100% found this document useful (4 votes)
5K views58 pages

Final Year Project

This document is a project proposal for designing and implementing a biometric attendance system. It aims to develop a system that uses biometric technologies like fingerprints, facial recognition, and iris scans to accurately record attendance. The system will include a database to store and manage attendance data. The document reviews different biometric technologies and discusses areas where biometric attendance systems can be applied, like schools, universities, and offices. It also outlines the objectives, scope, and significance of the project. The proposed system aims to improve accuracy over traditional paper-based systems and reduce attendance fraud.

Uploaded by

Drew Nyingi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (4 votes)
5K views58 pages

Final Year Project

This document is a project proposal for designing and implementing a biometric attendance system. It aims to develop a system that uses biometric technologies like fingerprints, facial recognition, and iris scans to accurately record attendance. The system will include a database to store and manage attendance data. The document reviews different biometric technologies and discusses areas where biometric attendance systems can be applied, like schools, universities, and offices. It also outlines the objectives, scope, and significance of the project. The proposed system aims to improve accuracy over traditional paper-based systems and reduce attendance fraud.

Uploaded by

Drew Nyingi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 58

DESIGN AND IMPLEMENTATION OF BIOMETRIC ATTENDANCE

SYSTEM

BY

ADEWOLE OLUWATOBILOBA EMMANUEL F/HD/20/3410010

A PROJECT PRESENTED TO THE DEPARTMENT OF COMPUTER

ENGINEERING, SCHOOL OF INDUSTRIAL AND

MANUFACTURING, YABA COLEGE OF TECHNOLOGY, YABA


LAGOS, NIGERIA.

IN PARTIAL FULFULMENT OF THE REQUIREMENT FOR THE

AWARD OF HIGHER NATIONAL DIPLOMA (HND) IN COMPUER


ENGINEERING

1
FEBRUARY, 2023.

2
CERTIFICATION

This is to certify that this project was designed and implemented by Adewole Oluwatobiloba
Emmanuel (F/HD/20/3410010), in partial fulfilment of the requirement for the award of Higher
National Diploma in Computer Engineering.

……………………………………….. …..…………………………........

Engr, N. A. Yekini Date

Project Supervisor

…………………………………………. …………………………………..

Engr. N. A. Yekini Date

HOD Computer Engineering

3
DEDICATION

I dedicate this project to the Almighty God, in whom I give thanks for making this a reality and to our
amazing parents for their unweaning support and encouragement throughout this project. I am
delighted to dedicate this project to our lecturers, especially our supervisor Engr. Yekini N. A. I also
dedicate this project to all our friends, especially my departmental mates who were always ready to
give their full support whenever it is needed.

4
ACKNOWLEDGEMENT
This is to sincerely express my profound appreciation to God Almighty for his grace, strength and
guidance needed in achieving success in our academic pursuit and project execution. We greatly
appreciate the effort and co-operation of my supervisor Engr. N.A. Yekini for dedicating his time to
discuss useful information throughout the entire project execution. He also not only guided and
encouraged me but also stood by me in making the project a success. Finally, I am thankful to my
parents for their financial supports, encouragement and prayers upon me. I really appreciate their
support and co-operation.

5
ABSTRACT

This final year project aims to design and implement a biometric attendance system for use in
various settings, such as schools, universities, and offices. The project involves the
development of a system that captures the biometric information of individuals, such as
fingerprints, facial recognition, and iris scans, to accurately record their attendance. The
system also includes a database management system that stores and manages attendance data.
The project will explore various biometric technologies and implement the most suitable one
for the project. The final product will be a secure and efficient attendance system that is easy
to use and maintain. The system's potential benefits include improving accuracy and reducing
attendance fraud.

6
TABLE OF CONTENTS
CERTIFICATION.........................................................................Error! Bookmark not defined.

DEDICATION...............................................................................Error! Bookmark not defined.

ACKNOWLEDGEMENT...............................................................................................................

ABSTRACT ……………………………………………………………………………..5

TABLE OF CONTENTS................................................................................................................

CHAPTER ONE................................................................................................................. 8

INTRODUCTION.............................................................................................................. 8

1.1. STATEMENT OF PROBLEM ............................................................................... 9

1.2. AIM AND OBJECTIVES OF THE STUDY ......................................................... 10

1.3. SCOPE OF THE STUDY...................................................................................... 10

1.4. SIGNIFICANCE OF STUDY …………............................................................... 11

CHAPTER TWO............................................................................................................... 12

LITERATURE REVIEW................................................................................................12

2.1. RELEVANCE OF BIOMETRIC ATTENDANCE SYSTEM ……………..……12

2.2. AREAS OF APPLICATION OF BIOMETRIC ATTENDANCE SYSTEM...…13

2.3 MODES OF ATTENDANCE …………………………………………………...15

2.4 BIOMETRIC TECHNOLOGY ………………………………………………….17

2.5 SURVEY OF RELATED STUDIES .............................................................…...21

CHAPTER THREE ............................................................................................................. 24

7
RESEARCH METHODOLOGY AND DESIGN ............................................................ 24

3.1 INTRODUCTION............................................................................................ 24

3.2 ANALYSIS OF THE EXISTING SYSTEM .........................................................24

3.3 ANALYSIS OF THE PROPOSED SYSTEM ........................................................24

3.4 DESIGN OF THE PROPOSED SYSTEM........................................................... 25

3.5. COMPONENTS OF THE PROPOSED SYSTEM............................................... 28

3.6 SOFTWARE DESIGN OF THE PROPOSED SYSTEM...................................... 34

CHAPTER FOUR.............................................................................................................37

SYSTEM IMPLEMENTATION AND TESTING.........................................................37

4.1. SYSTEM IMPLEMENTATION ........................................................................... 37

4.2. SYSTEM HARDWARE UNIT AND TESTING................................................... 45

4.3 SYSTEM SOFTWARE UNIT TESTING AND RESULT ……………………...47

4.4 HARDWARE SYSTEM PACKAGING …………………………………………47

4.5 SOFTWARE USER INTERFACE ……………………………………………….49

4.6 PROBLEMS ENCOUNTERED ………………………………………………….51

BILL OF ENGINEERING MEASUREMENT AND EVALUATION (BEME) ...............52

CHAPTER FIVE ................................................................................................................53

RECOMMENDATION AND CONCLUSION ..............................................................53

5.1. RECOMMENDATION......................................................................................... 53

5.2. CONCLUSION...................................................................................................... 53

5.3. LIMITATIONS OF THE PROJECT ………………………………………………..54

8
5.5. DELIMITATIONS OF THE PROJECT …………………………………………….54

REFERENCES....................................................................................................................55

CHAPTER ONE

INTRODUCTION
Attendance management system refers to the to an organization’s method of tracking
employee’s time and attendance data. Using method of papers, sheets and old file system
method. For instance, a study by Walia and Jain (2016) reveal that attendance has huge
implications on the performance and growth of an organizational while a study by Talaviya,
Ramteke and Shete (2013) considers it to be having an implication on the integrity of the
security system of an organization. This approach has also been introduced to tertiary
institutions and colleges to confirm students’ attendance in classes and examination halls and
it has been in use for years. On the notable sector that is seeing growing incidences in the use
of fingerprint recognition systems is the education sector. This is because there have been a
lot of cases where students would fake their attendance (Ahmed et al., 2016). Moreover,
universities are now in need of new attendance capturing systems that are more timeous and
cost effective (Walia & Jain, 2016). Furthermore, some of the available attendance
recognition systems are considered to be old and ineffective in achieving their intended
purposes and hence pushing pressure on developers to come up with new and improved ways
of capturing student attendance (Dastidar et al., 2017). There are so many bottlenecks with
this usual and accepted method, one of such problem is the difficulty for the management to
compute the percentage of student attendance in classes and frequently modify their
information. Also in institution, tracking and monitoring student time of attendance could be
tedious task, time consuming and as well prone to errors. This research will focus on
developing Fingerprint based Biometric Student Attendance Monitoring System. The
fingerprint Biometrics is adopted in this research work for the fact it is one of the most
successful applications of biometric technology. In the manual signing processes, where
lecturer give a sheet of paper to student to write their names and signature as a form of
confirming their presence for a particular class session, falsification in student attendance
mostly occur a situation where by a student can sign on behalf of his or her colleague as
being present in the class when not true can be so difficult to prevent from happening
especially for large classes where row count can take longer time. According to Tech Target
contributor, Biometric authentication is a security process that relies on the unique biological

9
characteristics of individuals to verify they are who they say they are. Biometric
authentication systems compare physical or behavioural traits to stored, confirmed, authentic
data in a database. If both samples of the biometric data match, authentication is confirmed.
A researcher refers to Biometric as a solution for detecting user’s identity in this modern day.
Biometric identification is any automatically measurable, robust and distinctive physical
characteristic or personal trait that can be used to identify an individual or verify the claimed
identify of an individual. Biometric science utilizes the measurements of a person’s
behavioural characteristics (keyboard strokes, mouse movement) or biological characteristics
(fingerprint, iris, nose, eyes, jaw, voice pattern, etc). A form of biometric authentication,
fingerprint authentication automatically compares a user's fingerprint to a stored fingerprint
template in order to validate a user's identity. Because some parts of the human body are use
in biometrics, the issue of getting lost is not possible and for signing on behalf of another
employee is avoided in work cases. Also, utilizing biometrics in most cases can be said to be
more efficient when speed is considered and convenient than use of signing on paper method.
Using a particular person fingerprint as a form of authentication is just like using natural
physical data as a password. The benefit of using biometric authentication is that it is
absolutely distinct to each person. There are no two different individuals with the same
fingerprint, it is difficult and impossible for one another to have the same fingerprint, and
fingerprints from different people can never be the same. Infiltration is very hard to come by
due to the fact that other people will not be able to use their biometric for someone else.
Although using biometric authentication, comes with few disadvantages like if a person could
have access to scan another person fingerprint, that scan has the capability to trick the Touch
ID system. Hence, a criminal can have access to one’s information that requires
authentication using fingerprint.

1.1 STATEMENT OF THE PROBLEM


The old system is still mostly used in lecture room or laboratory session in most institution
today. Lecturer will give out a sheet of paper containing list of student’s names to sign or in
some cases, the student will be the ones to write their names, and matriculation number to
indicate their presence for a particular class. The security of the existing attendance system
that are now use in classroom (signature system) can be easily compromised. Some students
can master other student’s signature. Thereby, helping their colleagues who are absent for a
particular class to sign the attendance sheet using the duplicated signature. Falsification in
student attendance occurs rampantly in this conventional method.

10
 Inconsistency in data entry and generate errors
 Time consuming and costly to produce reports
 Entry of false information
 Lack of security
 Duplication of data entry

In order to prevent this problem, it is necessary to develop an authentication system for


students using fingerprint Biometric recognition that will be used to track and keep the
attendance of every student in a particular class. Therefore, this system designed in this
project work is not based on the existing signatures, in order to avoid falsification whereby a
student signs on behalf of another student based on the saved signature. The fingerprint
attendance monitoring system designed in this research work for student is a more secure
platform where students mark their attendance with their fingerprint. Hence, the possible
results like;
 High Accuracy
 Eliminates Time Theft
 Trustworthy data
 Boosts Employee Morale
 Increases Accountability
 Saves time

1.2 AIMS AND OBJECTIVES OF THE STUDY


The aim of the study is to design and develop a reliable biometric based attendance
monitoring system and recording system. If completed, the following objectives will be
achieved among others. With the use of Biometric attendance system, you can generate all
sorts of reports related to taxes, attendance, overtime, etc. All reports of your organization’s
HR activities, or students will be automatically generated and you can access them with just a
few clicks. Biometric attendance and recording system, helps you to eliminate the cost and
inevitability of human errors and focus on efficiency and productivity. Manipulation in
attendance records will be a forgone issue as every data stored or recorded will be encrypted
and not accessible by anyone except the admin.

1.3 SCOPE OF THE STUDY

11
This project focuses on the designing and implementation of biometric based attendance
system that takes and record the attendance of employers, staff, students or anybody in an
organization or where attendance is been taken. This facility can be used by students in order
to enter their attendance. This project on Biometric attendance system will be utilized in
Yaba College of Technology in order to make attendance recording easier in their various
classrooms. Also, it can be utilized in the examination hall during the school exams to ease
the process of attendance recording. This system provides high level of security whereby
making it impossible for imposters and impersonators in making their ways to class or
examination hall. The System using fingerprint Biometric will keep historical data making it
easy for the lecturers to access and grade students. A dedicated server is maintained for
attendance purpose and every time when a student places his/ her fingerprint on the sensor it
identifies the particular student and attendance is updated on the server. The system is found
to reduce the burden of manual work and also saved the time. Every organization whether it
be an educational institution or business organization, needs a better attendance management
system for students and staffs so that records be maintained with ease and accuracy was an
important key behind motivating this project. This would improve accuracy of attendance
records because it will remove all the hassles of roll calling and will save valuable time of the
students as well as teachers. The scope of this work is to develop a Fingerprint Based Student
Attendance Monitoring System that will improve how attendance management is done by
using fingerprint as a form authentication for proof of attending a class.

1.4. SIGNIFICANCE OF THE STUDY


The classrooms in Yaba tech of Technology will benefit from this research, It can also be
useful in the staff rooms, the Offices of the Dean’s and the HOD’s of each department. When
being used in the classes, it helps the lecturers to track or investigate student class attendance
in a particular course having poor attendance thereby enabling the school authorities to
rectify the situation by providing necessary interventions. Biometric based student attendance
recording system is extremely useful in institutions especially during classes, tutorials,
laboratory sessions and examination during which heavy security are normally deploy to
validate student’s identity in order to cob imposters, with the use of authentication system the
number of security personnel in the examination hall will greatly reduce. The Authentication
system is not only useful to the institutions and lecturers alone, even the students benefit a
great deal by reducing the stress in queuing up which result in delay and often time in the
damage of the attendance sheet.

12
CHAPTER TWO

LITERATURE REVIEW
2.1 RELEVANCE OF BIOMETRIC ATTENDANCE SYSTEM
High Accuracy: Regardless of any other feature that a biometric attendance system can give,
the capability to directly keep track of attendance might be worth the cost of admission alone.
Thanks to a wealth of different possible biometric labels, it's intolerably delicate for anyone
to fake their attendance. In spite of that, biometric attendance systems allow you to keep track
of any number of people contemporaneously without error or shenanigans.

Eliminates Time Theft: This is also one of the big benefits that a biometric attendance
system offers, and it should not be understated how impactful and useful it can be in the case
of time theft. Even if your employees intend to be upstanding and honorable, people are
imperfect and there will eventually be various occasions where accidental time theft occurs.
Of course, not everyone is as forthright or can be truthful as the best of us, so being able to
identify and stop intentional timesheet fraud is arguably more important. Not only will
stopping malicious time theft save you money, but it will help shape company culture by
demonstrating that there are consequences for bad behavior that can stop the next per son
from trying the same.

Trustworthy Data: The data gathered from a biometric time and attendance system is live
and honest. You have access to the data at any time. It enables you to generate quick reports
and be informed on the attendance of the students or employees. Live and legitimate
information get assembled by the biometric time and attendance framework. Therefore, there
can hardly arise any troublesome processes or issues in verifying attendance in the
workplace, classroom or any organization that it is been used. Also, one can access the data
anytime, anywhere as per the need. Biometric time and attendance thus empower the
lecturers to produce speedy reports, at the same time caution you to issues that need
immediate attention or focus of the management or class.

Saves Time: Biometrics-enabled attendance software is a terrific time-saving system.


Teachers who have been overburdened with attendance marking every morning can heave a

13
sigh of relief. All that is needed of the students, is their fingerprints on the device. Attendance
records are also easily maintained without the need to store heavy registers and spreadsheets.
During any report of any kind, the time used in gathering or accumulating these heavy
registers will be shortened because the records have been saved on the device and it can be
accessible anytime.

2.2 AREAS OF APPLICATION OF BIOMETRIC ATTENDANCE SYSTEM


The areas within which biometrics is applicable are government, commercial, forensic,
institutions, access control, counter tourism, enforcement agency, airport security so on. a
number of these areas are briefly discussed below in addition as those areas where biometrics
is being applied.

Government
The application of biometrics within the government sector like national ID card, correctional
facility, driver’s license, Social Security, welfare disbursement, border control, and passport
control. Traditionally within the government, they need used token-based systems examples
ID cards and badges which are been given to people or the workers to put on. The govt.
founded a central database of biometric data, like fingerprints and digital passport
photographs of all foreign nationals who apply for residence or are already residing in their
nations. Maintaining a central database would prevent people using another person’s identity
or using false documents to get permission to reside, work or study in their nation.
Fingerprints would be used to match immigrants to their personal identification data and
documentation. Foreign nationals who apply for a residence permit would be required to
produce fingerprints and a passport photograph once, after which their identity may well be
checked against that data using fingerprint scanning and biometric authentication for
comparison. The biometric data would be stored during a central databank and on a chip on
the residence permit. This Method makes it easier to be utilized and accessed by various
public authorities, as an example, the immigration agency when expelling illegal immigrants
and therefore the Custom Agency when incarcerating criminals. The database would also
make it easier for the Immigration agency, the Police and embassies to test the identity of
foreign nationals and thus prevent identity fraud. Foreign nationals themselves also stand to
profit, because the use of biometrics could prevent their falling victim to fraud, which may be
a heavy problem in numerous nations. Biometric systems work within individual agencies,
producing a spread of security and facilitation benefits. The utility of biometric systems may

14
be enhanced through the power, where reasonably necessary, to share biometric data between
agencies and to verify data against other agency holdings. Enhancing the interoperability of
biometric systems can significantly assist in addressing national security and criminal threats
and offer new opportunities for enhanced service delivery. These benefits are going to be
realized through greater opportunities for the lawful sharing of biometric information and
biometric capabilities between governments and greater collaboration on biometric system
development.

Commercial
In this area, biometric is usually applicable for logging in to an electronic network, electronic
data security, e-commerce, Internet access, ATM, Mastercard, physical access control,
mobile phone, PDA, medical records management, and distance learning. The power to spot
a customer had greatly affected trading, as a part of a general group or specifically.
Monitoring the attendance of employees becomes a really easy task as employee can put
down and out the time they get or leave the office using iris scan or thumb print. There are
plenty of biometric solutions available within the market today and more are still within the
course of development. Access control to computer systems (workstations) USB fingerprint
readers, voice and face recognition software using standard camera and microphone hardware
etc. Time and attendance management in institutions are all biometrics. the issues generally
related to time registration and attendance management are peculiar to those encountered
with access control. There are some systems employed today that performs identification
through the employment of pin code or badge, but this approach is often easily compromise
by users. Some employees can misplace their badge or forget their pin code. Also, some
employees can engage the service of their colleagues who gets to work early to use their pin
or badge to the system. Adopting biometric for time registration or attendance management
avoids deceiving the system by users and also reduces overhead for engaging security
personnel when badges are lost or pin codes forgotten. Biometric is extremely useful in
institutions especially during classes, tutorials, laboratory sessions and examination during
which heavy security are normally deploy to validate student’s identity so as to cob
imposters, with the utilization of biometric System the quantity of security personnel are
greatly reduce. (Mr. John Mashurano, 2013)

Forensic

15
In forensic, biometrics is in use for corpse identification, criminal investigation, terrorist
identification, parenthood determination, and missing children. The cost of such
implementations of biometrics is very high and for existing surveillance systems the success
rates vary. The police agencies have used fingerprinting as a means of identifying criminals
for well over a hundred years. Police gain the most benefit because a criminal’s biometric
information such as fingerprints, mugs hot, DNA, etc., may already be held in a database.
This enables forensic information collected at a crime scene to be matched against it. An
Automated Fingerprint Identification System is designed to enable a fingerprint to be
matched extremely quickly against a large number of records in a criminal database. To do
this effectively it will always hold encodings of all fingers of criminals that have been saved
on the database of the police. Biometrics is also used for security in places like churches
where people are been search and take biometrics data before entering in order to prevent
tourist, schools for students during examination or their classes and also for investigation
where suspects are been examined and collection of evidence, in which the evidence are been
matched and identify the deceased using biometrics. (Boulgouris NV, Plataniotis KN,
Micheli-Tzanakou E, 2010)

2.3 MODES OF ATTENDANCE


There are two kinds of attendance system a company can choose from, i.e manual or
automated. The traditional attendance tracking method includes punch locks or some other
sort of manual system. However, this method requires consistent human supervision. But
fortunately, the evolving technology has led to the introduction of the automated attendance
system that provides much better result.

2.3.1 Manual system


Manual attendance requires employees or students to fill in their own present time. Manual
recording has been utilized over the years as a standard for attendance and time tracking,
either in the form of a register or record keeping depending on how it is recorded. The
manual system is classified into two types:

Sign-in sheets: The most basic form of time and attendance tracking is using a handwritten
sign-in sheet with a calendar. Most of the time, employees will sign into and out of their
shifts by hand by noting the time and date on the page. Of course, this is the cheapest option
when it comes to time and attendance tracking systems. But it is also the riskiest, as it is very

16
prone to error and time theft. If an employee or student arrives or chooses to leave, they must
write down the time in the attendance book. It usually has their name, time of arrival, and
signature too. (Kiran Bajpai 2021)

Spreadsheets: As an alternative to a handwritten sign-in sheet, some businesses use digital


spreadsheets for time and attendance purposes. For instance, employees may use an Excel
sheet on a business computer to record their hours. While this method reduces paper, it is no
less prone to error or time theft than a paper-based sign-in sheet.
Analog system: In the analog system, each employee will have an attendance card to record
their attendance. Since employees must keep the record of their own arrivals, this system is
similar to book attendance. This system is mostly used in organizations and not schools.

2.3.2 Automated System


This attendance system has made it a lot easier to manage the attendance of the employees in
organizations, especially in large scale companies. Apart from recording attendance, it can
prevent unwanted movements of employees and unauthorized entry.
Time Cards: Each employee receives a time card that must be swiped on a machine in order
to punch their attendance. As soon as a card is swiped, the data in the card is collected, and
the data is transferred to the computer, all the manual paper works eliminated from the
process. You can integrate your system with other third-party card swipe system. (Kiran
Bajpai 2021)
Mechanized Systems: The system generates a record automatically with all the employee
timing in and out based on the data inputs. The employee must register every time he or she
enters or leaves the office. Therefore, the employee needs not to be scrutinized every time an
entry or exit is made. A more effective system for tracking employee attendance would,
however, be an automated one. This can mean fewer manual tasks and more reliability than
other methods because it requires less manual work.
Interactive Voice Response: An interactive voice response (IVR) system allows employees to
punch in, check their schedules, receive operator messages, and request time off using only
their touch-tone phones. It is custom-designed to meet the needs of each organization,
starting with the call dialogue and professional-recorded voice prompts.
Biometric Attendance: The purpose is to verify and identify the employee to the employer
within an organization using a biometric device. This template is captured and stored on a
smart card or database of a biometric machine so that it can be used for the purpose of

17
verifying a user's (employee's) identity. Consequently, users are identified by their biometric
characteristics alone, without the use of smart cards, usernames, or other identification
methods.

2.4 BIOMETRIC TECHNOLOGY


Biometrics are body measurements and calculations related to human characteristics.
Biometric authentication is used in computer science as a form of identification and access
control. The process of Biometric validation is much by which an assessing of some spotting
biological or traits will be distinctly identified in a private. These unique identifiers constitute
retina, earlobe geometry, iris patterns, fingerprints, hand geometry, voice waves, earlobe
geometry DNA, and signatures. The voice waveform recognition method with tape
recordings in telephone wiretaps of verification which has been utilized for thus a few years
is now majorly being employed in research facilities for access to restrictively databanks.
enforcement has implemented Facial-recognition technology to fish out people in
congregation with significant unwavering quality and reliability. Mostly industries utilize
Hand geometry for providing physical access to buildings. For folks that attempt to
impersonate another individual, earlobe geometry is used to detect their identity. Signature
comparison isn't concerning as being dependable or reliable in isolation to other method of
biometric verification but provides a further level of check or verification when utilized in
along with other biometric verification methods. In computing, identification or identity
verification is used as a mode of identification and access control and also being implemented
to detect individuals in groups that are being watch or under surveillance. Using biometric
verification is popping into a progressively regular for Authentication in corporate and
security systems, consumer electronics and point of sale (POS) applications. additionally, to
security, the motivation behind biometric verification has been convenience to avert fraud,
biometric data is typically encrypted when it's gathered (Wayman, 2005). the method of
biometric verification process starts by employing a software application to identify some
specific points of human physical characteristics which is point or template. The point which
is stored within the database is then processed using an algorithm that converts the data
captured into a numerical format. The input gotten from user input through biometric scanner
is now being compared to the numerical value stored, and therefore the authentication process
if matches that of the database template is approved or rejected if it differs. The identification
verification process is that the same regardless of the biometric methodology employed. a
private distinct feature is captured, processed by a software application and stored as a

18
template into a database. Subsequently, when there's need for verification of a private, a
replacement physical feature is captured and compared against the template stored from an
information source. Using biometrics for recognizing users offers some extraordinary
favourable circumstances because only biometrics can recognize a private as himself or
herself, biometrics could make keys and combination locks could end up to not be useful
thanks to biometrics and every one data, including biometrics is vulnerable whether in
storage or in processing state (Kadry, Smaili, 2010)

2.4.1 TYPES OF BIOMETRIC DEVICES AVAILABLE


There are several sorts of biometric data use commonly today. Each of those devices
incorporates a different mechanism employed to captures data in several form. The different
styles of biometric that are frequently in use today are devices that capture data in different
formats using various mechanism. The strategy of production and trait of the biometric data
indicates the encroaching of the protocol for enrolment and authentication of users
(Woodward, Nicholas 2003). The associated changes within the process of measurement and
production can provides a vicious person an access and allowing them to change the safety
shielded round the biometric system by interfering with the operation of the mechanism for
capturing or by changing features of the biometric. There are many sorts of biometric devices
employed today. A number of these biometric devices are generally detected in common
places like movies. Biometrics is basically the identification of human features that are
distinct to every person. the most effective thanks to keep your devices safe and ascertain
people don’t illegally have access to your personal belongings like files utilizing is to
implement a any biometric technology available within the market.

Retina Scanner: These scans are the distinct biometric feature/pattern in each individual’s
iris, and compares it with a specific number of distinct recognizing patterns which distinguish
each individual separately from people. during a retinal scan, at the rear of the attention, a
biometric format is formed by recording the patterns of capillary blood vessels. biometric
identification may be allotted remotely utilizing a high-resolution camera and formats
generated by a method just like that of biometric authentication. Biometric authentication and
identity verification are both won’t to distinguish someone as indicated by their distinct
pattern. Despite their efficiency, implementing them is more costly and complicated. The
retina of soul may be a thin tissue constituted by neural cell which is found within the
posterior portion of the attention. The composite structure of the capillaries that offer the

19
retina with blood makes the retina of every individual distinct. There are cases where by
retinal patterns is also modified for people full of diabetes, glaucoma or retinal degenerative
disorders, however, the retina generally is permanent from child birth till death. Considering
its distinct and permanence feature, the retina happens to be the foremost accurate, authentic
of all the biometric except DNA. Its accuracy level has been concluded by advocates of
biometric authentication that its error rate is estimated one in an exceedingly million (Homer,
Schell, 2012). A biometric identifier called a retinal scan is employed to represent the distinct
patterns of a personality's retina. The blood vessels within the retina can promptly absorb
light over the subordinate tissue and might be recognized more easily within the presence of
lighting. A retinal scan is performed by absorbing an unperceived beam of low-energy
infrared emission into a person’s eye as they appear through the scanner's eyepiece. This
beam of sunshine draws an identical pattern sort of a path on the retina. During the scan
process, the whole reflection differs because of the absorbent nature of retinal blood vessels
of that light than other a part of the attention. The format of the variations from the scanner is
translated to coding system and stored in an exceedingly database. (Kadry S. and Smaili M,
2010)

Iris Scanner: Iris scanning is an automatic method of biometric authentication which uses
mathematical pattern-recognition techniques on video images of the iris of a person’s eyes,
whose complex random patterns are distinct and be spotted from a far range. Digital formats
which are said as template are converted from these patterns by using mathematical and
statistical algorithms which permit the identification of a personal or someone trying to
impersonate the legitimate person. Globally, there are variant individuals in such a large
number of countries that are enrolled into the iris recognition systems for the aim
convenience in passport-free automated border-crossings, and a few national ID systems
supported this technology are being deployed. the many advantages of iris recognition, other
than its utmost resistance to false matches and speed, is that the stability of the iris as an
inside, protected, yet externally visible organ of the attention. The major feature that depicts
iris of the attention because the most ideal and accurate section of shape for biometric
recognition is that it's an indoor organ which is healthier guided from damage and wear by
extremely sensitive and transparent membrane (cornea). This characteristic makes it more
better choice to fingerprint, which may be difficult after years of rigorous involvement in
some labor. The iris is usually flat, and its geometric configuration is simply controlled by
two complementary muscles (the sphincter pupillae and dilator pupillae) that control the

20
diameter of the pupil. This makes the iris shape much more predictable than, as an example,
that of the face. The iris incorporates a fine texture that like fingerprints is set randomly
during embryonic gestation. just like the fingerprint, it's very hard (if not impossible) to prove
that the iris is exclusive (Christine, Modi, 2008).

Fingerprint Scanner: When considering the value of identification scanners available within
the market today, fingerprint scanning is often on the lower end. There are some fingerprint
scanners that may only scan the particular print while the more expensive scanners can
capture the form and size of the thumb, presence of blood within the fingerprint and other
physical characteristics on a finger. The expensive scanner can capture a 3D image of the
fingerprint which successively makes it tougher for such fingerprint to be duplicated. the
method of acquiring image by the scanner is either though capacitance sensing or optical
scanning. Generation of biometric templates relies on matching minutiae characteristic
features in fingerprints. The examining of fingerprints for the aim of generally requires the
comparison of such a large number of features of the print format. These comprise of patterns
which are aggregated features of ridges and also the minutia points, that are distinct features
found within this pattern. Knowing the attributes of human skin and structure is paramount to
successfully utilize a number of the technologies of imaging.
Fingerprint sensors: A fingerprint sensor is an electronic device use to capture a digital image
of the fingerprint pattern. The image captured from the sensor is mentioned as a live scan,
which successively is processed digitally to develop an accumulation of extracted features
(Biometric Template). This template is stored in a very database and utilized for matching.
Facial Biometrics: The image or video of a person is mostly views by the facial biometrics
devices and so compares it to the template stored in database. when matching is being done
out by the facial biometrics, it compares the ratio, shape and structure of the face, the interval
between the jaw, top outlines of the attention sockets, the perimeters of the mouth, eyes,
mouth, nose, the region of the cheek bones and therefore the positioning of the nose and eyes.
(J.Chandramohan, 2017). A new method in face recognition uses the visual details of the
skin, which is captured in standard digital or scanned images. this system is noted as skin
texture analysis, which turns the distinct patterns, lines, and spots obvious in an individual’s
skin into a space. Facial biometrics is extremely good when being utilize for facial
authentication than for identification purposes, thanks to the very fact that a private face can
have a physical damage or altered, disguise with a mask, etc. Environment also can affect the

21
camera during the method of capturing. Facial biometrics has been confirmed as a technique
which will improve validation and authentication of users tremendously.

2.5 SURVEY OF RELATED STUDIES


Krishna Prasad K (2018), in his work entitled “ABCD Analysis of Fingerprint Biometric
Attendance Maintenance System” The fingerprint is very not unusual and popular biometric
of type traits due to its universality, distinctiveness, and permanence and additionally, many
advances and new researchers are to be had in this discipline. Fingerprint identification
technology era has various blessings for much less price and non-invasive manner of
acquisition and therefore is one of the maximum frequently used mechanisms.

Dr. B. Chellaprabha et al. (2016), in their article entitled “A Fingerprint based Attendance
Management System using GSM” This System represents an analysis of different
technologies which are used for taking attendance system. Traditionally students’ attendance
is taken by professor and it will take too much time of lecture. More proxy attendance can be
recorded in manual system. This can be replaced with computerized system. In proposed
system attendance will marked using Fingerprint Recognition. And it will verify the student
which will eliminate the proxy attendance. This system can be implemented for better results
regarding the management attendance. This system will save time, decrease the amount of
work the administration has to do.

Adejumobi et al, (2021), in their work entitled “Development of A Fingerprint-Based


Attendance Notification System Using Simple Mail Transfer Protocol” The attendance
system developed is fingerprint-based with Simple Message Transfer Protocol (SMTP). The
enrolment and the verification interfaces are modelled using C# while the database is MSQL
based to make it more secure. The model is simple, not costly and a real-time system. The
fingerprints of different students were successfully enrolled, stored in the database and later
verified during the lecture period for attendance marking. The attendance record can be sent
to relevant stakeholders to ascertain the levels of students’ attendance.

Seng Chun Hoo and Haidi Ibrahim (2019), in their work entitled “Biometric-Based
Attendance Tracking System for Education” It remains a challenge for choosing suitable
types of hardware to design a biometric-based attendance system. There are various types of
microcontroller boards, biometric sensors, communication channels, database storages, and

22
other components for researchers to select based on their own needs and requirements. For
microcontroller, 80C51 and PIC were initially used in between the years 2010 and 2014,
followed by ATmega since 2014. After that, in 2016, ARM became popular and started to be
used widely in attendance systems. Basically, 80C51 and PIC are selected for the low
processing task, such as iris and fingerprint recognition, while ATmega and ARM are suited
for tasks with higher processing capability, for instance, face recognition. The choice of
sensor depends on the captured biometric trait.

Ekhlas Ghaleb Abdulkadhim (2021), in his work entitled “Design and Develop an
Attendance System Based on Fingerprint and Arduino Board” In the modern era, there has
been remarkable advancement in information systems and communications technologies.
Fraud could be identified using several technologies, one of the most effective of which is the
biometric technology. In this study, we proposed a fingerprint-based attendance system to
improve detecting the fingerprints of students and employees.

Sifatnur Rahman et al. (2018), in their work "Automated Student Attendance System using
Fingerprint Recognition" There are some limitations of the fingerprint technology. These are
the inability to enroll some users for poor fingerprints. For these cases one need to consider
another biometric feature. Also, it can suffer some small changes along the time. To
overcome this problem, the system may be necessary to re-enrol the fingerprint and/or use
multiple fingerprints enrollment. The system needs to deploy specialized devices for
fingerprint enrollment. In future this project can be extended to store fingerprint databases on
the remote server that can be used over world-wide. A website will be hosted on the server
for online access to attendance reports. The proposed system has been developed using C#
programming paradigm platform. The proposed system can be implemented for all classes of
the university if sufficient funds will be provided to us.

J.Chandramohan et al. (2017) in their study titled "Attendance Monitoring System of


Students Based on Biometric and GPS Tracking System” The future work may consist of
creating the database of students which contains the academic details of the students. We can
send the academic details of the students periodically to the parent’s mobile along with the
attendance report. So, in nearest future we can use finger vein recognition in this attendance
system which very unique compared to the fingerprint authentication. The authentication can
also be made as more secure by using human odor for the Security purpose

23
Devendra Kumar Yadav et al. (2015), in their study entitled “Fingerprint Based Attendance
System Using Microcontroller and LabView” Here in this project we have tried to automate a
classroom attendance procedure by using a fingerprint recognition module interfaced with
8051 microcontrollers. A fingerprint recognition system can be used for both verification and
identification. In verification, the system compares an input fingerprint to the “enrolled”
fingerprint of a specific user to determine if they are from the same finger (1:1 match). In
identification, the system compares an input fingerprint with the prints of all enrolled users in
the database to determine if the person is already known under a duplicate or false identity.

D. U. Onyishi et al. (2021), in their work entitled "Design and Implementation of a Biometric
Students’ Time and Attendance Logging System" Fingerprint enrollment mode entails the
initial acquisition and registration of the student’s fingerprint template. The RS305
Fingerprint module initially scans the student’s Fingerprint. The finger biometric template is
then extracted from the scanned fingerprints and stored in a register in the RS305 module.
The Atmega328P which is connected to the RS305 senses that a template has been stored and
then sends a signal to the Personal Computer (PC) software to notify it that a template has
been saved. This process is then repeated for each student until all the student’s fingerprint
template has been extracted and stored.

According to Jiexun, Wang and Chen (2011) as quoted in the research work of Oloyede et al.
(2013), the origin of biometrics has been in the public sector; however, biometrics is used for
the identification and verification of criminals. Other sectors where biometrics has also
thrived are the Banking, Education and Health sectors. For example, emerging application
markets include biometrically enabled transactional payment solutions and biometrically
enables wireless for business use. Oloyede et al. (2013) carried out extensive research on
applicability of biometric technology to solve the problem of staff attendance. However, the
researchers did not write any software to address the problems of attendance.

24
CHAPTER THREE

RESEARCH METHODOLOGY AND DESIGN

3.1 INTRODUCTION
This chapter gives the overview on how the step-by-step process used in the assemble and
development of the design. This includes the hardware and the required interfacing
programming. This section will briefly discuss the components and materials used.

3.2 ANALYSIS OF THE EXISTING SYSTEM


Attendance is an important aspect in institutions, regular attendance will not only ensure full
exposure to the scope of majors and opportunities available at institution, and it is also one of
the criteria used in determining your final grade. Tracking and monitoring student time of
attendance using the manual attendance in colleges and universities could be tedious, time
consuming and more prone to errors. The manual attendance system that is use in classroom
(signature system) is not too secure because some students can copy other student’s signature.
For manual attendance signing process, the most common problem is the lecturer need to take
student daily attendance and manually filled the record in attendance sheet or book for every
lecture. If the attendance sheet is missing or misplace, it could lead to big problem because
the lecturer needs the attendance record to make analysis and generate an attendance report.
Another problem is the lecturer will need more time to analyse and generate the attendance
report because the lecturer needs to search and refer the old attendance record first. Besides
that, an error could happen when the teacher makes the calculations to generate the
attendance report by themselves. Even though the attendance record is hassle to keep by the
lecturer, management report is required in urgent basis. Analysed attendance record is
required by the school management for future actions is normally being delay because of the
lack of precise. Moreover, delay analyses would lead to prolong the time to inform the
parents about the truancy students.

3.3 ANALYSIS OF THE PROPOSED SYSTEM

25
The new system is going to deal with the limitations of the existing system by; keeping
historical data that makes it easy for lecturers to access and grade students, providing high
level of security whereby making it impossible for imposters and impersonators in making
their ways to examination halls. The system will allow the lecturer to monitor each student
attendance, track down truants and take the appropriate action and reduces the stress in
queuing up which result in delay and often time in the damage of the attendance sheet. The
new system will provide user friendly interface which will help to guide each user to use it
correctly without any specialized training.

3.4 DESIGN OF THE PROPOSED SYSTEM


The system architecture gives overall view of the project and how the system components
are connected to each other and perform their role. Arduino and artificial technology are the
main technologies that are used in this project. A 5v power supply is provided and
passed through to the Arduino. The finger print sensor is given as an input to the Arduino and
the output is given to the display. The display is connected to the Arduino which does the
main function of displaying the information regarding the attendance of people registered on
the device. There are several factors that controllers review and base a reliable schedule
upon. These include the number of people to be registered on the device and how many
people will have the admin authority.

BLOCK DIAGRAM OF THE PROPOSED SYSTEM

26
CIRCUIT DIAGRAM OF THE PROPOSED SYSTEM

27
FLOW CHART OF THE SOFTWARE PROGRAM

HOW THE SYSTEM WORKS

The working of the Fingerprint Sensor Based Biometric Attendance System. In this project,
we have used a DS3231 RTC Module for time & date display. We used 1 LED for power
indication, and 1 buzzer for different function indications. We have interfaced 16*2 LCD
which displays everything whenever the finger is placed or removed, or registering
attendance or downloading data. We have used 4 push buttons which are used to control the
entire system. The functions of each button are:

1. Register/Back Button – Used for enrolling new fingerprints as well as reversing the back
process or going back

28
2. Delete/OK Button – This Button is used for deleting the earlier stored fingerprint system as
well as granting access as an OK selection.
3. Forward Button – Used for moving forward while selecting the memory location for
storing or deleting fingerprints.
4. Reverse Button – Used for moving backward while selecting memory location for storing
or deleting fingerprints.

Enrolling New Fingerprint


To enrol New Fingerprint, click on the Enrol button. Then select the memory location where
you want to store your fingerprint using the UP/DOWN button. Then click on OK. Put your
finger and remove your finger as the LCD instructs. Put your finger again. So finally, your
fingerprint gets stored.
Deleting Stored Fingerprint
To delete the fingerprint which is already clicked on DEL Button. Then select the memory
location where your fingerprint was stored earlier using the UP/DOWN button. Then click on
OK. So finally, your fingerprint is deleted.
When the system is powered on, it firsts initializes to set the system to be in a ready state then
it displays the name of the project (Fingerprint attendance system) and also displays the
current time and date via the LCD display. After a successful connection is established to the
system, the user can then move forward to register their fingerprint ID onto the system which
is done by clicking on the push button assigned to allow the registration of a new fingerprint
ID, the sensor blinks RED indicating its ready to scan a new fingerprint to be registered onto
the system database, after registration is complete the user can now sign in anytime by just
placing their registered finger on the fingerprint sensor and recognizes the registered
fingerprint. Based on the parameters and condition given, the sensor recognizes the
fingerprint and sends the signal data to the Arduino to read and processed and displays the
information collected from the fingerprint sensor and send it to the database then the output is
processed by the Arduino which gives the data to the LCD to display and stores it in the
memory. It performs the task and the acknowledgement is given back and displayed on the
interface concerning the task performed.

3.5 COMPONENTS OF THE PROPOSED SYSTEM


The choices of Materials or part used for the design were carefully selected after the
evaluation and assessment of materials available to us. The selections of materials used were

29
done based on the functions that our design system most possessed and not only that, the
durability and reliability of each component were also considered. The components are:
Arduino Uno, R305/R307 Fingerprint Sensor, DS3231/DS1307 RTC Module, 16x2 LCD
Display, Potentiometer 10K, Push Buttons, Buzzer 5V, LED 5mm (Red)

Arduino Uno
The Arduino Uno is an open-source microcontroller board based on the Microchip
Atmega328p microcontroller and developed by Arduino.cc and initially released Arduino.cc
in 2010. The board is equipped with sets of digital and analogue input/output (I/O) pins that
may be interfaced to various expansion boards (shields) and other circuits. The board has 14
digital I/O pins (six capable of PWM output), 6 analogue I/O pins, and is programmable with
the Arduino IDE (Integrated Development Environment), via a type B USB cable. It can be
powered by the USB cable or by an external 9-volt battery, though it accepts voltages
between 7 and 20 volts. It is similar to the Arduino Nano and Leonardo. The hardware
reference design is distributed under a Creative Commons Attribution Share-Alike 2.5 license
and is available on the Arduino website. Layout and production files for some versions of the
hardware are also available.

R305/R307 Fingerprint Sensor


R307 Fingerprint Module consists of optical fingerprint sensor, high-speed DSP processor,
high-performance fingerprint alignment algorithm, high-capacity FLASH chips and other
hardware and software composition, stable performance, simple structure, with fingerprint
entry, image processing, fingerprint matching, search and template storage and other
functions. The R307 fingerprint module has two interface TTL UART and USB2.0, USB2.0
interface can be connected to the computer; RS232 interface is a TTL level, the default baud
rate is 57600, can be changed, refer to a communication protocol; can and microcontroller,

30
such as ARM, DSP and other serial devices with a connection, 3.3V 5V microcontroller can
be connected directly. Needs to connect the computer level conversion, level conversion note,
embodiments such as a MAX232 circuit.

DS3231/DS1307 RTC Module


The DS3231 RTC module is a time tracking device that gives the current time and date. The
word RTC is meant Real Time Clock. The RTC module made of clock chip DS3231. This
module is generally used in computers, laptops, mobiles, embedded system applications
devices, etc. to provide time and date. RTC module works on the I2C protocol. The module
provides details such as second, minute, hour, day of the week, day of the month, month, and
year including correction for leap year. One more interesting thing It can operate either in 12
Hour or in 24 Hour format. It’s can be used in projects like containing data-logging, clock-
building, time stamping, timers, and alarms. The DS3231 chip is a low-cost accurate Real
Time Clock IC with communication over I2C Interface. The DS3231 is 16 pin IC, although it
needs only 8 pins off the available 16 pins to function. The IC is operated on low power
consumption when it operated on a battery then it consumes less than 500nA power. It
manages all timekeeping functions.

31
This Chip clock/calendar can provide seconds, minutes, hours, day, date, month, and year
information. This IC clock operates in the format of either the 24-hour or 12-hour with
AM/PM indicator. The end of the month date is automatically adjusted the months which has
less than 31 days. It can corrections for leap years.

16x2 LCD Display


An electronic device that is used to display data and the message is known as LCD 16×2. As
the name suggests, it includes 16 Columns & 2 Rows so it can display 32 characters
(16×2=32) in total & every character will be made with 5×8 (40) Pixel Dots. So the total

32
pixels within this LCD can be calculated as 32 x 40 otherwise 1280 pixels. In LCD 16×2, the
term LCD stands for Liquid Crystal Display that uses a plane panel display technology, used
in screens of computer monitors & TVs, smartphones, tablets, mobile devices, etc. Both the
displays like LCD & CRTs look the same but their operation is different. Instead of electrons
diffraction at a glass display, a liquid crystal display has a backlight that provides light to
each pixel that is arranged in a rectangular network.
Every pixel includes a blue, red, green sub-pixel that can be switched ON/OFF. Once all
these pixels are deactivated, then it will appear black and when all the sub-pixels are
activated then it will appear white. By changing the levels of each light, different colour
combinations are achievable. This article discusses an overview of LCD 16X2 & it’s working
with applications.

33
Push Buttons
A push-button (also spelled pushbutton) or simply button is a simple switch mechanism to
control some aspect of a machine or a process. Buttons are typically made out of hard
material, usually plastic or metal.[1] The surface is usually flat or shaped to accommodate the
human finger or hand, so as to be easily depressed or pushed. Buttons are most often biased
switches, although many un-biased buttons (due to their physical nature) still require
a spring to return to their un-pushed state. Terms for the "pushing" of a button
include pressing, depressing, mashing, slapping, hitting, and punching.

Buzzer 5V
Buzzer that operates around the audible 2kHz range. You can drive it directly from a 5V PIC
or Arduino to generate the tones.

34
3.6 SOFTWARE DESIGN OF THE PROPOSED SYSTEM
The major software part of the Finger print attendance system is the graphics designed
interface to take in the data from the Arduino, monitor and manage the database of the
proposed finger print attendance system. The design of the interface consists of the features
needed to control the operation of the system and the interaction. These features are;
Dashboard: The dashboard is to display the information about the ID registered, number of
ID registered, and system time. The Software used and Requirements for this project include:
Operating system: Windows O.S and C Programming Language

3.6.1 Windows O.S


Windows is a graphical operating system developed by Microsoft. It allows users to view and
store files, run the software, play games, watch videos, and provides a way to connect to the
internet. It was released for both home computing and professional works.

3.6.2 C Programming Language


The C Language is developed by Dennis Ritchie for creating system applications that directly
interact with the hardware devices such as drivers, kernels, etc. C programming is considered
as the base for other programming languages, that is why it is known as mother language. C
language is considered as the mother language of all the modern programming languages
because most of the compilers, JVMs, Kernels, etc. are written in C language, and most of the
programming languages follow C syntax, for example, C++, Java, C#, etc. It provides the
core concepts like the array, strings, functions, file handling, etc. that are being used in many
languages like C++, Java, C#, etc. C language is a system programming language because
it can be used to do low-level programming (for example driver and kernel). It is generally
used to create hardware devices, OS, drivers, kernels, etc. For example, Linux kernel is
written in C.A procedure is known as a function, method, routine, subroutine, etc. C can also

35
be a procedural language program which specifies a series of steps for the program to solve
the problem. A procedural language breaks the program into functions, data structures, etc. In
C, variables and function prototypes must be declared before being used. A structured
programming language is a subset of the procedural language. Structure means to break a
program into parts or blocks so that it may be easy to understand. In the C language, we break
the program into parts using functions. It makes the program easier to understand and modify.
C is considered as a middle-level language because it supports the feature of both low-level
and high-level languages. C language program is converted into assembly code, it supports
pointer arithmetic (low-level), but it is machine independent (a feature of high-level). A Low-
level language is specific to one machine, i.e., machine dependent. It is machine dependent,
fast to run. But it is not easy to understand. A High-Level language is not specific to one
machine, i.e., machine independent. It is easy to understand.

3.6.2.1 Programming
These different parts of the system represented the different layers of an application. This
included coding an interface for receiving the user database(input), creating a python script to
pass the database data to the database, and program a system where the parameters from the
python file could be read and executed. For the programming, we used Arduino IDE and
create a new file using terminal (sudo nano fingerprint attendance.py). first we Import
Arduino, then we set numbering of pins according to BOARD pin numbers and also define
some pins as input or output thou this required for a single sensor.

#include<SoftwareSerial.h>
SoftwareSerial fingerprint(2,3)
#include "Adafruit_Fingerprint.h
uint8_t id;
Adafruit_Fingerprint finger = Adafruit_Fingerprint(&fingerPrint);
finger.begin(57600);
uint8_t getFingerprintEnroll()
{
int p = -1;
delay(2000);
while (p != FINGERPRINT_OK)
{

36
p = finger.getImage();
switch (p)
{
case FINGERPRINT_OK:
// Serial.println("Image taken");
break;
case FINGERPRINT_NOFINGER:
// Serial.println("No Finger");
break;
case FINGERPRINT_PACKETRECIEVEERR:
// Serial.println("Communication error");
break;
case FINGERPRINT_IMAGEFAIL:
// Serial.println("Imaging error");
break;
default:
// Serial.println("Unknown error");
break;
}
}

37
CHAPTER FOUR

IMPLEMENTATION AND TESTING

4.1 SYSTEM IMPLEMENTATION

The implementation of the finger print attendance system using Arduino uno basically
depends mostly of the hardware unit which where the major processing and control of the
system.

The implementation of the system hardware is first implemented on the bread board then
tested to verify the functioning of the system hardware before the implementation on the
printed circuit board (PCB). The following steps were taken to realize the complete
implementation of the hardware.

4.1.1 MAIN CIRCUIT IMPLEMENTATION

The first step taken for the hardware implementation is the placement of the Arduino Uno
controller.

4.1.2 DISPLAY UNIT INSTALLATION AND IMPLEMENTATION

In this step the LCD screen has 16-terminals and out of the 16-terminals we made use of only
12-terminals. The 12-terminals are labelled as follows

Pin1=VSS(Ground)

38
Pin2=VDD(+5Volts)

Pin3=VE (Contrast V)

Pin4 =Register select

Pin5 =Register read

Pin6=Enable

Pin11=Data Pin4

Pin12= Data Pin5

Pin13= Data Pin6

Pin14= Data Pin7

Pin15=LED Positive

Pin16=LED Negative

The input connection of the LCD Display to the main circuit board is shown below

The LED Positive and LED Negative are both connected to the same power source that is
powering the finger print sensor which comes from the microcontroller board

6-terminal pins are connected to the microcontroller and the remaining 4- terminal pins are
connected to the GND and Vin coming from the microcontroller (i.e. 3-terminal are
connected to the GND coming from the microcontroller and the remaining last terminal is
connected to the Vin(5V) coming from the microcontroller.

39
4.1.3 PUSH BUTTONS UNIT PREPARATION IMPLEMENTATION

The connection of the push buttons is connected directly to the Arduino Uno board at the
Analog In port on the board. The push terminals vary from different models; some have four
terminals but standardly they have 2 terminals.

The connection of the push button to the main circuit is as follows:

One terminal of the push buttons is connected to the GND of the circuit while the other
terminal is connected is connected to the Arduino Uno board at the Analog in port of the
board which are A0, A1, A2 and A3 respectively.

The action each push button differs from the others in the sense that each button performs a
different task depending on how they are used. The action of the 4 push button which are
used to control the entire system is as follow:

 Register/Back Button– Used for enrolling new fingerprints as well as reversing the
back process or going back.
 Delete/OK Button – This button is used for deleting the earlier stored fingerprint
system as well as granting access as an OK selection.
 Forward Button – Used for moving forward while selecting the memory location for
storing or deleting fingerprints.
 Reverse Button – Used for moving backward while selecting memory location for
storing or deleting fingerprints.

40
41
4.1.4 DS3231/DS1307 RTC MODULE UNIT PREPARATION AND
IMPLEMENTATION

The connection of the real time clock to the main circuit board is done at the input terminal
connection of the analogue in of the Arduino Uno. The RTC module has 6-terminals which
2pins are not compulsory to use, it has mainly 4 pins in which the four pins are given out on
the side of the module sharing the same name, and they are labelled as follows VCC, GND,
SDA (serial data pin (12C interface)), SCL (serial clock pin), SQW and 32K.

The input connection of the RTC module to the main circuit is as follows

 The VCC terminal is connected to any point with 5V source linked to the port labelled
5V on the microcontroller (Arduino Uno).
 The GND terminal is connected to the main circuit board ground (GND) linked to the
port labelled GND on the Arduino Uno.
 The SDA terminal is connected directly to the microcontroller which the port on the
Analog in port (i.e. A4) of the Arduino Uno
 The SCL terminal is connected directly to the A5 port on the Analog In port on the
Arduino Uno.

42
4.1.5 IMPLEMENTATING THE FINGER PRINT MODULE

In this step, the finger print module has a 6–terminal for input control and of the 6-terminals
1-terminal to give the sensor a 3.3v to the sensor instead of 5v, naturally 1-terminal for the
common ground and the last pin for a regulated 5v DC. The input terminal is labelled VCC
(5V), GND, TXD, RXD, TOUCH, Vin(3V). The connection of the finger print sensor is done
by connecting the finger print sensor terminal to the finger print port on the main circuit
board. The finger print terminals are labelled as mentioned before as Vin, GND, TXD, RXD,
TOUCH respectively. The finger print sensor is connected to the Vin and GND of the
microcontroller (Arduino Uno) to power the sensor while the remaining terminals are
connected to the microcontroller (Arduino Uno) to the main circuit board. The connection is
as follows.

 The RXD terminal of the finger print sensor is connected directly to the -3 port on the
microcontroller (Arduino Uno).
 The TXD terminal of the finger print sensor is connected directly to the -2 port on the
microcontroller (Arduino Uno).
 The VCC terminal of the finger terminal is connected to any point with 5V source
linked to the port labelled 5V on the microcontroller.
 The GND terminal is connected to any point on the main circuit board grounded
 (GND) linked to the port labelled GND on the Arduino microcontroller.

43
44
Base on every step of the hardware implementation, the connected hardware is being tested
before another component is connected. The successful testing of each connected hardware’s
leads to connecting component to the completion or the implementation of the system
hardware. The expected result is gotten when conducting those tests. During the testing
exercise, a multi-meter is used to measure the voltage power rails entering every component
to ensure the appropriate distribution of the power to every component.

45
4.2 SYSTEM HARDWARE UNIT TESTING AND RESULT

The system testing carried out is conducted on both the implemented system hardware and
software. Below tables shows the list of testing and the results of the test conducted.

S/ COMPONENTS STEPS EXPECTED TEST RESULT


N OUTPUT
1 Arduino Uno This was connected to the The Arduino The Arduino
laptop or system. Uno is to Uno powered
upload the ON and the
stored program was
fingerprint on put into the
the system. microcontroller.
2 LCD 16x2 It was connected to the The LCD The LCD
Arduino Uno on the right should powered ON
input pins for the display. illuminate and and illuminate
display the light and the
graphical user display user
interface. interface.
3 RTC It was connected to the The RTC The RTC
Arduino Uno on the right module is to module
input. display the time displayed the
46
and date of the current time and
current time and date as
date. expected.
4 Fingerprint Sensor It was connected directly The fingerprint The fingerprint
to the Arduino Uno on sensor is to be was able to
the right input. able to capture capture
finger print. fingerprint and
distinguish
between the
different fingers
captured.
5 Push Buttons It was connected to the The push button The push button
grounds and also to the is to control the was able to
Arduino Uno. entire system. control the
system to
register, delete
and other
controls.
6 Power Source The Arduino Uno uses a To supply All the devices
5v adapter or a 9V power to the powered ON as
adapter to power on the whole circuit soon as the
microcontroller. and needed circuit
components. connected to it.
Table 4.1: System Hardware Unit Testing

4.3 SYSTEM SOFTWARE UNIT TESTING AND RESULT

47
Table 4.2: System Software Unit Testing

S/ TEST STEPS EXPECTED TEST RESULT


N OUTPUT
1 Dash Board Connect the Arduino Uno to The dash board The result was
the system via the COM should display the proven positive
port. interface for as the end result
registering was achieved
fingerprints.
2 Register Unit Click on the register to enter The register unit The result was
the interface. is to allow one to proven positive
register important as the end result
details about the was achieved.
attendant to be
registered.
3 Database Unit After registering click on The database unit The result was
the database. is to show the proven positive
registered as the end result
attendant details. was achieved.

4.4 HARDWARE SYSTEM PACKAGING

The packaging of the Fingerprint attendance system using Arduino Uno was done with a
plastic (PVC) square container of length 22cm and breadth 12cm. The LCD display unit is
mounted in slant position on the top of the container, the same thing is done also to the
Fingerprint sensor as it is also mounted facing outward on the top of the container just below
LCD unit. Holes are also punctured to the side of the Fingerprint sensor to fit the push
buttons which are used for controlling the whole system.

At the bottom edge the container holes are created to accommodate the fitting DC power jack
and another hole beside the hole for the COM port for connecting it to a system.

48
The weight of the system unit is less than 4kg.

4.5 Hardware Design

The design of the system to meet the requirement to satisfy the aim of the project work is as
shown in the figure below;

49
4.5 SOFTWARE USER INTERFACE

As seen in diagram above the Finger-print attendance system is lunched by pluging the
device to a laptop because without the device the application wont load to this page . This is
the dashboard of the software that is operating the fingerprint attendance system. To run the
Fingerprint attendance application, just plug the device to laptop and the detect device button
is clicked to detect the device if the laptop is seeing the device

50
The diagram above is the database interface of the software, after someone has been
registered this is where the information of the student will be saved and stored for easy access
to identify the ID number, Matric No and other information of that particular student and
other information of other student.

The interface above shows the page for registerting a new student ( enrolling a new finger
print) is shows the needed blocks of information to be filled concerning a new student (ID) to
be registered. After the information has been put it, the Register Fingerprint button is clicked
and the information is stored in the database

51
4.6 PROBLEMS ENCOUNTERED

1. The Arduino was not easy to work on since it needed C programming to program the
Arduino being the fact that it is a programming language that’s not easy to write in.
2. The finger print scanner was mostly disconnecting from the Arduino making it hard to
collect information even after successfully writing the code on the Arduino
responsible for communicating with the sensor.
3. The LCD display also gave a bit headache to displaying the information collected and
the id number registered in the system
4. Time accuracy was also a problem even after getting a real time clock getting it to
read the correct time and date was a hassle since it was only reading a date that was
backed and not correct
5. Data was not always accurate that was inputted system and it wasn’t easy to retrieve
the data that was put in wrongly
6. Making the interface other than the device itself where the data were saved in order to
access the data stored was a major issue cause the data had to be a database format
and be arrange well for easy access in the interface to be made
7. Also syncing the interface with the device (the fingerprint attendance system) to make
registration to be done from the interface other than the device was also a problem
which was conquered by constant tries and errors.

52
BILLS OF ENGINEERING MEASUREMENT AND EVALUATION (BEME)

The detail of the costs incurred during the development of this project are shown below

S/N ITEM DESCRIPTION QUANTITY UNIT PRICE AMOUNT (₦)


(₦)
1 Arduino Uno 1 6,840 6,480
2 LCD monitor 1 2,400 2400
3 Push Button 4 570 2,280
4 Buzzer 1 120 200
5 RTC 1 4,200 4,200
6 Finger print sensor 1 20,400 20,400
7 Casing (packaging) 1 4,500 4,500
8 Hot gun 1 2,000 2,000
9 Bread board 1 900 900
10 Vero board 1 300 300
11 Jumper Wires 1 1,440 1,440
12 Transport 3,000 3,000
Total 48,100

53
CHAPTER FIVE

RECOMMENDATION AND CONCLUSION

5.1 RECOMMENDATION

The project is recommended for usage in the office, classroom and other big organization
that has need for keeping tracks of their attendance system. The finger-print attendance
will significantly rise the potential for improving social interaction in the office of various
organization, which will enhance information about a worker or student depending on the
area or organization in which the device is used. Similarly, how traditionally an
attendance list has to be made in the organization or school and each person had to always
sign in by writing their names which can prove to be tiring sometimes and also prove to
be reliable in keeping track of when each worker or student get to work or to class. To be
able to keep record of every worker or student this is a better choice at keeping records
effortlessly and accurately because the time of arrival here is accurate and can’t be altered
like the traditional method which the worker or student can have someone else sign in for
them or change their time of arrival. Using this method gives room for improving the
worker and student workability and therefore improves their attendance calendar.

5.2 CONCLUSION

A Finger-print attendance system can be regarded as a consumer electronics product.


Directly speaking the attendance system replaces paper attendance by having to make use
of the persons biometric to sign-in and out using biometrics which saves a lot of time
needed to be writing their names and time of exit with their signature which isn’t really
reliable in a big organization where a slight change won’t reflect or even won’t be noticed
in a case of having to manually Sign-in and out. Due to rapid advancement in the security
systems technology have ushered in a new security age for biometric means of security
indicating a revolution in the security business as well as the beginning of the demise of
the traditional attendance and other security form that could be bent to favor in certain
scenario. Simultaneously, rapid advances in security (biometric) technology significantly
alter the other of manual-related attendance structure.

54
5.3 LIMITATIONS OF THE PROJECT

The project is limited to some features that may actually increase the efficiency of the
system if utilized and functioning. These features consist of the use of cloud storage and
more storage to increase the number of people that can be registered and stored because
the current system can’t save more than hundred ID which in some organization they are
not even up to that number but In cases of what to check the database which if stored in
cloud will make it for one to access the data from anywhere easy and not always having
the device plug into a laptop to access the database which can be a hassle most times but
if the use of cloud is implemented.

It is also crucial to keep in mind that, like any electronic device, this project might
occasionally experience electrical problems. This project requires access to and utilization
of some electricity in order to provide a maximum, efficient and uninterrupted power
supply because it isn’t a pretty big electronic equipment that does not rely on a battery as
its major power source.

5.4 DELIMITATION OF THE PROJECT

Massive amounts of storage space make it practical to hold hundred IDs at most. This can
lead to issues with organizing and labelling them.

Users can end up with unregistered ID stored in multiple places, for example: registration
on different component, devices. This makes them difficult to find such ID and also easy
to lose the problem is even worse because many users can end up registering more than
one finger which can be a hassle in the database. The entire process can be overwhelming
for many.

55
REFERENCES

Harshadbhai & Singh (2016) “Study on Fingerprint Based Attendance System” Available at:
https://www.academia.edu/30938829/Study_on_Fingerprint_Based_Attendance_Syst
em [Accessed September 23, 2022]

Krishna Prasad K (2018), “ABCD Analysis of Fingerprint Biometric Attendance


Maintenance System” Available at: https://papers.ssrn.com/sol3/papers.cfm?
abstract_id=3279373 [Accessed September 23, 2022]

Problems with Manual Attendance Tracking: Why You Should Change (2021) Available at:
https://blog.camelohq.com/manual-attendance-vs-software/ [Accessed September 23,
2022]

Sifatnur, Mahfuzur & Mijanur (2018): “Automated Student Attendance System using
Fingerprint Recognition. “Edelweiss Applied Science and Technology” Available at:
https://www.semanticscholar.org/paper/Automated-Student-Attendance-System-
using- [Accessed September 23, 2022]

Clavereau, M. (2011). Absence: time to tackle the root causes. Available at:
http://www.hrmagazine.co.uk [Accessed October 3, 2022]

Ekhlas Ghaleb Abdulkadhim (2021), “Design and Develop an Attendance System Based on
Fingerprint and Arduino Board” Available at:
https://iopscience.iop.org/article/10.1088/1742-6596/1804/1/012011 [Accessed
October 5, 2022]

J.Chandramohan et al. (2017) "Attendance Monitoring System of Students Based on


Biometric and GPS Tracking System” Available at:
https://www.academia.edu/32089922/Attendance_Monitoring_System_of_Students_
Based_on_Biometric_and_GPS_Tracking_System [Accessed October 5, 2022]

56
Kadry S. and Smaili M. (2010): Wireless Attendance Management System based on Iris
Recognition. Scientific Research and Essays Vol. 5(12), pp. 1428-1435. Available at:
http://www.sciepub.com/reference/21354 [Accessed October 3, 2022]

Kiran Bajpai (2021), "Manual and Automated Attendance system comparison" Available at:
https://www.softwaresuggest.com/blog/manual-vs-automated-attendance-system-
pros-cons/# [Accessed October 3, 2022]

Krishna Prasad K (2018), “ABCD Analysis of Fingerprint Biometric Attendance


Maintenance System” Available at: https://papers.ssrn.com/sol3/papers.cfm?
abstract_id=3279373 [Accessed October 3, 2022]

Mr. John Mashurano 2013. ATM Systems Authentication Based on Fingerprint Using ARM
Cortex-M3. Available at: https://www.ijert.org/atm-systems-authentication-based-on-
fingerprint-using-arm-cortex-m3 [Accessed October 5, 2022]

Open HRMS (2019), "Significance of Biometric Time and Attendance System" Available at:
https://www.openhrms.com/blog/significance-of-biometric-time-and-attendance-
system/ [Accessed October 6, 2022]
Seng Chun Hoo and Haidi Ibrahim (2019), “Biometric-Based Attendance Tracking System
for Education” Available at: https://www.hindawi.com/journals/js/2019/7410478/
[Accessed October 5, 2022]

Shoewu, O., and Idowu, O.A. (2012): “Development of Attendance Management System
using Biometrics”, Pacific Journal of Science and Technology, Pp. 300-307.
Available at:
https://www.researchgate.net/publication/328416288_Development_of_Attendance_
Management_System_using_Biometrics [Accessed October 6, 2022]

Circuit Digest. (2022). “16x2 LCD Display Module-Pinout & Datasheet” Available at:
circuitdigest.com

Components101(2021). “DS3231 RTC Module Pinout, Configuration, Example Circuit &


Datasheet” Available at: components101.com

57
ElectroDuino. (2022) “Introduction to DS3231 RTC Module
JavaTpoint. (2011) “C programming Language Tutorial Learn C Programming Language
Tutorial” Available at: javatpoint

The Builders supply. (2022) “Push buttons: ASP, RCI and more” Available at:
www.thebuilderssupply.com

Sunrom Ahmedabad (2004-2022). “Finger Print Sensor R307(New R305)” Sunrom


Electronics

WatElectronics. (2022) “What is LCD 16x2; Pin Configuration, Commands, Interfacing & Its
Applications” Available at watelectronics.com
Wikipedia. (2018) “Arduino Uno” Available at: https://en.wikipedia.org/wiki/Arduino

58

You might also like