0% found this document useful (0 votes)
54 views81 pages

My Project 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views81 pages

My Project 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

A SMART BASED UNIVERSITY ATTENDANCE SYSTEM USING FINGERPRINT

AUTHENTICATION TECHNIQUES (USING UNIBEN AS CASE STUDY)

BY

ISEGHOHIMEN TIMOTHY OSE

PSC1908877

A PROJECT REPORT SUBMITTED TO THE DEPARTMENT OF COMPUTER

SCIENCE, FACULTY OF PHYSICAL SCIENCES, UNIVERSITY OF BENIN, BENIN

CITY

MAY 2024
A SMART BASED UNIVERSITY ATTENDANCE SYSTEM USING FINGERPRINT

AUTHENTICATION TECHNIQUES (USING UNIBEN AS CASE STUDY)

BY

ISEGHOHIMEN TIMOTHY OSE

PSC1908877

A PROJECT REPORT SUBMITTED TO THE DEPARTMENT OF COMPUTER

SCIENCE, FACULTY OF PHYSICAL SCIENCES, UNIVERSITY OF BENIN, BENIN

CITY

IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF A

BACHELOR OF SCIENCE (B.Sc.) DEGREE IN COMPUTER SCIENCE

MAY 2024
CERTIFICATION

This is to certify that this project work was carried out by ISEGHOHIMEN TIMOTHY OSE

with Matriculation Number PSC1908877 under my supervision. It is adequate and satisfactory,

both in scope and content, for the award of Bachelor of Science (B.Sc) Degree in Computer

Science of the University of Benin

DR EMMANUEL NWELIH DATED


Project Supervisor

I
APPROVAL

This project work is hereby approved in partial fulfillment of the requirements for the award of

Bachelor of Science (B.Sc.) Degree in Computer Science from the University of Benin.

_________________________________ __________________

PROF GODSPOWER O. EKUOBASE PHD DATE


Head of Department

II
DEDICATION

This project is dedicated to God Almighty for giving me the strength and wisdom to see it

through to completion, and even throughout my stay in the University of Benin (UNIBEN). It is

also dedicated to my parents; Mr and Mrs Iseghohimen and my sibling for their love, support and

guidance throughout my academic journey.

III
ACKNOWLEDGEMENT

My utmost acknowledgement goes to God Almighty for giving me the strength, wisdom and

direction throughout my academic journey. I would like to express my gratitude to my project

supervisor Dr Emmanuel Nwelih for his consistent guidance towards ensuring the successful

completion of this project.

I would also like to specially thank my project coordinator Prof A.A Imavian, and other lecturers

in the Department of Computer Science who I have been opportune to cross paths with, and have

impacted me immensely these past few years: Prof. G.O. Ekuobase, Dr. F.O. Oliha, Prof. A.A.

Imiavan, Prof. (Mrs.) V.V.N. Akwukwuma, Prof. F.I. Amadin, Prof. (Mrs.) S. Konyeha, Prof.

(Mrs.) V.I. Osubor, Dr. (Mrs.) Aziken, Dr. F.O. Chete, Dr. (Mrs) R.O. Osaseri, Mr. P. E.B.

Imiefoh, Mr. I.E. Obasohan, Mr. S.O.P. Oliomogbe, Mr. K.O. Otokiti, Mr. I.E. obayagbonna,

Mrs. R.I. Izevbizua, Mr. E.C. Igodan, Mr J. Okhuoya, Prof. F.A.U. Imouokhome, Dr. E. Nwelih

and Mr. D.N. Idehen.

Finally, I also want to appreciate those who contributed to the success of this project: Prosper

Kadiri, Felix Frank-Felix Ikechukwu, Precious Mercy Ene-Etuk, Nwapali Ehimah Jedidiah,

Agangan Gabriel, Ikogwe Assurance, Mercy Chichi Okolie and Benedict I would also like to

thank my family and friends for their support, words of encouragement, and consistent guidance

throughout this project.

IV
TABLE OF CONTENT

CERTIFICATION .........................................................................................................................I

APPROVAL ..................................................................................................................................II

DEDICATION ............................................................................................................................ III

ACKNOWLEDGEMENT ..........................................................................................................IV

LIST OF FIGURES ................................................................................................................. VIII

LIST OF TABLES ...................................................................................................................... IX

ABSTRACT .................................................................................................................................. X

CHAPTER ONE ............................................................................................................................1

INTRODUCTION ......................................................................................................................... 1

1.1 Background Study ..................................................................................................1

1.2 Motivation Of Study ...................................................................................................... 3

1.3 Statement Of Problem ....................................................................................................4

1.4 Aim And Objectives .......................................................................................................4

1.5 Significance Of The Project ........................................................................................5

1.6 Scope Of Study ............................................................................................................ 5

1.7 Definition Of Terms ........................................................................................................6

CHAPTER TWO ...........................................................................................................................8

LITERATURE REVIEW .............................................................................................................8

2.0 Attendance Management System ...................................................................................8

2.1 Biometric .........................................................................................................................9

2.1 Biometric System For Attendance ............................................................................... 12

V
2.2 Fingerprint System For Attendance ............................................................................ 14

2.2.1 Pattern Of Fingerprints ...................................................................................... 17

2.3 System Overview .......................................................................................................... 21

CHAPTER THREE .................................................................................................................... 23

SYSTEM ANALYSIS AND DESIGN METHODOLOGY ..................................................... 23

3.0 Introduction ........................................................................................................ 23

3.1 Analysis Of The Existing Attendance System. ............................................................23

3.1.2 Benefit Of The Existing Attendance System. .......................................................24

3.1.3 Limitations Of The Existing Attendance System. ................................................ 24

3.2 Analysis Of The Proposed System .................................................................................25

3.2.1 Design Goals Of The Proposed System ..............................................................25

3.2.2 Functional Requirements Of The Proposed System ............................................25

3.2.3 Nonfunctional Requirements Of The Proposed System .....................................26

3.2.4 Security ................................................................................................................ 26

3.3 Data Collection .............................................................................................................. 26

3.4 Exploration Of Waterfall Model ................................................................................... 29

3.5 Design Of Proposed System ........................................................................................ 30

3.5.1 System Architecture Description .......................................................................30

3.5.2 Utilization Of Modeling Techniques ................................................................. 31

3.6 The Fingerprint Module ................................................................................................ 36

3.7 System Architectural Design ........................................................................................ 36

CHAPTER FOUR ....................................................................................................................... 39

SYSTEM IMPLEMENTATION AND DOCUMENTATION ................................................39

VI
4.0 Introduction ....................................................................................................................39

4.1 Software Implementation Tools ....................................................................................39

4.2 Main Features Of The Software ....................................................................................40

4.3 Frontend Development ..................................................................................................46

CHAPTER FIVE .........................................................................................................................48

SUMMARY AND CONCLUSION ............................................................................................48

5.1 Summary ..................................................................................................................... 48

5.2 Conclusion ................................................................................................................... 48

5.3 Recommendations ........................................................................................................49

REFERENCES ............................................................................................................................ 50

APPENDIX .................................................................................................................................. 54

VII
LIST OF FIGURES

Figure 2.1 The Arch( https://shutterstock.com/fingerprint/the-arch ) ...........................................18

Figure 2.2 The Whorl(https://prateekvjoshi.com/2012/07/22/fingerprint-recognition ) ...............19

Figure 2.3 The Loop(https://prateekvjoshi.com/2012/07/22/fingerprint-recognition/ ) ............... 20

Figure 3.1 Diagram showing the percentage of students that will welcome the new system…..28

Figure 3.2 Diagram showing waterfall method………………………………………………….29

Figure 3.3 Diagram showing system architectural design………………………………………31

Figure 3.4 Flowchart of the System……………………………………………………………..33

Figure 3.5 Diagram showing use case…………………………………………………………..34

Figure 3.6 Diagram showing student registration………………………………………………35

Figure 4.1 Login Screen………………………………………………………………………...41

Figure 4.2 Sign up Screen……………………………………………………………………....42

Figure 4.3 Home Page…………………………………………………………………………..43

Figure 4.4 Registration Page……………………………………………………………………44

Figure 4.5 Student List Page……………………………………………………………………45

Figure 4.6 Registration Page Code……………………………………………………………..46

Figure 4.7 User Authentication Page Code…………………………………………………….47

VIII
LIST OF TABLES

Table 1.1 Gender of respondents ..................................................................................................26

Table 1.2: Age of respondents…………………………………………………………………...27

Table 1.3: Showing the percentage of student who has signed Attendance for their course mate………27

Table 1.4: Showing the Percentage of reliability on the current attendance system…………….28

IX
ABSTRACT

The aim of this study was to develop an Attendance system for The Computer Science

department of the university of Benin which allows for a smooth running of attendance tracking

in the department. This study identified the various users and system requirements, also specify

on the system design and implementation. A review of the literature was done to identify and

understand existing attendance systems.

The user and system requirements of the system were identified from researches done from

existing systems. The system design was specified using UML diagrams which include uses case

diagram, flowchart diagram, class diagram. The development of the system was done using

JAVASCRIPT, REACTNATIVE AND EXPO for the front-end AND FIREBASE for the

database. The study concluded that using a Biometric base attendance system the university will

be able to get a smooth and accurate attendance recording from each service and make it easier

for attendance taking thereby eliminate the existing system in University of Benin.

X
CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND STUDY

Bio-metrics have been around for thousands of years; it has progressed from crude means

of categorization to being authenticators of identification employing a variety of modalities

throughout the previous few millennia. So, let us take a look back in time to see where

biometrics has been and how far we've gone. While the earliest descriptions of biometrics can be

traced back to 500BC in the Babylonian kingdom, the first record of a biometric identifying

system is from the 1800s in Paris, France. Alphonse Bertillon invented a technique for

categorizing and comparing convicts based on unique body measurements. While this method

was far from perfect, it was the first to employ distinct biological characteristics to authenticate.

(Admin, 2021).

Fingerprints have captivated humanity for centuries, and their unique patterns have held

significance across cultures. But the journey of using fingerprints for biometric identification and

security is a relatively recent development, with fascinating twists and turns. While their specific

use for identification remains unclear, the earliest references to fingerprints date back to 3000

BC in Babylonian clay tablets and even appear in ancient Egyptian and Chinese texts.

The modern era of fingerprint biometrics began in the 1880s. Henry Faulds, a Scottish physician,

is credited with proposing the use of fingerprints for personal identification. Around the same

time, Sir William Herschel, an administrator in British India, started using fingerprints on

contracts for verification. By the early 20th century, the advantages of fingerprints became

1
evident. Sir Edward Richard Henry developed a robust fingerprint classification system, paving

the way for widespread adoption.

Initially, fingerprint impressions were captured on ink-stained cards. The 20th century saw the

development of electronic scanners, making the process faster and more efficient. Initially used

primarily in law enforcement for criminal identification, fingerprint biometrics expanded to

various sectors like border control, immigration, and access control systems. The 21st century

witnessed the integration of fingerprint scanners into smartphones and other devices, offering

convenient and secure login options. (Lebi, D. A. (2021).

Fingerprint verification is one of the oldest known biometric techniques known but still the most

widely used because of its simplicity and good records of accuracy. It is a well-known fact that

every human being is born with a different pattern on their fingers and these features are used to

identify and differentiate between two different persons. The benefit of this application in an

educational institute or organization cannot be overemphasized. The fingerprint recognition and

verification technique has been adopted to replace the conventional method such as sign-in

sheets, Name and Mat No as it saves time and eliminates all the set-backs identified with the

attendance register booklet. A fingerprint detecting device needs to be placed in each classroom

or exam hall, and students would be required to swipe their finger across the sensor so as to

indicate their presence in the class or exam. The student records are stored in the database for

verification. The moment a student swipes a finger across the scanner, a check would be carried

out for the student. (Ezema et al., 2019)

While fingerprint recognition technology has shown success in various domains, there are

challenges to overcome, such as privacy concern regarding biometric data collection, technical

issues with fingerprint scanner, user acceptance and adaptation. By addressing these challenges

2
and incorporating user-friendly features, this project will contribute to existing knowledge by

providing solutions to these challenges.

1.2 MOTIVATION OF STUDY

This research project focuses on addressing the challenges associated with attendance

management in universities by leveraging on fingerprint recognition technology. Traditional

methods of tracking attendance are often time-consuming, error-prone, and lack security

measures.

The main motivation behind this research is to save valuable time for both students and lecturers.

Manual attendance-taking methods, such as sign-in sheets or writing of name and mat No, can be

tedious, error prone, lack credibility and disrupt the learning environment. By implementing

fingerprint recognition technology, we aim to streamline the attendance process, allowing

teachers to dedicate more time to teaching and students to focus on their studies. Improving the

accuracy and reliability of attendance records is another key objective of this research.

Traditional methods are susceptible to errors, such as students forgetting to sign in or marking

attendance for absent classmates. Through the use of fingerprint recognition technology, we can

significantly reduce these errors and ensure more precise and trustworthy attendance records.

Addressing the issue of proxy attendance is also a significant focus of this research. Proxy

attendance occurs when students mark attendance for absent classmates, leading to inaccurate

records. By utilizing fingerprint recognition technology, we can uniquely identify individuals

based on their fingerprint, enhancing the security and integrity of the attendance process.

3
1.3 STATEMENT OF PROBLEM

A university is a large body that consists of staff, students as well as people who go about their

businesses. As the number of staff and students grows, so does the number of names on the

attendance list, keeping track of these attendance papers becomes a difficulty for both the class

rep and the lecturer, and no suitable backup is made in case of any external factor. Most colleges

still employ the conventional method, mostly in lecture halls and laboratories. Whereby the

teacher or lecturer will hand out a sheet of paper with a list of students' names to sign, or in

certain situations, the students must fill it out with their name, student ID, and matriculation

number to demonstrate their attendance in a specific class. In this manner, fabrication of the

student attendance list is prevalent. Assume a student is absent, but another student can sign in

their place. To avoid this problem, it is required to create a fingerprint authentication system for

pupils. Biometric recognition will be utilized to track and maintain track of every student's

attendance in a certain class.

1.4 AIM AND OBJECTIVES

The primary aim of this research is to develop a smart-based staff and student attendance system

using fingerprint recognition techniques that will enhance the efficiency and accuracy of

attendance management, and also improve security in universities. To achieve this aim, the

objectives are to:

1. Evaluate the present method of attendance tracking to find flaws and fault.

2. Develop and design a robust fingerprint recognition model and an intuitive user interface.

3. Implement a secure and scalable database system and evaluate system performance.

4
1.5 SIGNIFICANCE OF THE PROJECT

As the range of students who use fingerprints Biometrics increases, the use of paper and pen to

sign in and out of classes, exam halls, programs, and all other academic-related activities where

attendance is required will be completely eliminated, which means we will no longer be at risk of

losing data due to misplacing the attendance sheet or any other type of damage to the written

records. Tracking and monitoring attendance time is time-consuming, and this project will

automate that process and make the information available at all times and easy to access. Most

importantly, it eliminates errors in attendance data and minimizes forgeries and fraud to a bare

minimum.

This approach will not only assist students but also the university management in detecting treats

and swiftly correcting the problem, as well as exposing and apprehending imposters, so

eliminating all of the disadvantages.

1.6 SCOPE OF STUDY

This study focuses on creating a Fingerprint Based Attendance system to Monitor staff and

students while also enhancing attendance by utilizing fingerprint as a means of verification for

evidence of attendance in a class.

This project entails the Evaluation of the current system in place, a new system would be

designed and developed using Different fingerprint recognition algorithms, such as Minutiae-

Based Algorithms, Pattern-Based Algorithms, Local Binary Pattern (LBP) and more, will be

evaluated to determine the most suitable algorithm for the attendance system.

A diverse data set of student fingerprint will be collected to train and validate the fingerprint

recognition model. Ethical considerations will be taken into account, and appropriate consent and

5
privacy measures will be implemented. The dataset will include a representative sample of

students from different backgrounds, ensuring inclusivity and fairness. The fingerprint

recognition model will be trained using the collected dataset. The performance of the model will

be evaluated using metrics such as accuracy, precision, and recall.

1.7 DEFINITION OF TERMS

The major terms that will be encountered in this report are defined below

a) Fingerprints (Technological): Fingerprinting is a kind of biometrics, which is the science of

identifying persons based on their physical or biological traits. Even identical twins do not

have the same fingerprints. Unless the deep or 'basal' layer is lost or purposely altered by

plastic surgery, fingerprints do not change as we age. Fingerprint patterns are classified into

three types: arches, loops, and whorls. Each fingerprint is unique because of the form, size,

quantity, and arrangement of minute minutiae in these patterns. (INTERPOL)

b) Biometrics: Biometrics is the measuring and statistical analysis of people's unique physical

and behavioral features. The technology is primarily used for identification and access

control, as well as identifying persons who are under observation. The underlying idea of

biometric authentication is that every individual may be reliably recognized by intrinsic

physical or behavioral attributes. The term biometrics is derived from the Greek word’s bio,

meaning life, and metric, meaning to measure. (Gillis et al., 2021)

c) Student (University): University students are individuals who are enrolled in a university

and are pursuing higher education. They play a significant role in society and have the

potential to contribute to cognitive and intellectual development. (Wikipedia)

6
d) Staff (University): University staffs are employees of the system other than faculty,

academic staff, persons whose employment is a necessary part of their training, student

assistants, and student hourly help. (Wikipedia)

e) University: A university is an institution of higher (or tertiary) education and research which

awards academic degrees in several academic disciplines. Universities typically offer both

undergraduate and postgraduate programs. The word university is derived from the Latin

phrase universitas magistrorum et scholarium, which roughly means "community of teachers

and scholars" (Wikipedia)

f) Attendance system: Is a system that can keep track of the people that are

present in an organization, school, or workplace, and it may be applied in a variety

of ways. (INTERPOL)

7
CHAPTER TWO

LITERATURE REVIEW

2.0 ATTENDANCE MANAGEMENT SYSTEM

An attendance management system is a software that helps institutions manage and track

employee time and attendance data. It can automate several attendance-related tasks,

including monitoring attendance, figuring out working hours, controlling overtime, and

producing reports. The system typically comprises several parts: a clock-in/clock-out interface, a

database to store attendance data, and a reporting module to provide different attendance reports.

Other functions like scheduling, payroll integration, and leave management may also be present

in some attendance management systems. Due to its ability to increase employee attendance and

lower absenteeism, attendance management systems can be advantageous for institutions of all

sizes (HR matters, 2021).

To effectively monitor attendance, it is essential to replace obsolete methods with more

contemporary approaches. As a consequence, significant efforts and research have been

dedicated to this field, utilizing modern technologies (Ali et al, 2022). Particularly, researchers

have shown considerable interest in automatic identification of individuals through

distinguishing features like QR codes, IDs, passwords, face recognition, and fingerprint

recognition. This study offers a comprehensive review of recent advancements in automated and

intelligent attendance tracking systems. By critically assessing the literature in terms of

technology, application domains, and key findings, we aim to highlight the progress made in this

area (Ali et al., 2022).

8
Nabeel Salih Ali, Ahmed Hazim Alhilali, Hasanein D. Rjeib, Haider Alsharqi, and Basheer Al-

Sadawi (2022). "Automated attendance management systems: systematic literature review". This

article provides a comprehensive review of the literature on automated attendance management

systems. The authors discuss the different technologies that can be used for attendance tracking,

the advantages and disadvantages of each technology, and the challenges that need to be

addressed in order to develop more effective attendance systems.

Ashish Yadav and Sanjay Bhole (2019). "A comprehensive and systematic literature review on

the employee attendance management systems based on cloud computing". This article reviews

the literature on employee attendance management systems that are based on cloud computing.

The authors discuss the benefits of using cloud-based attendance systems, the different types of

cloud-based attendance systems that are available, and the challenges that need to be addressed

in order to implement these systems successfully.

Bawar Ali Abdalkarim and Devrim Akgün (2022). "A literature review on smart attendance

systems". This article reviews the literature on smart attendance systems. The authors discuss the

different types of smart attendance systems that are available, the advantages and disadvantages

of each type of system, and the challenges that need to be addressed in order to develop more

effective smart attendance systems.

2.1 BIOMETRIC

Biometrics is the science of establishing the identity of an individual based on their physical

attributes (Mwapasa et al.2020). It is an extremely effective way to identify individuals since the

users do not have to remember or possess anything. Biometrics are body measurements and

calculations related to human characteristics. Biometric authentication is used in computer

science/cyber security as a form of identification and access control. Biometrics are classified

9
into behavioral and physiological. Due to the high variance found in readings of behavioral

biometrics, physiological biometrics are more suitable for identification and can be used as a

standalone identification mechanism. In recent times, due to the significant improvement in

camera and processing quality, facial recognition has proved to be a very convenient and

effective biometric method of identification and authentication.

The use of biometric solutions is quickly outpacing that of manual and password-based

authentication. The three most crucial factors to take into account when creating and building

biometric solutions are security, privacy, and accuracy. This chapter presents a thorough analysis

that sheds light on the most recent advancements in biometric system security and privacy. This

chapter also outlines the difficulties of the future and current developments. Because biometric

credentials have several advantages over traditional authentication methods, they are becoming

more and more common in all relevant domains as a means of verifying an individual. The most

valuable relationship a user can have with his biometric credentials is through this authentication

mechanism; yet, the biometric system poses significant privacy and security risks in the event

that any of its features are hacked. In present time, we talk more about frauds and insecurity in

different sectors as well as the computer technologies to be applied in current trends to

ecommerce, banking, etc. There are two conventional ways of identifying individual. The first

one is knowledge-based method which is based on different knowledge such as PIN and

password to allow user to activate services. The second method is on token-based method. It can

be a piece of badge, identification paper, key, etc. Both ways are insecure as password can be

forgotten or guessed by others, and in other case, badge id or other identification may be lost or

stolen. Biometric attributes are an optional solution with two previous modes. The merit of using

biometric features is universal, unique, measurable, and permanent. (Singh .G. et al, 2021)

10
(Gillis et al, 2023) This article talked about using biometric to verify identity and grant access

management. The basic premise of biometric authentication is that every person can be

accurately identified by intrinsic physical or behavioral traits. Authentication by biometric

verification is becoming increasingly common in corporate and public security systems,

consumer electronics and point-of-sale applications. In addition to security, the driving force

behind biometric verification has been convenience, as there are no passwords to remember

or security tokens to carry. The two main types of biometric identifiers are either physiological

characteristics or behavioral characteristics. This article also points out the advantages and

disadvantages of using Biometrics which included the following

i. hard to fake or steal unlike passwords.

ii. easy and convenient to use.

iii. Generally, the same over the course of a user's life it is nontransferable

iv. It is efficient because templates take up less storage.

Disadvantages, however, includes the following:

It is costly to get a biometric system up and running. If the system fails to capture all of the

biometric data, it can lead to failure in identifying a user. Databases holding biometric data can

still be hacked. Errors such as false rejects and false accepts can still happen. If a user gets

injured, then a biometric authentication system may not work -- for example, if a user burns their

hand, then a fingerprint scanner may not be able to identify them. (Michael Cobb 2023)

11
2.1 BIOMETRIC SYSTEM FOR ATTENDANCE

(Cameron Hashemi-pour, 2022.) A Biometric system is made up of diverse methods to identify

individuals. This session will be addressing the different method of biometrics that was adopted

for the attendance base system. Many authors have written about attendance systems but the

more efficient method is biometrics and which makes the signing of attendance automatic. The

application of biometric recognition in personal authentication enables the growth of this

technology to be employed in various domains. The implementation of biometric recognition

systems can be based on physical or behavioral characteristics, such as the iris, voice, fingerprint,

and face. Currently, the attendance tracking system based on biometric recognition for education

sectors is still underutilized, thus providing a good opportunity to carry out interesting research

in this area. As evidenced in a typical classroom, educators tend to take the attendance of their

students by using traditional methods such as calling out names or signing off an attendance

sheet. Yet, these types of methods have proved to be time-consuming and tedious, and

sometimes, fraud occurs. As a result, significant progress had been made to mark attendance

automatically by making use of biometric recognition. This progress enables a new and more

advanced biometric-based attendance system being developed over the past ten years. The

setting up of biometric-based attendance systems requires both software and hardware

components. Since the software and hardware sections are too broad to be discussed in one paper,

this literature survey only provides an overview of the types of hardware used. Emphasis is then

placed on the microcontroller platform, biometric sensor, communication channel, database

storage, and other components to assist future researchers in designing the hardware part of

biometric-based attendance systems (Hoo and Ibrahim, 2019).

12
Chandavarkar (2021) conducted groundbreaking research on enhancing account security through

a login interface, addressing the vulnerabilities of traditional username and password

authentication systems. The exponential technological advancements have rendered the

conventional login methods susceptible to various cyber-attacks, jeopardizing user privacy and

data. To counter these risks, Chandavarkar's study introduces a cutting-edge two-factor

authentication system, incorporating the dynamic One Time Password (OTP) mechanism. OTP

involves generating a randomly fixed-digit code sent to the user's physical device upon entering

the correct password. This additional layer ensures that only authorised users can access the

system, significantly bolstering security. The dynamic nature of OTP makes it applicable in

various scenarios, such as secure bank transactions, social media account deletions, and cloud

platform access. Chandavarkar's research delves into the lifecycle of OTP, analysing challenges

and issues in the current technological landscape, further contributing to the field of

cybersecurity.

In a comprehensive review by Chatzis (2022), the state-of-the-art in biometric attendance

systems is thoroughly explored, encompassing various biometric data types such as fingerprints,

facial recognition, and iris scans for attendance tracking. Both commercial and open-source

biometric attendance systems are discussed, highlighting their benefits in terms of accuracy,

security, and convenience, along with the challenges they pose, including implementation costs,

privacy concerns, and user acceptance issues. The paper also identifies future research directions

to enhance the accuracy and security of these systems while emphasizing the need for

investigating the privacy implications of utilizing biometric data for attendance tracking. This

review serves as a valuable resource for understanding the current landscape of biometric

13
attendance systems and offers valuable insights into potential improvements in this rapidly

evolving field.

2.2 FINGERPRINT SYSTEM FOR ATTENDANCE

Fingerprint recognition is the ability to differentiate between two human fingers. Several print

pattern elements, such as ridges and minutiae points, are necessary to match two fingerprints.

Ridges have three main patterns: arch, loop, and whorl. Fingerprint recognition has been one of

the most essential and popular identifying techniques in recent years due to its high accuracy,

and the present fingerprint recognition system is enough for identification and verification

systems involving hundreds of users. (Anil K. Jain, 2023). There are three sub-domains in a

fingerprint recognition system: enrollment, verification, and identification. Enrolment is the

procedure by which a user's fingerprint data is captured using certain sensors and saved in a

prepared database after some processing. The collected fingerprint will be compared to the

template saved in the database during the verification process to authenticate a person's

identification. This procedure is also known as a one-to-one comparison. The goal of confirming

these data is to prevent several people from using the same identity.

In identification mode, the system will use a one-to-many comparison to determine the identity

of a person. The collected fingerprint will be compared to everything in the system's database,

and the only one that fits its record will be chosen.

(Nancy et al, 2020) ‘Automated latent fingerprint identification system: A review’ The two

primary search types used in the Automatic Fingerprint Identification System are the latent

search and the ten-print search (rolling and slap impressions). Technology has advanced to the

point where law enforcement agencies are widely implementing the completely automated, more

accurate, and throughput-efficient ten-print identification process of the Advanced Face

14
Identification System (AFIS). For matching rolling and slap prints, the False Positive

Identification Rate (FPIR) is reported as 0.1% and the False Negative Identification Rate (FNIR)

is reported as 1.9%, following the National Institute of Standards and Technology's (NIST)

periodic examinations [7]. On the other hand, the NIST's examination of latent fingerprints

(ELFT-EFS) shows that the Rank-1 Identification Rate for comparing 1114 latent prints to

100,000 reference images is 67.2%. In earlier times, the fingerprint experts manually performed

the entire process of analyzing and matching the latent prints. However, over the years, some

manual processes got automated, leading to the semi-automated latent fingerprint identification

system

(Saidur et al, 2023) This article proposed a fingerprint-based attendance management system.

The developed system was an embedded system that is part of a fingerprint recognition and

authentication system based on minutiae points. The system extracts a fingerprint's local

characteristic, which is made up of minutiae points in a template. Templates are matched during

both the registration and verification processes. For improved quality control during the

registration or verification process, a matching score was used to determine the success of the

operation. The matching score was specified so that only sets of minutiae data that exceed the

score will be accepted, and data below the score will be rejected. Therefore, fingerprint

recognition using the minutia score matching method was used for matching the minutia points

before attendance was recorded. The developed system is very helpful in saving the time of

students and lecturers, saving paper, and generating reports at the required time. The system can

record the clock in and clock-out times of students and workers in a very convenient manner

using their fingerprint to prevent impersonation and reduce levels of absence. Also, it reduces

15
most of the administrative jobs and minimizes human errors, avoids proxy punching, eliminates

time related disputes and helps to update and maintain attendance records.

(Ezema et al, 2019) proposed a reliable, secured, fast and efficient system replacing a manual

and unreliable system. The design of the system was done in two stages, the hardware part and

software section. The software part was achieved using Visual Basic to design a program which

would house the initial attendance database created in MS-excel, it can be used for the

registration of each new user, and also accepting attendance record from the hardware for

compilation with options of printing the updated record if required. The hardware (device)

comprises of the microcontroller, the fingerprint scanner, LCD display, real-time clock and serial

communication that is housed separately in a portable box, and is used for verification and

assigning of time to the registered user and sending the attendance data to the Visual Basic

program on the computer. The project was designed in such a manner that the hardware

component can function independent of software component (VB.Net) and can be used to record

attendance once the initial attendance database has been uploaded to its memory. Hence, a

system with expected results has been developed but there is still room for improvement in the

proposed system.

(Bhojwani, et al 2024) This research paper delves into a fingerprint-based attendance

management system, highlighting its development as an embedded system integral to a

fingerprint authentication/recognition framework, focusing on minutiae points. The system

extracts local characteristics from fingerprints based on minutiae points within a template.

During verification and registration processes, student templates are compared to enhance the

quality and speed of operations. The success of these operations relies on matching scores, where

sets of minutiae data exceeding the specified score are accepted, and those falling below are

16
rejected. The paper also introduces the concept of fingerprint recognition to ascertain the

attendance percentage of both students and teachers, capturing the time of their arrivals. In

contrast to traditional pen-and-paper attendance methods, where teachers manually record

student details each month, the Fingerprint Recognition System streamlines the process.

Teachers can quickly access and input student details with a simple click, saving significant time.

This software proves beneficial for both students and teachers, promoting efficiency. Fingerprint

Recognition emerges as an effective method for evaluating student and teacher behavior. The

system records real-time entries of workers upon entry, streamlining administrative tasks,

eliminating human errors, and preventing proxy attendance. This approach not only reduces time

constraints but also provides easy access to student details, enhancing overall system efficiency.

(Olasupo, et al. 2022) In this study, a Fingerprint-Based Attendance Management System was

designed and implemented. The system developed has many features which include; managing

of courses, academic staffs, course registration by students, capturing attendance, printing of

reports, etc. The system was able to provide smart solutions to the problems with the existing

traditional attendance system by providing a system which is secured void of impersonation,

accurate, process faster, efficient, reliable, economical by saving paper and pen, saves time

during capturing of attendance and also helps to eliminate loss of attendance sheet. The future

enhancement of the system is implementing it as a web-based application

2.2.1 PATTERN OF FINGERPRINTS

Biometric identification is a groundbreaking technique that identifies persons

based on a variety of unique biometric data. Fingerprint recognition is one of these biometric

identifying systems, and it is also the most popular in the world. (Williams, 2019). The following

are types of fingerprints

17
i. The Arch

This is the most unusual sort of fingerprint. In reality, around 5% of the world's population has

this fingerprint pattern. It is distinct due to the lack of cores, lines, or deltas. Within this pattern,

two more sub-categories develop:

Figure 2.1 The Arch( https://shutterstock.com/fingerprint/the-arch )

a. Plain Arch – This pattern is distinguished by raised ridges that run from one side of the finger

to the other in a continuous line. This pattern accounts for only 5%

of the total population, making it the rarest.

b. Tented Arch – The tented arch features elevated ridges that flow in the same direction as the

plain arch. The pitch of the increased ridge makes a noticeable difference. When contrasted to

the plain arch, the tented arch has a sharper edge and generates a tent-like shape.

ii. The Whorl

This fingerprint pattern accounts for around 25 to 35 percent of the overall population. Whorls,

unlike the arch pattern, feature a core and two deltas. It is only comparable to the arch in terms of

sub-categories; it has two:

18
Figure 2.2 The Whorl(https://prateekvjoshi.com/2012/07/22/fingerprint-recognition )

a. Plain Whorl – A plain whorl will produce a circular pattern resembling a swirl or spiral. This

circular pattern is continuous, and the revolution created in the middle is the result of at least one

ridge.

b. Central Pocket Whorl – In this design, the center ridges will bend many times to produce a

smaller inner whorl.

iii. The Loop

19
The most common fingerprint pattern. Indeed, this trend is shared by 60 to 70% of the whole

population. A single core and delta must exist in the loop pattern. Unlike the rest of the patterns,

the loop has three sub-categories:

Figure 2.3 The Loop(https://prateekvjoshi.com/2012/07/22/fingerprint-recognition/ )

a. Ulnar Loop – The ridges turn backward in this design, but not completely. You'll see the loops

traveling toward the tiny finger to identify an ulnar loop. These turns will be shown only if you

view them on the hand rather than a card.

b. Radial Loop – This pattern is similar to the ulnar loop, but the difference is the turns point

toward the thumb instead of the small finger.

c. Central Pocket Loop –The ridges in this pattern re-curve to surround the central whorl.

Apart from the three main fingerprint types, two more exist:

i. Double Loop Whorl – Close inspection reveals two distinct loops that encircle each other from

opposing directions.

20
ii. Accidental – This category includes any pattern that does not match any of the other types

listed here. These patterns contain two tented arch features: loop or whorl patterns. (Wikipedia)

2.3 SYSTEM OVERVIEW


This proposed system incorporates fingerprint authentication into the attendance management

process for both employees and students. It consists of two steps: enrollment and authentication.

During enrollment, the user's biometrics are collected, and the minutiae data are extracted and

saved in a database as a template for the topic, along with the user's ID. The enrollment module's

goal is to accept a user into a database using his or her ID and fingerprints following feature

extraction. These characteristics constitute a template that is utilized to identify the user's identity,

hence forming the authentication process. An administrator of the attendance management

system performs the enrolling procedure. During authentication, the user's biometrics are taken

once more, and the extracted characteristics are compared to those already in the database to

determine if there is a match. Following a successful match, attendance is recorded against the

user id that was used to match the templates.

The study made use of a fingerprint reader as an input to gather photos, and it created a program

with a fingerprint recognition and identification system, as well as a database to store user

information. The database contains users' fingerprint templates and other bio-data, as well as

attendance records. The database comprises the fingerprint templates and other bio-data of the

users together with the attendance records made by the users.

The system architecture can be broken down the designs and the way in which we want to

implement and develop the fingerprint-based attendance management system in the following

stages/modules:

a. Enrolment Stage

21
b. Authentication Stage

c. System Database

At the enrolment stage in the project, the primary role is to register users and their fingerprints in

our system's database. The fingerprints and other bio-data of users are captured, and the unique

features are retrieved and saved in our database as a template for the topic, including the

Matriculation Number, Surname, Other Names, Level and Course of Study, College (Faculty),

and Passport Photograph are the bio-data to be captured for students, while those for staff may

include: Surname, Other Names, Sex, Position, Staff Type, Phone Number, email, Department,

and Passport Photograph. A clear picture sample per fingerprint is taken to increase the quality of

the kind of image obtained during registration and enrollment. When fingerprint photos and the

user's name of a person to be registered are supplied into the enrollment module, a minutiae

extraction method is used to the fingerprint images and the minutiae patterns (features) are

retrieved. These characteristics combine to build a template that is utilized to identify the user's

identity, so forming the authentication process. An administrator of the attendance management

system handles the enrollment process. The enrollment and registration phases are administrative

in nature. For the first time, the user's fingerprint and other bio-data are saved into the database

for registration. This module contains all of the data and information necessary for accurate

attendance tracking.

22
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN METHODOLOGY


3.0 INTRODUCTION

A requirement is a declaration of the desired conduct. It deals with entities or system objects,

their possible states, and the functions that can be used to change an object's attributes or state.

Understanding a user's problems and requirements is the aim of the requirements collecting and

analysis phase. This understanding will form the basis of the user's expectations of the proposed

new system. It comprises analyzing the requirements obtained in order to determine the

specifications of the proposed new system, thoroughly reviewing the project problem statement,

and obtaining requirements from intended users and other stakeholders in order to create a

requirements definition document.

3.1 ANALYSIS OF THE EXISTING ATTENDANCE SYSTEM.

University of Benin currently track student attendance manually by paper and pen method.

Students are cleared after gaining admission and performing the necessary duties to get

themselves certified by proving their documents during the compulsory 100level clearance.

Matriculation numbers are giving to each student which is a way to differentiate one student

from another, after which they start attending classes.

Lecturer take attendance on a piece of paper by asking students to write their names and Mat

number during the class, and the list is submitted back to the lecturer before he or she ends the

class for that day. This method is repeated each time the lecturer come to teach a particular class

which make the tracking of attendance difficult as the lecturer might lose track of which paper is

23
for a particular class. The analysis of the manual system was looked into and the following

benefits and demerits was identified.

3.1.2 BENEFIT OF THE EXISTING ATTENDANCE SYSTEM.

After examining the existing system, there were some notable benefits and limitations worth

considering. The existing system demands the physical presence of students thereby ensuring

active engagement and participation in daily class activities. Moreover, the familiarity with

students' faces aids in their identification, streamlining the attendance process. Its low cost and

simplicity is also an impressive factor as students find it easy to use. Finally, if the papers are

stored properly it can serve as backup in case of technical issues.

3.1.3 LIMITATIONS OF THE EXISTING ATTENDANCE SYSTEM.

However, despite claims of openness and system stability, the existing system presents several

limitations. Notably, there is a concerning trend of low attendance percentages, indicating

potential issues with student participation. They can be incredibly time-consuming, especially for

large lectures, as instructors must manually call out names and record responses or they pass

papers between students while they write their names and Matriculation numbers. This process is

also prone to errors, with missed marks, mistaken identities, and even proxy attendance

(someone signing for another student) being common issues. Furthermore, analyzing attendance

trends or generating reports becomes a laborious task due to the inefficiency of paper-based data

management. Security risks are another concern, as paper records are vulnerable to loss, theft, or

tampering. Limited accessibility to real-time data also presents a challenge, making it difficult

for parents, advisors, or even students themselves to easily track attendance. Finally, paper-based

24
systems contribute to resource inefficiency, requiring significant amounts of paper for both

recording and storage.

3.2 ANALYSIS OF THE PROPOSED SYSTEM

Moving forward, an analysis of the proposed system reveals promising advancements. The

proposed system leverages biometric characteristics, particularly fingerprint identification, for

user authentication. Integrated hardware facilitates the seamless transition from manual to

automated methods. This new system will operate in identification mode, offering several

functionality. It captures fingerprints, extracts feature, and securely stores them in a centralized

database. Additionally, it verifies users' identities during registration and attendance collection,

enhancing accuracy and reliability. Furthermore, it provides a user-friendly interface for

registration and attendance monitoring, empowering administrators with comprehensive insights

into attendance patterns.

3.2.1 DESIGN GOALS OF THE PROPOSED SYSTEM

The design goals for the proposed system prioritize student authentication and the verifiability of

attendance. Secure data transfer mechanisms ensure the integrity of attendance records,

mitigating risks of tampering or manipulation.

3.2.2 FUNCTIONAL REQUIREMENTS OF THE PROPOSED SYSTEM

Functional requirements emphasize the provision of accurate data, generation of standard reports,

and seamless administrative operations. Non-functional requirements focus on efficient system

performance, backup capabilities, and compliance with institutional regulations.

25
3.2.3 NONFUNCTIONAL REQUIREMENTS OF THE PROPOSED SYSTEM

Moreover, stringent security requirements underscore the system's commitment to safeguarding

sensitive student information. During the registration or attendance procedure, the system must

operate at peak efficiency. The system should also possess backup and data restore capabilities,

and must conform to the requirements of the university authorities.

3.2.4 SECURITY

These requirements encompass zero tolerance for compromises, accurate time and date settings,

prevention of unauthorized access, and robust protection of student records. In summary, the

proposed system represents a significant improvement over the existing manual method. By

harnessing biometric technology and implementing robust security measures, it promises

enhanced efficiency, accuracy, and reliability in managing student attendance.

3.3 DATA COLLECTION

A google form was created to collect data from students about how the present mode of

attendance tracking in the university work. The questionnaire also contained question like flaws

of the existing system, how often do inconsistences occur and also to know if they would

welcome a new and improved system that would fix the flaws of the present attendance tracking

system of the university. The results are displayed below

Table 1.1 Gender of respondents

Frequency Percent Valid Percent

Male 50 52.6 52.6

26
Female 45 47.4 47.4

Total 95 100 100

The accompanying table depicts the gender composition of the study participants. Of the

respondents, 50 were male, constituting 52.6 percent of the total. 45 were female, accounting for

the 47.4 percent of the sample. This analysis shows a higher participation of males than females

in the survey.

Table 1.2: Age of respondents

Frequency Percent Valid Percent

18-22 30 32 32

22-25 65 68 68

Total 95 100 100

Out of the total number of 95 respondents, 30 are between the age category of 18 to 22 which

represent 32% of the total population. 65 are between the age category of 22 to 25 which

represents 68% of the total population. All participants are students of the university of Benin.

Below are the rest gotten from the questionnaire

Table 1.3: Showing the percentage of student who has signed Attendance for their course

mate

Frequency Percent Valid Percent

Yes 65 71.1 71.1

No 30 28.9 28.9

Total 95 100 100

27
Table 1.4: Showing the Percentage of reliability on the current attendance system

Frequency Percent Valid Percent

Unreliable 69 77.8 77.8

Reliable 26 22.9 22.9

Total 95 100 100

From the above table you can see that a higher percentage of students don’t find their current

method of attendance tracking reliable and accurate. With 77.8% of students picking unreliable

we can see that there is a huge flaw in the present attendance system that needs to be corrected.

Figure 3.1 Diagram showing the percentage of students that will welcome the new system

The above pie chart in figure 4 shows the percentage of students who wants a new system for

attendance tracking to be developed this result prompted in the development of a new attendance

tracking system that makes use of biometrics (Fingerprint) for attendance tracking.

28
3.4 EXPLORATION OF WATERFALL MODEL

Figure 3.2 Diagram showing waterfall method.

I. Requirement Gathering and Analysis: The initiation of the process involves capturing and

documenting all system needs comprehensively, including the analysis of input and output

specifications.

II. System Design: Following the requirement analysis, the system design phase formulates the

architecture based on the identified needs, defining hardware specifications, system requirements,

and overall system architecture.

III. Implementation: The system construction begins with breaking down the design into

smaller units, which are developed and tested individually through Unit Testing.

29
IV. Integration and Testing: Upon completion of unit testing, all units are integrated to form

the complete system, which undergoes rigorous testing to identify and rectify defects or failures.

V. Deployment of System: Once the system passes testing and is deemed functional, it is

deployed into the client environment or introduced to the market.

VI. Maintenance: The final phase addresses issues in the client environment by providing

patches and releasing improved versions of the product.

3.5 DESIGN OF PROPOSED SYSTEM

After defining the needs of the proposed system, I will describe the system's architecture, which

will include the use of software modeling tools to structure requirements. We may gain a

complete understanding of needs by structuring them. It is critical to use standard notations when

modeling, documenting, and conveying choices. In this project work, use case models, data flow

diagrams, entity - relationship models, and hierarchy chart, as well as input, process, and output

(HIPO) diagrams, would be used to specify the functionality and non-functionality of the

proposed attendance system with biometrics fingerprint authentication.

3.5.1 SYSTEM ARCHITECTURE DESCRIPTION

Following the delineation of system requirements, the architectural framework is elucidated in

figure 3.3, employing software modeling tools to structure these requirements.

30
Figure 3.3 Diagram showing system architectural design

3.5.2 UTILIZATION OF MODELING TECHNIQUES

Various modeling techniques such as use case models, data flow diagrams, entity-relationship

models, hierarchy charts, and input-process-output (HIPO) diagrams will be utilized to specify

the functionality and non-functionality of the proposed attendance system featuring biometric

fingerprint authentication.

i. Entity-Relationship (E-R) Diagrams

Visual representation of entities and their interconnections within the information system,

employing conventions for entities, relationships, and cardinality. An Entity-Relationship

31
Diagram (ERD) illustrates the entities within a system and their interactions, providing a visual

representation of data types and their connections.

ii. Data Flow Diagrams (DFDs)

Illustration of data flow through the system, depicting data movement and transformation

processes.

iii. Context Data Flow Diagram

Provides an overarching view of the core entities, processes, and data flow within the system,

without detailing data storage aspects.

iv. Process Flow – Charts

Flowchart for fingerprint biometrics attendance system. Figure 3.4 shows the

flowchart diagram

32
Figure 3.4 Flowchart of the System.
iv. Use Case Diagram.

The use case diagram visually presents the essential components and actions involved in a

system. Actors represent the fundamental elements, while use cases represent the actions or

processes. It illustrates the interactions between actors and use cases. Figure 3.5 displays the

depicted use case diagram.

33
Figure 3.5 Diagram showing use case

Actor: Student

1. Registration: This critical function involves students entering their information and

fingerprint templates into the system, which are then stored in the database.

2. Fingerprint Enrollment: Students are required to register their fingerprints, which will

be utilized for attendance tracking.

3. Authenticate and Validate: Fingerprint data is verified for accuracy before each class or

examination.

4. Fingerprint Scanning: Fingerprint verification occurs at designated points, such as entry

checkpoints.

5. View Past Attendance: Students have access to their attendance history for monitoring

purposes.

Actor: Admin The admin oversees the operation of the mobile fingerprint app.

i. Manage Student Registration: Admins can edit and register students.

34
ii. Manage Student Attendance Reports: Admins can view attendance reports for each

service.

iii. Create Service Type: Admins can set up service types for attendance tracking.

iv. Edit Service Type: Admins can modify or delete service types.

v. Delete Past Attendance: Admins have the ability to remove outdated attendance records.

v. Hierarchical (HIPO) Diagrams

HIPO diagrams depict system processes and their connections. Two diagrams illustrate

student registration and the attendance system, outlining logical pathways for registration,

authentication, and access for both students and administrators.

Fi

gure 3.6 Diagram showing student registration

35
3.6 THE FINGERPRINT MODULE

The module used is the mobile android devices specifically from android version of 5.0 upwards,

as long as your android phone as a fingerprint sensor as ninety percent of phones today.

i. Fingerprint Enrollment: This process involves collecting and storing fingerprint data from

users, ensuring its accuracy and association with the respective user.

ii. Enrollment Workflow Procedure: A step-by-step guide for capturing and storing fingerprint

data, including obtaining user identification, capturing fingerprint samples, and creating

fingerprint templates.

iii. Fingerprint Verification: Verification entails comparing fingerprint data to stored templates

for authentication, followed by decision-making based on the match or non-match outcome.

3.7 SYSTEM ARCHITECTURAL DESIGN

The suggested system integrates fingerprint authentication into the staff and student attendance

management process. Authentication and enrollment are the two procedures involved. The user's

biometrics are gathered during enrollment, and the specifics are taken out and stored in a

database along with the user's ID as a template for the subject. Accepting a person into a

database using their ID and fingerprints after feature extraction is the aim of the enrollment

module. These traits make up a template that is used to determine the identity of the user, hence

establishing the authentication procedure. The enrollment process is carried out by an attendance

management system administrator. The user's biometrics are collected again during

authentication, and the extracted traits are compared to those already stored in the database to see

36
if there is a match. Attendance is tracked against the user ID that was used to match the

templates after a successful match.

The system architecture can be broken down the designs and the way in which we want to

implement and develop the fingerprint-based attendance management system in the following

stages/modules:

a. Enrolment Stage

b. Authentication Stage

c. System Database

At the enrolment stage in the project, the primary role is to register users and their

fingerprints in our system's database. The fingerprints and other bio-data of users are captured,

and the unique features are retrieved and saved in our database as a template for the software,

including the Matriculation Number, Surname, Other Names, Level and Course of Study,

College (Faculty), and Passport Photograph are the bio-data to be captured for students, while

those for staff may include: Surname, Other Names, Sex, Position, Staff Type, Phone Number,

email, Department, and Passport Photograph. A clear picture sample per fingerprint is taken to

increase the quality of the kind of image obtained during registration and enrollment. When

fingerprint photos and the user's name of a person to be registered are supplied into the

enrollment module, a minutiae extraction method is used to the fingerprint images and the

minutiae patterns (features) are retrieved. These characteristics combine to build a template that

is utilized to identify the user's identity, so forming the authentication process. An administrator

of the attendance management system handles the enrollment process. The enrollment and

registration phases are administrative in nature. For the first time, the user's fingerprint and other

37
bio-data are saved into the database for registration. This module contains all of the data and

information necessary for accurate attendance tracking.

38
CHAPTER FOUR

SYSTEM IMPLEMENTATION AND DOCUMENTATION

4.0 INTRODUCTION

This chapter explores the implementation of ATTENDIFY which is a smart based attendance

system. Its focus will be on the front end development and cloud integration of the complete

system. In this section will provide a lot of details about the software implementation process,

such as the choice of frameworks, programming language used, screenshot of the result, also the

code, and how each page line of code maps to its result.

4.1 SOFTWARE IMPLEMENTATION TOOLS

Some tools used in the implementation of the Software are given below:

i. Programming Language: The programming language used for the software

development was JavaScript. JavaScript was used to create both the frontend (using

React-Native) and backend of the software.

ii. Implementation Framework: A framework is a group of code built to simplify and

abstract a lot of details in the creation of software products. The use of a framework

speeds up the process of software creation and allows developers to focus on the major

functionality of their application. The major framework used in this project is the React-

Native framework. It is used to build cross platform applications, allowing the

applications built to run on diverse operating systems.

iii. Development Tools: For the development of this software, Visual studio code (widely

known as VS Code) was used as the code editor. It is an open-source code editor

developed and maintained by Microsoft. For maintaining versions of the application, Git

39
and GitHub were used as the version control system. Git is a version control system,

while GitHub is a cloud storage for git repositories.

iv. Deployment Platform: This software is a mobile app that is compatible with both

android and ios platform. It was created using Expo a React-Native library that allows

you to run mobile app easily from development stage to deployment stage.

v. Operating System: The software was built on a windows 10 OS. And can run on any

android with version 7 and above, ios 14 and above.

4.2 MAIN FEATURES OF THE SOFTWARE

The key features that make up the systems are shown below:

i. Authentication: For the authentication, Google's firebase authentication was used to

implement the functionality. This method was picked because of its simplicity and fast

response. If a user has an account, and the authentication is successful, the details for the

software are fetched from the cloud database. (which in this case is Google’s cloud

firestore). If the user doesn’t have an account already he can also create one with the sign

up option. This user is the admin who has access to the attendance records.

40
Figure 4.1 Login Screen

Figure 4.1 is the first screen that is displayed when the admin opens the app. This is where he or

she inputs her details to get logged in without this authentication being complete the user cannot

proceed further in the app.

It has different option for the user to sign-in depending on the users operating system. Google

Authentication was enabled for android users, while Apple Authentication was enabled for IOS

users. This Application can run on multiple platform even on the Web.

41
Figure 4.2 Signup Screen.

Figure 4.2 is the first screen that is displayed when a new user opens the app, a user that has no

account before. This is where he or she inputs her details to get an account created without this

authentication being complete the user cannot proceed further in the app.

It has different option for the user to sign-in depending on the users operating system. Google

Authentication was enabled for android users, while Apple Authentication was enabled for IOS

users. This Application can run on multiple platform even on the Web.

42
ii. Dashboard: The dashboard is the screen that displays after the user authentication is

complete. It can also be referred to as the home screen because it contains link to the

various parts of the app. The homepage contains links to Student registration page, course

list, attendance list, attendance page etc. This page helps with easy navigation through the

app and also help to ease management by the admin.

Figure 4.3 Home Page

43
iii. Student Registration Page: This is the page where the Student data is collected and

stored in the data base. It contains filed for name, matriculation number, department,

faculty, and gender which it can use to clearly sort student’s data. This operation is

performed by the admin who is in charge of the software.

Figure 4.4 Registration Page

44
iv. Attendance List: This screen displays the attendance List for each Specific Date It

accurately sorts each list according to the course offered that day. The admin has access

to the list to cross check and generate an excel spreadsheet for that day attendance.

Figure 4.5 Student List Page

45
v. Course List: The course list page shows the course Timetable for the department. With

this course list the attendance can be tracked daily as separate list are being generated for

each course Lecturer that comes to class.

4.3 FRONTEND DEVELOPMENT

The front end part of the app (Which is what this project focuses on) was designed using React-

Native. React-Native is a JavaScript framework that is used to create cross platform Application.

Expo Libraries were used which is an open-source platform for making universal native apps for

Android, iOS, and the web with JavaScript and React. Figure 4.6 shows the codes for the student

registration page

Figure 4.6 Registration Page Code

The block of Code below in figure 4.7 check if a user is logged into the software, if a user is

logged into the software it renders the inside stack which contains the main screens of the app. If

the user is not signed or there’s an authentication error, it renders the Outside stack which

46
contains the Login and Signup screens. These code are for the frontend side of the application

putting user experience and user interface as the utmost priority.

Figure 4.7 User Authentication Page Code

47
CHAPTER FIVE

SUMMARY AND CONCLUSION

5.1 SUMMARY

This project documented the development of a smart base attendance system using fingerprint

techniques for the Computer Science department at the University of Benin. The Attendance

System addresses the limitations of traditional Attendance tracking methods by providing a

platform for online database storage for student data, a software for attendance tracking and

follow up. Chapter one introduced the challenges of the existing system and outlined the project's

goals. Chapter two reviewed the history and evolution of biometrics and attendance systems.

Chapter three described the system model, design, architecture, and compared the current state

with the proposed smart base attendance system. Chapter four detailed the development tools and

system documentation. Finally, we have a summary and conclusion on the project topic.

5.2 CONCLUSION

The Attendance system is a cross platform software that provides a host of functionalities, as

mentioned in previous chapters. Traditionally, student attendance was recorded manually using

pen and paper registers. The introduction of a biometric-based technique of attendance

management system would considerably aid institutions or any company and therefore eliminate

time-consuming operations. The biometric attendance system allows administrators to easily

obtain student attendance statistics as well as monitor weekly or monthly attendance summaries.

This will increase the net productivity of institutions or any organization. The suggested system

is dependable, secure, and efficient, and it is capable of replacing the existing manual and

unreliable way of attendance management. This approach maintains the security of student

48
records, eliminates phony attendance records, saves time, and reduces the amount of effort done

by the administrator in acquiring student attendance records. The suggested system may be

enhanced by using multimodal biometric technologies to increase the security of the student

attendance management system. The system was developed using a cloud database (Google

Cloud Platform) to manage the user information (lecturers, students, admins), as well as the

courses and their properties. The system has been made to tackle the current problems

highlighted in chapter 1 of this work as well as other foreseeable challenges. However, as

learning is dynamic with the change in technology devices, it might not be able to handle some

future challenges. Possible challenges that may occur include:

• Scalability: The current cost of maintaining the Attendance system for a department

might increase significantly for university-wide deployment. Unforeseen expenses may arise

when catering to students with limited technological resources.

Other challenges, apart from the mentioned, exist but would show effect with time.

5.3 RECOMMENDATIONS

The proposed system, when implemented properly, has the potential to enhance the learning

experience for students allowing lecturer to focus more on teaching the students than collecting

of attendance. A more refined user interface and experience can also be provided to improve the

usability of the software for the users cause human needs change overtime.

As we all know a normal android phone can’t retrieve and store Students data on a database as

there are specific android devices made for such purpose. I would recommend that the school has

some if we are to switch from a paper based attendance system to a biometric based attendance

system.

49
REFERENCES

Abdalkarim, B. A. (2022). A literature review on smart attendance systems. Retrieved May 4,

2024 from Research Gate: https://www.researchgate.net/publication/275605467_A_

literature_review_on_smart_attendance_systems.

Adesua, O. (2016, November 21). Online voting system with biometric authentication for UI.

University of Ibadan. Retrieved May 4, 2024 from Research Gate:

https://www.researchgate.net/publication/275605455_online_voting_system_with_biome

tric_authentication_for_UI.

Admin, B. (2021). A brief history of biometrics. Retrieved May 4, 2024, from:

www.bioconnect.com:https://bioconnect.com/2021/12/08/a-briefhistoryofbiometrics

Ali, N., Alhilali, A., Rjeib, H., Al-Sadawi, B., & Alsharqi, H. (2022). Automated attendance

management systems: systematic literature review. International Journal of Technology

Enhanced Learning, 14(1), 37-57.

Alexander S. Gilis, Peter Loshin, Micheal Cobb (2022). What is Identity and access

management? Guide to IAM. Retrieved May 5, 2024, from: https://www.techtarget.com/

searchsecurity/definition/biometrics#

Anil K. Jain, A. R. (2024, August 9). Fingerprint A means of biometric identification. Retrieved

July 8, 2022, from ipl.org: ipl.org

Ashish Yadav and Sanjay Bhole (2019). A comprehensive and systematic literature review on

the employee attendance management systems based on cloud computing. Retrieved May

5, 2024, from Research Gate: https://www.researchgate.net/publication/4236452798

_A_literature_review_on_employee_attendance_management_system.

Bawar Ali Abdalkarim and Devrim Akgün (2022). A literature review on smart attendance

50
Systems. Retrieved May 8, 2024, from Research Gate: https://www.researchgate.net

/publication/362405196_A_Literature_Review_on_Smart_Attendance_Systems

Cameron Hashemi-pour (2022). “What is biometric Authentication and its importance?”.

Retrieved May 5, 2024, from: https://www.techtarget.com/searchsecurity/definition/

biometricAuthentication#

Chatzis, S. (2021). Biometric Attendance Systems: A Review of the State-of-the-Art. Computers

& Security, Retrieved May 5, 2024, from Research Gate: https://www.researchgate.net/

publication/4236452799_A_review_of_the_state_of_the_art_computer_system.

Chandavarkar, A (2021). “Securing the Login Interface: A Review of Current Practices and

Recommendations”. Computers & Security.

Hoo, S., & Ibrahim, H. (2019). Biometric-Based Attendance Tracking System for Education

Sectors: A Literature Survey on Hardware Requirements. Journal of Sensors, 2019, 1-25.

doi:10.1155/2019/7410478.

INTERPOL. How-we-work-Forensics-Fingerprints. Retrieved May 7, 2024, from

www.interpol.int: https://www.interpol.int/en/How-we-work/Forensics/Fingerprints

Krish Bhojwani, Krishh Lohar, Aachal Awasare, Sayali Golatkar , Vaishali bodhale (2024)

Fingerprint Based Attendance System. Retrieved May 9, 2024, from The World Financial

Review: https://worldfinancialreview.com/wp-content/uploads/2024/4

Lebi, D. A. (2021). FINGERPRINT BASED BIOMETRIC STUDENT ATTENDANCE

SYSTEM A CASE STUDY OF DATA LINK INSTITUTE. Global Scientific Journal

Volume 3, Issue 7, June-2021 1623 ISSN 2239-6518

L.S. Ezema, C.K.A. Joe-Uzuegbu, J. N. Eneh and I. Amanze (2019) FINGERPRINT BASED

51
ATTENDANCE MANAGEMENT SYSTEM. International Journal of Scientific &

Engineering Research, Volume 6, Issue 7, July-2019 1623 ISSN 2229-5518

Md. Saidur Rahman, K. M. Rumman, Rubab Ahmmed , Md. Abdur Rahman , Md. Asaduzzaman

Sarker (2023) FINGERPRINT BASED BIOMETRIC ATTENDANCE SYSTEM Retrieved

May 9, 2024, from Research Gate: https://www.researchgate.net/publication/3277456532

_A_fingerprint_based_biometric_attendance_system.

Mwapasa, M., Gooding, K., Kumwenda, M., Nliwasa, M., Sambakunsi, R., Parker, M., Bull, S.,

& Desmond, N. (2020). Are we getting the biometric bioethics right? The use of

biometrics within the healthcare system. Global Bioethics, 31(1), 67–80. Retrived May 8,

2024, from Research Gate: https://www.researchgate.net/publication/2199346578

_The_right_way_to_use_biometrics

Nabeel Salih Ali, Ahmed Hazim Alhilali, Hasanein D. Rjeib, Haider Alsharqi, and Basheer

Al-Sadawi (2022). Automated attendance management systems: systematic literature

review. Retrieved May 9, 2024, from Research Gate: https://www.research

gate.net/publication/2192764578_Automated_attendance_management_systems.

Nancy Singla, Manvjeet Kaur, Sanjeev Sofat, (2023) Automated latent fingerprint identification

system: A review of Forensic Science International,Volume 309,2020,110187,ISSN

03790738. Retrived May 9, 2024 from: https://www.sciencedirect.com/science

Olasupo, A. O., Ademiluyi, O. S., Usman, M. A., Abdullah, K. A., Olubanwo, O. O., Ayo, F. E.,

Ojumadu, U. H., Salami, E. O., & Ibironke, T. E. (2022). A fingerprint-based students'

attendance management system for Olabisi Onabanjo University. FUDMA Journal of

Sciences, 6(1), 253-265. https://doi.org/10.33003/fjs-2022-0601-896

Singh, G., Bhardwaj, G., Singh, S.V., Garg, V. (2021). Biometric Identification System: Security

52
and Privacy Concern.

Awasthi, S., Travieso-González, C.M., Sanyal, G., Kumar Singh, D. Artificial Intelligence for a

Sustainable Industry 4.0. Springer, Cham.Retrieved from: https://doi.org/10.1007/978-3-

030-77070-9_15

Williams, J. (2019) Various types of Fingerprint from humans. Retrieved May 3, 2024, from

www.attorneyatlawmagazine.com/various-typesfingerprints/amp:www.attorney

atlawmagazine.com/various-types-fingerprints/amp

53
APPENDIX

SOURCE CODE

User Authentication Page

import { useState, useEffect } from 'react';

import { NavigationContainer } from '@react-navigation/native';

import { createNativeStackNavigator } from '@react-navigation/native-stack';

import { auth } from './FirebaseConfig';

import { useFonts } from 'expo-font';

import InsideLayout from './layout/InsideLayout';

import OutsideLayout from './layout/OutsideLayout';

const Stack = createNativeStackNavigator();

const App = () => {

const [fontsLoaded] = useFonts({

'Inter-Bold': require('./assets/fonts/Inter-Bold.ttf'),

'Inter-Medium': require('./assets/fonts/Inter-Medium.ttf'),

'Inter-Regular': require('./assets/fonts/Inter-Regular.ttf'),

});

if(!fontsLoaded) return null;

const [user, setUser] = useState(null);// Authentication

useEffect(() => {

// Check for existing logged-in user (optional)

auth.onAuthStateChanged((user) => {

console.log('user:', user)

54
setUser(user);

});

}, []);

// React Native code starts here

return (

<NavigationContainer >

<Stack.Navigator screenOptions={{ headerShown: false}} initialRouteName='Login'>

user ?

<Stack.Screen name= 'Inside' component={InsideLayout} />

: <Stack.Screen name='Outside' component={OutsideLayout} />

</Stack.Navigator>

</NavigationContainer>

);

export default App;

Login Page

import { SafeAreaView, View,Text,TouchableOpacity,TextInput, Image , ScrollView,

ActivityIndicator} from 'react-native';

import { useNavigation } from '@react-navigation/native';

import { useState } from 'react';

55
import loginStyle from '../styles/loginStyle';

import { icons, images } from '../constants';

import { auth } from '../FirebaseConfig';

import { signInWithEmailAndPassword } from 'firebase/auth';

const Login = () => {

const navigation = useNavigation();

const [email, setEmail] = useState('');

const [password, setPassword] = useState('');

const [isLoading, setIsLoading] = useState(false);

const signIn = async () => {

setIsLoading(true);

try {

await signInWithEmailAndPassword(auth, email, password);

} catch (error) {

console.error(error);

alert('signIn failed check internet Connectivity' )

} finally {

setIsLoading(false);

};

return (

<SafeAreaView style={loginStyle.container}>

56
<ScrollView showsVerticalScrollIndicator={false}>

<View style={loginStyle.div}>

<Image source={images.loginImage} style={loginStyle.image}/>

<Text style={loginStyle.text}>LOGIN</Text>

<TextInput

onChangeText={setEmail}

placeholder='Email'

value={email}

style={loginStyle.input}

/>

<TextInput

onChangeText={setPassword}

placeholder='Password'

value={password}

style={loginStyle.input}

secureTextEntry

/>

isLoading ? <ActivityIndicator size='large' color='#fff'/> :

<TouchableOpacity style={loginStyle.button} onPress={signIn}>

<Text style={loginStyle.buttonText}>Login</Text>

57
</TouchableOpacity>

<Text style={{color:'#fff', fontWeight: 'bold', marginTop: 10}}>or</Text>

<TouchableOpacity style={loginStyle.googleButton}>

<Image source={icons.google} style={{ width: 25, height: 25}}/>

<Text style={loginStyle.buttonText}>Continue with Google</Text>

</TouchableOpacity>

<TouchableOpacity style={loginStyle.appleButton}>

<Image source={icons.apple} style={{ width: 25, height: 25}}/>

<Text style={loginStyle.buttonText}>Continue with Apple</Text>

</TouchableOpacity>

<View style={{flex: 1, flexDirection: 'row', marginTop: 15}}>

<Text style={{fontFamily: 'Inter-Medium'}}>Don't have an account?</Text>

<TouchableOpacity onPress={()=> navigation.navigate('SignUp')}>

<Text style={{color: '#fff', marginLeft: 5, textDecorationLine: 'underline', fontFamily:

'Inter-Medium'}}>Sign up</Text>

</TouchableOpacity>

</View>

</View>

</ScrollView>

</SafeAreaView>

);

58
export default Login;

SignUp Page

import { View, Text, SafeAreaView, TouchableOpacity, TextInput, ScrollView, Image,

ActivityIndicator } from 'react-native';

import { useNavigation } from '@react-navigation/native';

import { useState } from 'react';

import { icons } from '../constants';

import signUpStyle from '../styles/SignUpStyle';

import { auth } from '../FirebaseConfig';

import { createUserWithEmailAndPassword } from 'firebase/auth';

const SignUp = () => {

const navigation = useNavigation();

const [ email, setEmail] = useState('');

const [ password, setPassword ] = useState('');

const [isLoading, setIsLoading] = useState(false);

const signUp = async () => {

setIsLoading(true);

try {

await createUserWithEmailAndPassword( auth, email, password)

} catch (error) {

console.error(error);

alert('registration failed' + error.message )

} finally {

59
setIsLoading(false);

};

return (

<SafeAreaView style={signUpStyle.container}>

<ScrollView showsVerticalScrollIndicator={false}>

<View style={signUpStyle.div}>

<Text style={signUpStyle.text}>SIGN UP</Text>

<TextInput

onChangeText={setEmail}

placeholder='Email Address'

value={email}

style={signUpStyle.input}

/>

<TextInput

onChangeText={setPassword}

placeholder='Password'

value={password}

secureTextEntry

style={signUpStyle.input}

/>

isLoading ? <ActivityIndicator size="large" color='#fff' /> :

60
<TouchableOpacity style={signUpStyle.button} onPress={signUp}>

<Text style={signUpStyle.buttonText}>Sign up</Text>

</TouchableOpacity>

<Text style={{color:'#fff', fontWeight: 'bold', marginTop: 10}}>or</Text>

<TouchableOpacity style={signUpStyle.googleButton}>

<Image source={icons.google} style={{ width: 25, height: 25}}/>

<Text style={signUpStyle.buttonText}>Continue with Google</Text>

</TouchableOpacity>

<TouchableOpacity style={signUpStyle.appleButton}>

<Image source={icons.apple} style={{ width: 25, height: 25}}/>

<Text style={signUpStyle.buttonText}>Continue with Apple</Text>

</TouchableOpacity>

<View style={{flex: 1, flexDirection: 'row', marginTop: 15}}>

<Text style={{fontFamily: 'Inter-Medium'}}>Already have an account?</Text>

<TouchableOpacity onPress={()=> navigation.navigate('Login')}>

<Text style={{color: '#fff', marginLeft: 5, textDecorationLine: 'underline', fontFamily:

'Inter-Medium'}}>Login</Text>

</TouchableOpacity>

</View>

</View>

</ScrollView>

61
</SafeAreaView>

);

export default SignUp;

Home Page

import { SafeAreaView, View, TouchableOpacity, Text, StatusBar, Image } from 'react-native';

import { HomeHeader } from '../components';

import { icons, images } from '../constants';

import { useNavigation } from '@react-navigation/native';

import homeStyle from '../styles/HomeStyle';

import Registration from './Registration';

import AttendanceList from './AttendanceList';

import MarkAttendance from './MarkAttendance';

const Home = () => {

const navigation = useNavigation();

return (

<SafeAreaView style={{flex: 1, backgroundColor: "#9C0C7F99" }}>

<StatusBar />

<HomeHeader />

<View style={homeStyle.container}>

<View style={homeStyle.topRectangle}>

62
</View>

{/* Student reg btn */}

<TouchableOpacity style={homeStyle.grid} onPress={() =>

navigation.navigate(Registration) }>

<Image source={icons.studentReg} resizeMode='contain' style={homeStyle.gridIcons}/>

<Text style={homeStyle.gridText}>Student Registration</Text>

</TouchableOpacity>

<TouchableOpacity style={homeStyle.grid} onPress={() =>

navigation.navigate(MarkAttendance) }>

<Image source={icons.markAttendance} resizeMode='contain'

style={homeStyle.gridIcons}/>

<Text style={homeStyle.gridText}>Mark Attendance</Text>

</TouchableOpacity>

<TouchableOpacity style={homeStyle.grid}>

<Image source={icons.leaderList} resizeMode='contain' style={homeStyle.gridIcons}/>

<Text style={homeStyle.gridText}>Course List</Text>

</TouchableOpacity>

<TouchableOpacity style={homeStyle.grid} onPress={() =>

navigation.navigate(AttendanceList) }>

<Image source={icons.studentAttendance} resizeMode='contain'

style={homeStyle.gridIcons}/>

<Text style={homeStyle.gridText}>Attendance List</Text>

63
</TouchableOpacity>

<TouchableOpacity style={homeStyle.grid}>

<Image source={icons.staffReg} resizeMode='contain' style={homeStyle.gridIcons}/>

<Text style={homeStyle.gridText}>Staff Registration</Text>

</TouchableOpacity>

<TouchableOpacity style={homeStyle.grid}>

<Image source={icons.staffAttendance} resizeMode='contain'

style={homeStyle.gridIcons}/>

<Text style={homeStyle.gridText}>Staff Attendance List</Text>

</TouchableOpacity>

</View>

</SafeAreaView>

export default Home;

StudentRegistration Page

import { ScrollView, View, Text, TextInput, TouchableOpacity, ActivityIndicator } from 'react-

native';

import { useState } from 'react';

import { firestore } from '../FirebaseConfig';

import { addDoc, collection } from 'firebase/firestore';

import ImageUpload from '../components/uploadImage';

64
import styles from '../styles/RegistrationStyle';

const Registration = () => {

const [ firstName, setFirstName ] = useState('');

const [ lastName, setLastName ] = useState('');

const [ matNO, setMatNO ] = useState('');

const [ level, setLevel ] = useState('');

const [ department, setDepartment ] = useState('');

const [ faculty, setFaculty ] = useState('');

const [imageUrl, setImageUrl] = useState(null);

const [isLoading, setIsLoading] = useState(false);

// uplaod documents like name etc.

const AttendanceListRef = collection( firestore, 'studentData')

const submitDoc = async () => {

setIsLoading(true);

try {

await addDoc (AttendanceListRef,

{ department: department,

faculty: faculty,

firstName: firstName,

lastName: lastName,

level: level,

matNo: matNO,

65
)

} catch (error) {

console.error(error);

alert('registration failed')

} finally {

setIsLoading(false);

};

const submit = async () => {

if (imageUrl) { // Check if image URL is available

upLoadImage();

// ... (implementation details in ImageUpload component)

submitDoc();

};

return (

<ScrollView style={{flex: 1, backgroundColor: "#9C0C7F99" }}>

<View style={styles.container}>

<Text style={styles.text}>STUDENT REGISTRATION</Text>

<TextInput

66
onChangeText={setFirstName}

placeholder='First Name'

value={firstName}

style={styles.input}

/>

<TextInput

onChangeText={setLastName}

placeholder='Last Name'

value={lastName}

style={styles.input}

/>

<TextInput

onChangeText={setMatNO}

placeholder='Matriculation Number'

value={matNO}

style={styles.input}

/>

<TextInput

onChangeText={setLevel}

placeholder='Level'

value={level}

style={styles.input}

/>

67
<TextInput

onChangeText={setDepartment}

placeholder='Department'

value={department}

style={styles.input}

/>

<TextInput

onChangeText={setFaculty}

placeholder='Faculty'

value={faculty}

style={styles.input}

/>

<ImageUpload onImageUploaded={setImageUrl} />

isLoading ? <ActivityIndicator size="large" color='#fff' /> :

<TouchableOpacity style={styles.button} onPress={submit}>

<Text style={styles.buttonText}>SUBMIT</Text>

</TouchableOpacity>

</View>

</ScrollView>

);

68
export default Registration;

69

You might also like