller and the remaining 4- terminal pins are
connected to the GND and Vin coming from the microcontroller (i.e. 3-terminal are
connected to the GND coming from the microcontroller and the remaining last terminal is
connected to the Vin(5V) coming from the microcontroller.
39
4.1.3 PUSH BUTTONS UNIT PREPARATION IMPLEMENTATION
The connection of the push buttons is connected directly to the Arduino Uno board at the
Analog In port on the board. The push terminals vary from different models; some have four
terminals but standardly they have 2 terminals.
One terminal of the push buttons is connected to the GND of the circuit while the other
terminal is connected is connected to the Arduino Uno board at the Analog in port of the
board which are A0, A1, A2 and A3 respectively.
The action each push button differs from the others in the sense that each button performs a
different task depending on how they are used. The action of the 4 push button which are
used to control the entire system is as follow:
Register/Back Button– Used for enrolling new fingerprints as well as reversing the
back process or going back.
Delete/OK Button – This button is used for deleting the earlier stored fingerprint
system as well as granting access as an OK selection.
Forward Button – Used for moving forward while selecting the memory location for
storing or deleting fingerprints.
Reverse Button – Used for moving backward while selecting memory location for
storing or deleting fingerprints.
40
41
4.1.4 DS3231/DS1307 RTC MODULE UNIT PREPARATION AND
IMPLEMENTATION
The connection of the real time clock to the main circuit board is done at the input terminal
connection of the analogue in of the Arduino Uno. The RTC module has 6-terminals which
2pins are not compulsory to use, it has mainly 4 pins in which the four pins are given out on
the side of the module sharing the same name, and they are labelled as follows VCC, GND,
SDA (serial data pin (12C interface)), SCL (serial clock pin), SQW and 32K.
The input connection of the RTC module to the main circuit is as follows
The VCC terminal is connected to any point with 5V source linked to the port labelled
5V on the microcontroller (Arduino Uno).
The GND terminal is connected to the main circuit board ground (GND) linked to the
port labelled GND on the Arduino Uno.
The SDA terminal is connected directly to the microcontroller which the port on the
Analog in port (i.e. A4) of the Arduino Uno
The SCL terminal is connected directly to the A5 port on the Analog In port on the
Arduino Uno.
42
4.1.5 IMPLEMENTATING THE FINGER PRINT MODULE
In this step, the finger print module has a 6–terminal for input control and of the 6-terminals
1-terminal to give the sensor a 3.3v to the sensor instead of 5v, naturally 1-terminal for the
common ground and the last pin for a regulated 5v DC. The input terminal is labelled VCC
(5V), GND, TXD, RXD, TOUCH, Vin(3V). The connection of the finger print sensor is done
by connecting the finger print sensor terminal to the finger print port on the main circuit
board. The finger print terminals are labelled as mentioned before as Vin, GND, TXD, RXD,
TOUCH respectively. The finger print sensor is connected to the Vin and GND of the
microcontroller (Arduino Uno) to power the sensor while the remaining terminals are
connected to the microcontroller (Arduino Uno) to the main circuit board. The connection is
as follows.
The RXD terminal of the finger print sensor is connected directly to the -3 port on the
microcontroller (Arduino Uno).
The TXD terminal of the finger print sensor is connected directly to the -2 port on the
microcontroller (Arduino Uno).
The VCC terminal of the finger terminal is connected to any point with 5V source
linked to the port labelled 5V on the microcontroller.
The GND terminal is connected to any point on the main circuit board grounded
(GND) linked to the port labelled GND on the Arduino microcontroller.
43
44
Base on every step of the hardware implementation, the connected hardware is being tested
before another component is connected. The successful testing of each connected hardware’s
leads to connecting component to the completion or the implementation of the system
hardware. The expected result is gotten when conducting those tests. During the testing
exercise, a multi-meter is used to measure the voltage power rails entering every component
to ensure the appropriate distribution of the power to every component.
45
4.2 SYSTEM HARDWARE UNIT TESTING AND RESULT
The system testing carried out is conducted on both the implemented system hardware and
software. Below tables shows the list of testing and the results of the test conducted.
47
Table 4.2: System Software Unit Testing
The packaging of the Fingerprint attendance system using Arduino Uno was done with a
plastic (PVC) square container of length 22cm and breadth 12cm. The LCD display unit is
mounted in slant position on the top of the container, the same thing is done also to the
Fingerprint sensor as it is also mounted facing outward on the top of the container just below
LCD unit. Holes are also punctured to the side of the Fingerprint sensor to fit the push
buttons which are used for controlling the whole system.
At the bottom edge the container holes are created to accommodate the fitting DC power jack
and another hole beside the hole for the COM port for connecting it to a system.
48
The weight of the system unit is less than 4kg.
The design of the system to meet the requirement to satisfy the aim of the project work is as
shown in the figure below;
49
4.5 SOFTWARE USER INTERFACE
As seen in diagram above the Finger-print attendance system is lunched by pluging the
device to a laptop because without the device the application wont load to this page . This is
the dashboard of the software that is operating the fingerprint attendance system. To run the
Fingerprint attendance application, just plug the device to laptop and the detect device button
is clicked to detect the device if the laptop is seeing the device
50
The diagram above is the database interface of the software, after someone has been
registered this is where the information of the student will be saved and stored for easy access
to identify the ID number, Matric No and other information of that particular student and
other information of other student.
The interface above shows the page for registerting a new student ( enrolling a new finger
print) is shows the needed blocks of information to be filled concerning a new student (ID) to
be registered. After the information has been put it, the Register Fingerprint button is clicked
and the information is stored in the database
51
4.6 PROBLEMS ENCOUNTERED
1. The Arduino was not easy to work on since it needed C programming to program the
Arduino being the fact that it is a programming language that’s not easy to write in.
2. The finger print scanner was mostly disconnecting from the Arduino making it hard to
collect information even after successfully writing the code on the Arduino
responsible for communicating with the sensor.
3. The LCD display also gave a bit headache to displaying the information collected and
the id number registered in the system
4. Time accuracy was also a problem even after getting a real time clock getting it to
read the correct time and date was a hassle since it was only reading a date that was
backed and not correct
5. Data was not always accurate that was inputted system and it wasn’t easy to retrieve
the data that was put in wrongly
6. Making the interface other than the device itself where the data were saved in order to
access the data stored was a major issue cause the data had to be a database format
and be arrange well for easy access in the interface to be made
7. Also syncing the interface with the device (the fingerprint attendance system) to make
registration to be done from the interface other than the device was also a problem
which was conquered by constant tries and errors.
52
BILLS OF ENGINEERING MEASUREMENT AND EVALUATION (BEME)
The detail of the costs incurred during the development of this project are shown below
53
CHAPTER FIVE
5.1 RECOMMENDATION
The project is recommended for usage in the office, classroom and other big organization
that has need for keeping tracks of their attendance system. The finger-print attendance
will significantly rise the potential for improving social interaction in the office of various
organization, which will enhance information about a worker or student depending on the
area or organization in which the device is used. Similarly, how traditionally an
attendance list has to be made in the organization or school and each person had to always
sign in by writing their names which can prove to be tiring sometimes and also prove to
be reliable in keeping track of when each worker or student get to work or to class. To be
able to keep record of every worker or student this is a better choice at keeping records
effortlessly and accurately because the time of arrival here is accurate and can’t be altered
like the traditional method which the worker or student can have someone else sign in for
them or change their time of arrival. Using this method gives room for improving the
worker and student workability and therefore improves their attendance calendar.
5.2 CONCLUSION
54
5.3 LIMITATIONS OF THE PROJECT
The project is limited to some features that may actually increase the efficiency of the
system if utilized and functioning. These features consist of the use of cloud storage and
more storage to increase the number of people that can be registered and stored because
the current system can’t save more than hundred ID which in some organization they are
not even up to that number but In cases of what to check the database which if stored in
cloud will make it for one to access the data from anywhere easy and not always having
the device plug into a laptop to access the database which can be a hassle most times but
if the use of cloud is implemented.
It is also crucial to keep in mind that, like any electronic device, this project might
occasionally experience electrical problems. This project requires access to and utilization
of some electricity in order to provide a maximum, efficient and uninterrupted power
supply because it isn’t a pretty big electronic equipment that does not rely on a battery as
its major power source.
Massive amounts of storage space make it practical to hold hundred IDs at most. This can
lead to issues with organizing and labelling them.
Users can end up with unregistered ID stored in multiple places, for example: registration
on different component, devices. This makes them difficult to find such ID and also easy
to lose the problem is even worse because many users can end up registering more than
one finger which can be a hassle in the database. The entire process can be overwhelming
for many.
55
REFERENCES
Harshadbhai & Singh (2016) “Study on Fingerprint Based Attendance System” Available at:
https://www.academia.edu/30938829/Study_on_Fingerprint_Based_Attendance_Syst
em [Accessed September 23, 2022]
Problems with Manual Attendance Tracking: Why You Should Change (2021) Available at:
https://blog.camelohq.com/manual-attendance-vs-software/ [Accessed September 23,
2022]
Sifatnur, Mahfuzur & Mijanur (2018): “Automated Student Attendance System using
Fingerprint Recognition. “Edelweiss Applied Science and Technology” Available at:
https://www.semanticscholar.org/paper/Automated-Student-Attendance-System-
using- [Accessed September 23, 2022]
Clavereau, M. (2011). Absence: time to tackle the root causes. Available at:
http://www.hrmagazine.co.uk [Accessed October 3, 2022]
Ekhlas Ghaleb Abdulkadhim (2021), “Design and Develop an Attendance System Based on
Fingerprint and Arduino Board” Available at:
https://iopscience.iop.org/article/10.1088/1742-6596/1804/1/012011 [Accessed
October 5, 2022]
56
Kadry S. and Smaili M. (2010): Wireless Attendance Management System based on Iris
Recognition. Scientific Research and Essays Vol. 5(12), pp. 1428-1435. Available at:
http://www.sciepub.com/reference/21354 [Accessed October 3, 2022]
Kiran Bajpai (2021), "Manual and Automated Attendance system comparison" Available at:
https://www.softwaresuggest.com/blog/manual-vs-automated-attendance-system-
pros-cons/# [Accessed October 3, 2022]
Mr. John Mashurano 2013. ATM Systems Authentication Based on Fingerprint Using ARM
Cortex-M3. Available at: https://www.ijert.org/atm-systems-authentication-based-on-
fingerprint-using-arm-cortex-m3 [Accessed October 5, 2022]
Open HRMS (2019), "Significance of Biometric Time and Attendance System" Available at:
https://www.openhrms.com/blog/significance-of-biometric-time-and-attendance-
system/ [Accessed October 6, 2022]
Seng Chun Hoo and Haidi Ibrahim (2019), “Biometric-Based Attendance Tracking System
for Education” Available at: https://www.hindawi.com/journals/js/2019/7410478/
[Accessed October 5, 2022]
Shoewu, O., and Idowu, O.A. (2012): “Development of Attendance Management System
using Biometrics”, Pacific Journal of Science and Technology, Pp. 300-307.
Available at:
https://www.researchgate.net/publication/328416288_Development_of_Attendance_
Management_System_using_Biometrics [Accessed October 6, 2022]
Circuit Digest. (2022). “16x2 LCD Display Module-Pinout & Datasheet” Available at:
circuitdigest.com
57
ElectroDuino. (2022) “Introduction to DS3231 RTC Module
JavaTpoint. (2011) “C programming Language Tutorial Learn C Programming Language
Tutorial” Available at: javatpoint
The Builders supply. (2022) “Push buttons: ASP, RCI and more” Available at:
www.thebuilderssupply.com
WatElectronics. (2022) “What is LCD 16x2; Pin Configuration, Commands, Interfacing & Its
Applications” Available at watelectronics.com
Wikipedia. (2018) “Arduino Uno” Available at: https://en.wikipedia.org/wiki/Arduino
58