My Project 1
My Project 1
BY
PSC1908877
CITY
MAY 2024
A SMART BASED UNIVERSITY ATTENDANCE SYSTEM USING FINGERPRINT
BY
PSC1908877
CITY
MAY 2024
CERTIFICATION
This is to certify that this project work was carried out by ISEGHOHIMEN TIMOTHY OSE
both in scope and content, for the award of Bachelor of Science (B.Sc) Degree in Computer
I
APPROVAL
This project work is hereby approved in partial fulfillment of the requirements for the award of
Bachelor of Science (B.Sc.) Degree in Computer Science from the University of Benin.
_________________________________ __________________
II
DEDICATION
This project is dedicated to God Almighty for giving me the strength and wisdom to see it
through to completion, and even throughout my stay in the University of Benin (UNIBEN). It is
also dedicated to my parents; Mr and Mrs Iseghohimen and my sibling for their love, support and
III
ACKNOWLEDGEMENT
My utmost acknowledgement goes to God Almighty for giving me the strength, wisdom and
supervisor Dr Emmanuel Nwelih for his consistent guidance towards ensuring the successful
I would also like to specially thank my project coordinator Prof A.A Imavian, and other lecturers
in the Department of Computer Science who I have been opportune to cross paths with, and have
impacted me immensely these past few years: Prof. G.O. Ekuobase, Dr. F.O. Oliha, Prof. A.A.
Imiavan, Prof. (Mrs.) V.V.N. Akwukwuma, Prof. F.I. Amadin, Prof. (Mrs.) S. Konyeha, Prof.
(Mrs.) V.I. Osubor, Dr. (Mrs.) Aziken, Dr. F.O. Chete, Dr. (Mrs) R.O. Osaseri, Mr. P. E.B.
Imiefoh, Mr. I.E. Obasohan, Mr. S.O.P. Oliomogbe, Mr. K.O. Otokiti, Mr. I.E. obayagbonna,
Mrs. R.I. Izevbizua, Mr. E.C. Igodan, Mr J. Okhuoya, Prof. F.A.U. Imouokhome, Dr. E. Nwelih
Finally, I also want to appreciate those who contributed to the success of this project: Prosper
Kadiri, Felix Frank-Felix Ikechukwu, Precious Mercy Ene-Etuk, Nwapali Ehimah Jedidiah,
Agangan Gabriel, Ikogwe Assurance, Mercy Chichi Okolie and Benedict I would also like to
thank my family and friends for their support, words of encouragement, and consistent guidance
IV
TABLE OF CONTENT
CERTIFICATION .........................................................................................................................I
APPROVAL ..................................................................................................................................II
ACKNOWLEDGEMENT ..........................................................................................................IV
ABSTRACT .................................................................................................................................. X
INTRODUCTION ......................................................................................................................... 1
V
2.2 Fingerprint System For Attendance ............................................................................ 14
VI
4.0 Introduction ....................................................................................................................39
REFERENCES ............................................................................................................................ 50
APPENDIX .................................................................................................................................. 54
VII
LIST OF FIGURES
Figure 3.1 Diagram showing the percentage of students that will welcome the new system…..28
VIII
LIST OF TABLES
Table 1.3: Showing the percentage of student who has signed Attendance for their course mate………27
Table 1.4: Showing the Percentage of reliability on the current attendance system…………….28
IX
ABSTRACT
The aim of this study was to develop an Attendance system for The Computer Science
department of the university of Benin which allows for a smooth running of attendance tracking
in the department. This study identified the various users and system requirements, also specify
on the system design and implementation. A review of the literature was done to identify and
The user and system requirements of the system were identified from researches done from
existing systems. The system design was specified using UML diagrams which include uses case
diagram, flowchart diagram, class diagram. The development of the system was done using
JAVASCRIPT, REACTNATIVE AND EXPO for the front-end AND FIREBASE for the
database. The study concluded that using a Biometric base attendance system the university will
be able to get a smooth and accurate attendance recording from each service and make it easier
for attendance taking thereby eliminate the existing system in University of Benin.
X
CHAPTER ONE
INTRODUCTION
Bio-metrics have been around for thousands of years; it has progressed from crude means
throughout the previous few millennia. So, let us take a look back in time to see where
biometrics has been and how far we've gone. While the earliest descriptions of biometrics can be
traced back to 500BC in the Babylonian kingdom, the first record of a biometric identifying
system is from the 1800s in Paris, France. Alphonse Bertillon invented a technique for
categorizing and comparing convicts based on unique body measurements. While this method
was far from perfect, it was the first to employ distinct biological characteristics to authenticate.
(Admin, 2021).
Fingerprints have captivated humanity for centuries, and their unique patterns have held
significance across cultures. But the journey of using fingerprints for biometric identification and
security is a relatively recent development, with fascinating twists and turns. While their specific
use for identification remains unclear, the earliest references to fingerprints date back to 3000
BC in Babylonian clay tablets and even appear in ancient Egyptian and Chinese texts.
The modern era of fingerprint biometrics began in the 1880s. Henry Faulds, a Scottish physician,
is credited with proposing the use of fingerprints for personal identification. Around the same
time, Sir William Herschel, an administrator in British India, started using fingerprints on
contracts for verification. By the early 20th century, the advantages of fingerprints became
1
evident. Sir Edward Richard Henry developed a robust fingerprint classification system, paving
Initially, fingerprint impressions were captured on ink-stained cards. The 20th century saw the
development of electronic scanners, making the process faster and more efficient. Initially used
various sectors like border control, immigration, and access control systems. The 21st century
witnessed the integration of fingerprint scanners into smartphones and other devices, offering
Fingerprint verification is one of the oldest known biometric techniques known but still the most
widely used because of its simplicity and good records of accuracy. It is a well-known fact that
every human being is born with a different pattern on their fingers and these features are used to
identify and differentiate between two different persons. The benefit of this application in an
verification technique has been adopted to replace the conventional method such as sign-in
sheets, Name and Mat No as it saves time and eliminates all the set-backs identified with the
attendance register booklet. A fingerprint detecting device needs to be placed in each classroom
or exam hall, and students would be required to swipe their finger across the sensor so as to
indicate their presence in the class or exam. The student records are stored in the database for
verification. The moment a student swipes a finger across the scanner, a check would be carried
While fingerprint recognition technology has shown success in various domains, there are
challenges to overcome, such as privacy concern regarding biometric data collection, technical
issues with fingerprint scanner, user acceptance and adaptation. By addressing these challenges
2
and incorporating user-friendly features, this project will contribute to existing knowledge by
This research project focuses on addressing the challenges associated with attendance
methods of tracking attendance are often time-consuming, error-prone, and lack security
measures.
The main motivation behind this research is to save valuable time for both students and lecturers.
Manual attendance-taking methods, such as sign-in sheets or writing of name and mat No, can be
tedious, error prone, lack credibility and disrupt the learning environment. By implementing
teachers to dedicate more time to teaching and students to focus on their studies. Improving the
accuracy and reliability of attendance records is another key objective of this research.
Traditional methods are susceptible to errors, such as students forgetting to sign in or marking
attendance for absent classmates. Through the use of fingerprint recognition technology, we can
significantly reduce these errors and ensure more precise and trustworthy attendance records.
Addressing the issue of proxy attendance is also a significant focus of this research. Proxy
attendance occurs when students mark attendance for absent classmates, leading to inaccurate
based on their fingerprint, enhancing the security and integrity of the attendance process.
3
1.3 STATEMENT OF PROBLEM
A university is a large body that consists of staff, students as well as people who go about their
businesses. As the number of staff and students grows, so does the number of names on the
attendance list, keeping track of these attendance papers becomes a difficulty for both the class
rep and the lecturer, and no suitable backup is made in case of any external factor. Most colleges
still employ the conventional method, mostly in lecture halls and laboratories. Whereby the
teacher or lecturer will hand out a sheet of paper with a list of students' names to sign, or in
certain situations, the students must fill it out with their name, student ID, and matriculation
number to demonstrate their attendance in a specific class. In this manner, fabrication of the
student attendance list is prevalent. Assume a student is absent, but another student can sign in
their place. To avoid this problem, it is required to create a fingerprint authentication system for
pupils. Biometric recognition will be utilized to track and maintain track of every student's
The primary aim of this research is to develop a smart-based staff and student attendance system
using fingerprint recognition techniques that will enhance the efficiency and accuracy of
attendance management, and also improve security in universities. To achieve this aim, the
1. Evaluate the present method of attendance tracking to find flaws and fault.
2. Develop and design a robust fingerprint recognition model and an intuitive user interface.
3. Implement a secure and scalable database system and evaluate system performance.
4
1.5 SIGNIFICANCE OF THE PROJECT
As the range of students who use fingerprints Biometrics increases, the use of paper and pen to
sign in and out of classes, exam halls, programs, and all other academic-related activities where
attendance is required will be completely eliminated, which means we will no longer be at risk of
losing data due to misplacing the attendance sheet or any other type of damage to the written
records. Tracking and monitoring attendance time is time-consuming, and this project will
automate that process and make the information available at all times and easy to access. Most
importantly, it eliminates errors in attendance data and minimizes forgeries and fraud to a bare
minimum.
This approach will not only assist students but also the university management in detecting treats
and swiftly correcting the problem, as well as exposing and apprehending imposters, so
This study focuses on creating a Fingerprint Based Attendance system to Monitor staff and
students while also enhancing attendance by utilizing fingerprint as a means of verification for
This project entails the Evaluation of the current system in place, a new system would be
designed and developed using Different fingerprint recognition algorithms, such as Minutiae-
Based Algorithms, Pattern-Based Algorithms, Local Binary Pattern (LBP) and more, will be
evaluated to determine the most suitable algorithm for the attendance system.
A diverse data set of student fingerprint will be collected to train and validate the fingerprint
recognition model. Ethical considerations will be taken into account, and appropriate consent and
5
privacy measures will be implemented. The dataset will include a representative sample of
students from different backgrounds, ensuring inclusivity and fairness. The fingerprint
recognition model will be trained using the collected dataset. The performance of the model will
The major terms that will be encountered in this report are defined below
identifying persons based on their physical or biological traits. Even identical twins do not
have the same fingerprints. Unless the deep or 'basal' layer is lost or purposely altered by
plastic surgery, fingerprints do not change as we age. Fingerprint patterns are classified into
three types: arches, loops, and whorls. Each fingerprint is unique because of the form, size,
b) Biometrics: Biometrics is the measuring and statistical analysis of people's unique physical
and behavioral features. The technology is primarily used for identification and access
control, as well as identifying persons who are under observation. The underlying idea of
physical or behavioral attributes. The term biometrics is derived from the Greek word’s bio,
c) Student (University): University students are individuals who are enrolled in a university
and are pursuing higher education. They play a significant role in society and have the
6
d) Staff (University): University staffs are employees of the system other than faculty,
academic staff, persons whose employment is a necessary part of their training, student
e) University: A university is an institution of higher (or tertiary) education and research which
awards academic degrees in several academic disciplines. Universities typically offer both
undergraduate and postgraduate programs. The word university is derived from the Latin
f) Attendance system: Is a system that can keep track of the people that are
of ways. (INTERPOL)
7
CHAPTER TWO
LITERATURE REVIEW
An attendance management system is a software that helps institutions manage and track
employee time and attendance data. It can automate several attendance-related tasks,
including monitoring attendance, figuring out working hours, controlling overtime, and
producing reports. The system typically comprises several parts: a clock-in/clock-out interface, a
database to store attendance data, and a reporting module to provide different attendance reports.
Other functions like scheduling, payroll integration, and leave management may also be present
in some attendance management systems. Due to its ability to increase employee attendance and
lower absenteeism, attendance management systems can be advantageous for institutions of all
dedicated to this field, utilizing modern technologies (Ali et al, 2022). Particularly, researchers
distinguishing features like QR codes, IDs, passwords, face recognition, and fingerprint
recognition. This study offers a comprehensive review of recent advancements in automated and
technology, application domains, and key findings, we aim to highlight the progress made in this
8
Nabeel Salih Ali, Ahmed Hazim Alhilali, Hasanein D. Rjeib, Haider Alsharqi, and Basheer Al-
Sadawi (2022). "Automated attendance management systems: systematic literature review". This
systems. The authors discuss the different technologies that can be used for attendance tracking,
the advantages and disadvantages of each technology, and the challenges that need to be
Ashish Yadav and Sanjay Bhole (2019). "A comprehensive and systematic literature review on
the employee attendance management systems based on cloud computing". This article reviews
the literature on employee attendance management systems that are based on cloud computing.
The authors discuss the benefits of using cloud-based attendance systems, the different types of
cloud-based attendance systems that are available, and the challenges that need to be addressed
Bawar Ali Abdalkarim and Devrim Akgün (2022). "A literature review on smart attendance
systems". This article reviews the literature on smart attendance systems. The authors discuss the
different types of smart attendance systems that are available, the advantages and disadvantages
of each type of system, and the challenges that need to be addressed in order to develop more
2.1 BIOMETRIC
Biometrics is the science of establishing the identity of an individual based on their physical
attributes (Mwapasa et al.2020). It is an extremely effective way to identify individuals since the
users do not have to remember or possess anything. Biometrics are body measurements and
science/cyber security as a form of identification and access control. Biometrics are classified
9
into behavioral and physiological. Due to the high variance found in readings of behavioral
biometrics, physiological biometrics are more suitable for identification and can be used as a
camera and processing quality, facial recognition has proved to be a very convenient and
The use of biometric solutions is quickly outpacing that of manual and password-based
authentication. The three most crucial factors to take into account when creating and building
biometric solutions are security, privacy, and accuracy. This chapter presents a thorough analysis
that sheds light on the most recent advancements in biometric system security and privacy. This
chapter also outlines the difficulties of the future and current developments. Because biometric
credentials have several advantages over traditional authentication methods, they are becoming
more and more common in all relevant domains as a means of verifying an individual. The most
valuable relationship a user can have with his biometric credentials is through this authentication
mechanism; yet, the biometric system poses significant privacy and security risks in the event
that any of its features are hacked. In present time, we talk more about frauds and insecurity in
ecommerce, banking, etc. There are two conventional ways of identifying individual. The first
one is knowledge-based method which is based on different knowledge such as PIN and
password to allow user to activate services. The second method is on token-based method. It can
be a piece of badge, identification paper, key, etc. Both ways are insecure as password can be
forgotten or guessed by others, and in other case, badge id or other identification may be lost or
stolen. Biometric attributes are an optional solution with two previous modes. The merit of using
biometric features is universal, unique, measurable, and permanent. (Singh .G. et al, 2021)
10
(Gillis et al, 2023) This article talked about using biometric to verify identity and grant access
management. The basic premise of biometric authentication is that every person can be
consumer electronics and point-of-sale applications. In addition to security, the driving force
behind biometric verification has been convenience, as there are no passwords to remember
or security tokens to carry. The two main types of biometric identifiers are either physiological
characteristics or behavioral characteristics. This article also points out the advantages and
iii. Generally, the same over the course of a user's life it is nontransferable
It is costly to get a biometric system up and running. If the system fails to capture all of the
biometric data, it can lead to failure in identifying a user. Databases holding biometric data can
still be hacked. Errors such as false rejects and false accepts can still happen. If a user gets
injured, then a biometric authentication system may not work -- for example, if a user burns their
hand, then a fingerprint scanner may not be able to identify them. (Michael Cobb 2023)
11
2.1 BIOMETRIC SYSTEM FOR ATTENDANCE
individuals. This session will be addressing the different method of biometrics that was adopted
for the attendance base system. Many authors have written about attendance systems but the
more efficient method is biometrics and which makes the signing of attendance automatic. The
systems can be based on physical or behavioral characteristics, such as the iris, voice, fingerprint,
and face. Currently, the attendance tracking system based on biometric recognition for education
sectors is still underutilized, thus providing a good opportunity to carry out interesting research
in this area. As evidenced in a typical classroom, educators tend to take the attendance of their
students by using traditional methods such as calling out names or signing off an attendance
sheet. Yet, these types of methods have proved to be time-consuming and tedious, and
sometimes, fraud occurs. As a result, significant progress had been made to mark attendance
automatically by making use of biometric recognition. This progress enables a new and more
advanced biometric-based attendance system being developed over the past ten years. The
components. Since the software and hardware sections are too broad to be discussed in one paper,
this literature survey only provides an overview of the types of hardware used. Emphasis is then
storage, and other components to assist future researchers in designing the hardware part of
12
Chandavarkar (2021) conducted groundbreaking research on enhancing account security through
conventional login methods susceptible to various cyber-attacks, jeopardizing user privacy and
authentication system, incorporating the dynamic One Time Password (OTP) mechanism. OTP
involves generating a randomly fixed-digit code sent to the user's physical device upon entering
the correct password. This additional layer ensures that only authorised users can access the
system, significantly bolstering security. The dynamic nature of OTP makes it applicable in
various scenarios, such as secure bank transactions, social media account deletions, and cloud
platform access. Chandavarkar's research delves into the lifecycle of OTP, analysing challenges
and issues in the current technological landscape, further contributing to the field of
cybersecurity.
systems is thoroughly explored, encompassing various biometric data types such as fingerprints,
facial recognition, and iris scans for attendance tracking. Both commercial and open-source
biometric attendance systems are discussed, highlighting their benefits in terms of accuracy,
security, and convenience, along with the challenges they pose, including implementation costs,
privacy concerns, and user acceptance issues. The paper also identifies future research directions
to enhance the accuracy and security of these systems while emphasizing the need for
investigating the privacy implications of utilizing biometric data for attendance tracking. This
review serves as a valuable resource for understanding the current landscape of biometric
13
attendance systems and offers valuable insights into potential improvements in this rapidly
evolving field.
Fingerprint recognition is the ability to differentiate between two human fingers. Several print
pattern elements, such as ridges and minutiae points, are necessary to match two fingerprints.
Ridges have three main patterns: arch, loop, and whorl. Fingerprint recognition has been one of
the most essential and popular identifying techniques in recent years due to its high accuracy,
and the present fingerprint recognition system is enough for identification and verification
systems involving hundreds of users. (Anil K. Jain, 2023). There are three sub-domains in a
procedure by which a user's fingerprint data is captured using certain sensors and saved in a
prepared database after some processing. The collected fingerprint will be compared to the
template saved in the database during the verification process to authenticate a person's
identification. This procedure is also known as a one-to-one comparison. The goal of confirming
these data is to prevent several people from using the same identity.
In identification mode, the system will use a one-to-many comparison to determine the identity
of a person. The collected fingerprint will be compared to everything in the system's database,
and the only one that fits its record will be chosen.
(Nancy et al, 2020) ‘Automated latent fingerprint identification system: A review’ The two
primary search types used in the Automatic Fingerprint Identification System are the latent
search and the ten-print search (rolling and slap impressions). Technology has advanced to the
point where law enforcement agencies are widely implementing the completely automated, more
14
Identification System (AFIS). For matching rolling and slap prints, the False Positive
Identification Rate (FPIR) is reported as 0.1% and the False Negative Identification Rate (FNIR)
is reported as 1.9%, following the National Institute of Standards and Technology's (NIST)
periodic examinations [7]. On the other hand, the NIST's examination of latent fingerprints
(ELFT-EFS) shows that the Rank-1 Identification Rate for comparing 1114 latent prints to
100,000 reference images is 67.2%. In earlier times, the fingerprint experts manually performed
the entire process of analyzing and matching the latent prints. However, over the years, some
manual processes got automated, leading to the semi-automated latent fingerprint identification
system
(Saidur et al, 2023) This article proposed a fingerprint-based attendance management system.
The developed system was an embedded system that is part of a fingerprint recognition and
authentication system based on minutiae points. The system extracts a fingerprint's local
characteristic, which is made up of minutiae points in a template. Templates are matched during
both the registration and verification processes. For improved quality control during the
registration or verification process, a matching score was used to determine the success of the
operation. The matching score was specified so that only sets of minutiae data that exceed the
score will be accepted, and data below the score will be rejected. Therefore, fingerprint
recognition using the minutia score matching method was used for matching the minutia points
before attendance was recorded. The developed system is very helpful in saving the time of
students and lecturers, saving paper, and generating reports at the required time. The system can
record the clock in and clock-out times of students and workers in a very convenient manner
using their fingerprint to prevent impersonation and reduce levels of absence. Also, it reduces
15
most of the administrative jobs and minimizes human errors, avoids proxy punching, eliminates
time related disputes and helps to update and maintain attendance records.
(Ezema et al, 2019) proposed a reliable, secured, fast and efficient system replacing a manual
and unreliable system. The design of the system was done in two stages, the hardware part and
software section. The software part was achieved using Visual Basic to design a program which
would house the initial attendance database created in MS-excel, it can be used for the
registration of each new user, and also accepting attendance record from the hardware for
compilation with options of printing the updated record if required. The hardware (device)
comprises of the microcontroller, the fingerprint scanner, LCD display, real-time clock and serial
communication that is housed separately in a portable box, and is used for verification and
assigning of time to the registered user and sending the attendance data to the Visual Basic
program on the computer. The project was designed in such a manner that the hardware
component can function independent of software component (VB.Net) and can be used to record
attendance once the initial attendance database has been uploaded to its memory. Hence, a
system with expected results has been developed but there is still room for improvement in the
proposed system.
extracts local characteristics from fingerprints based on minutiae points within a template.
During verification and registration processes, student templates are compared to enhance the
quality and speed of operations. The success of these operations relies on matching scores, where
sets of minutiae data exceeding the specified score are accepted, and those falling below are
16
rejected. The paper also introduces the concept of fingerprint recognition to ascertain the
attendance percentage of both students and teachers, capturing the time of their arrivals. In
student details each month, the Fingerprint Recognition System streamlines the process.
Teachers can quickly access and input student details with a simple click, saving significant time.
This software proves beneficial for both students and teachers, promoting efficiency. Fingerprint
Recognition emerges as an effective method for evaluating student and teacher behavior. The
system records real-time entries of workers upon entry, streamlining administrative tasks,
eliminating human errors, and preventing proxy attendance. This approach not only reduces time
constraints but also provides easy access to student details, enhancing overall system efficiency.
(Olasupo, et al. 2022) In this study, a Fingerprint-Based Attendance Management System was
designed and implemented. The system developed has many features which include; managing
reports, etc. The system was able to provide smart solutions to the problems with the existing
accurate, process faster, efficient, reliable, economical by saving paper and pen, saves time
during capturing of attendance and also helps to eliminate loss of attendance sheet. The future
based on a variety of unique biometric data. Fingerprint recognition is one of these biometric
identifying systems, and it is also the most popular in the world. (Williams, 2019). The following
17
i. The Arch
This is the most unusual sort of fingerprint. In reality, around 5% of the world's population has
this fingerprint pattern. It is distinct due to the lack of cores, lines, or deltas. Within this pattern,
a. Plain Arch – This pattern is distinguished by raised ridges that run from one side of the finger
b. Tented Arch – The tented arch features elevated ridges that flow in the same direction as the
plain arch. The pitch of the increased ridge makes a noticeable difference. When contrasted to
the plain arch, the tented arch has a sharper edge and generates a tent-like shape.
This fingerprint pattern accounts for around 25 to 35 percent of the overall population. Whorls,
unlike the arch pattern, feature a core and two deltas. It is only comparable to the arch in terms of
18
Figure 2.2 The Whorl(https://prateekvjoshi.com/2012/07/22/fingerprint-recognition )
a. Plain Whorl – A plain whorl will produce a circular pattern resembling a swirl or spiral. This
circular pattern is continuous, and the revolution created in the middle is the result of at least one
ridge.
b. Central Pocket Whorl – In this design, the center ridges will bend many times to produce a
19
The most common fingerprint pattern. Indeed, this trend is shared by 60 to 70% of the whole
population. A single core and delta must exist in the loop pattern. Unlike the rest of the patterns,
a. Ulnar Loop – The ridges turn backward in this design, but not completely. You'll see the loops
traveling toward the tiny finger to identify an ulnar loop. These turns will be shown only if you
b. Radial Loop – This pattern is similar to the ulnar loop, but the difference is the turns point
c. Central Pocket Loop –The ridges in this pattern re-curve to surround the central whorl.
Apart from the three main fingerprint types, two more exist:
i. Double Loop Whorl – Close inspection reveals two distinct loops that encircle each other from
opposing directions.
20
ii. Accidental – This category includes any pattern that does not match any of the other types
listed here. These patterns contain two tented arch features: loop or whorl patterns. (Wikipedia)
process for both employees and students. It consists of two steps: enrollment and authentication.
During enrollment, the user's biometrics are collected, and the minutiae data are extracted and
saved in a database as a template for the topic, along with the user's ID. The enrollment module's
goal is to accept a user into a database using his or her ID and fingerprints following feature
extraction. These characteristics constitute a template that is utilized to identify the user's identity,
system performs the enrolling procedure. During authentication, the user's biometrics are taken
once more, and the extracted characteristics are compared to those already in the database to
determine if there is a match. Following a successful match, attendance is recorded against the
The study made use of a fingerprint reader as an input to gather photos, and it created a program
with a fingerprint recognition and identification system, as well as a database to store user
information. The database contains users' fingerprint templates and other bio-data, as well as
attendance records. The database comprises the fingerprint templates and other bio-data of the
The system architecture can be broken down the designs and the way in which we want to
implement and develop the fingerprint-based attendance management system in the following
stages/modules:
a. Enrolment Stage
21
b. Authentication Stage
c. System Database
At the enrolment stage in the project, the primary role is to register users and their fingerprints in
our system's database. The fingerprints and other bio-data of users are captured, and the unique
features are retrieved and saved in our database as a template for the topic, including the
Matriculation Number, Surname, Other Names, Level and Course of Study, College (Faculty),
and Passport Photograph are the bio-data to be captured for students, while those for staff may
include: Surname, Other Names, Sex, Position, Staff Type, Phone Number, email, Department,
and Passport Photograph. A clear picture sample per fingerprint is taken to increase the quality of
the kind of image obtained during registration and enrollment. When fingerprint photos and the
user's name of a person to be registered are supplied into the enrollment module, a minutiae
extraction method is used to the fingerprint images and the minutiae patterns (features) are
retrieved. These characteristics combine to build a template that is utilized to identify the user's
system handles the enrollment process. The enrollment and registration phases are administrative
in nature. For the first time, the user's fingerprint and other bio-data are saved into the database
for registration. This module contains all of the data and information necessary for accurate
attendance tracking.
22
CHAPTER THREE
A requirement is a declaration of the desired conduct. It deals with entities or system objects,
their possible states, and the functions that can be used to change an object's attributes or state.
Understanding a user's problems and requirements is the aim of the requirements collecting and
analysis phase. This understanding will form the basis of the user's expectations of the proposed
new system. It comprises analyzing the requirements obtained in order to determine the
specifications of the proposed new system, thoroughly reviewing the project problem statement,
and obtaining requirements from intended users and other stakeholders in order to create a
University of Benin currently track student attendance manually by paper and pen method.
Students are cleared after gaining admission and performing the necessary duties to get
themselves certified by proving their documents during the compulsory 100level clearance.
Matriculation numbers are giving to each student which is a way to differentiate one student
Lecturer take attendance on a piece of paper by asking students to write their names and Mat
number during the class, and the list is submitted back to the lecturer before he or she ends the
class for that day. This method is repeated each time the lecturer come to teach a particular class
which make the tracking of attendance difficult as the lecturer might lose track of which paper is
23
for a particular class. The analysis of the manual system was looked into and the following
After examining the existing system, there were some notable benefits and limitations worth
considering. The existing system demands the physical presence of students thereby ensuring
active engagement and participation in daily class activities. Moreover, the familiarity with
students' faces aids in their identification, streamlining the attendance process. Its low cost and
simplicity is also an impressive factor as students find it easy to use. Finally, if the papers are
However, despite claims of openness and system stability, the existing system presents several
potential issues with student participation. They can be incredibly time-consuming, especially for
large lectures, as instructors must manually call out names and record responses or they pass
papers between students while they write their names and Matriculation numbers. This process is
also prone to errors, with missed marks, mistaken identities, and even proxy attendance
(someone signing for another student) being common issues. Furthermore, analyzing attendance
trends or generating reports becomes a laborious task due to the inefficiency of paper-based data
management. Security risks are another concern, as paper records are vulnerable to loss, theft, or
tampering. Limited accessibility to real-time data also presents a challenge, making it difficult
for parents, advisors, or even students themselves to easily track attendance. Finally, paper-based
24
systems contribute to resource inefficiency, requiring significant amounts of paper for both
Moving forward, an analysis of the proposed system reveals promising advancements. The
user authentication. Integrated hardware facilitates the seamless transition from manual to
automated methods. This new system will operate in identification mode, offering several
functionality. It captures fingerprints, extracts feature, and securely stores them in a centralized
database. Additionally, it verifies users' identities during registration and attendance collection,
The design goals for the proposed system prioritize student authentication and the verifiability of
attendance. Secure data transfer mechanisms ensure the integrity of attendance records,
Functional requirements emphasize the provision of accurate data, generation of standard reports,
25
3.2.3 NONFUNCTIONAL REQUIREMENTS OF THE PROPOSED SYSTEM
sensitive student information. During the registration or attendance procedure, the system must
operate at peak efficiency. The system should also possess backup and data restore capabilities,
3.2.4 SECURITY
These requirements encompass zero tolerance for compromises, accurate time and date settings,
prevention of unauthorized access, and robust protection of student records. In summary, the
proposed system represents a significant improvement over the existing manual method. By
A google form was created to collect data from students about how the present mode of
attendance tracking in the university work. The questionnaire also contained question like flaws
of the existing system, how often do inconsistences occur and also to know if they would
welcome a new and improved system that would fix the flaws of the present attendance tracking
26
Female 45 47.4 47.4
The accompanying table depicts the gender composition of the study participants. Of the
respondents, 50 were male, constituting 52.6 percent of the total. 45 were female, accounting for
the 47.4 percent of the sample. This analysis shows a higher participation of males than females
in the survey.
18-22 30 32 32
22-25 65 68 68
Out of the total number of 95 respondents, 30 are between the age category of 18 to 22 which
represent 32% of the total population. 65 are between the age category of 22 to 25 which
represents 68% of the total population. All participants are students of the university of Benin.
Table 1.3: Showing the percentage of student who has signed Attendance for their course
mate
No 30 28.9 28.9
27
Table 1.4: Showing the Percentage of reliability on the current attendance system
From the above table you can see that a higher percentage of students don’t find their current
method of attendance tracking reliable and accurate. With 77.8% of students picking unreliable
we can see that there is a huge flaw in the present attendance system that needs to be corrected.
Figure 3.1 Diagram showing the percentage of students that will welcome the new system
The above pie chart in figure 4 shows the percentage of students who wants a new system for
attendance tracking to be developed this result prompted in the development of a new attendance
tracking system that makes use of biometrics (Fingerprint) for attendance tracking.
28
3.4 EXPLORATION OF WATERFALL MODEL
I. Requirement Gathering and Analysis: The initiation of the process involves capturing and
documenting all system needs comprehensively, including the analysis of input and output
specifications.
II. System Design: Following the requirement analysis, the system design phase formulates the
architecture based on the identified needs, defining hardware specifications, system requirements,
III. Implementation: The system construction begins with breaking down the design into
smaller units, which are developed and tested individually through Unit Testing.
29
IV. Integration and Testing: Upon completion of unit testing, all units are integrated to form
the complete system, which undergoes rigorous testing to identify and rectify defects or failures.
V. Deployment of System: Once the system passes testing and is deemed functional, it is
VI. Maintenance: The final phase addresses issues in the client environment by providing
After defining the needs of the proposed system, I will describe the system's architecture, which
will include the use of software modeling tools to structure requirements. We may gain a
complete understanding of needs by structuring them. It is critical to use standard notations when
modeling, documenting, and conveying choices. In this project work, use case models, data flow
diagrams, entity - relationship models, and hierarchy chart, as well as input, process, and output
(HIPO) diagrams, would be used to specify the functionality and non-functionality of the
30
Figure 3.3 Diagram showing system architectural design
Various modeling techniques such as use case models, data flow diagrams, entity-relationship
models, hierarchy charts, and input-process-output (HIPO) diagrams will be utilized to specify
the functionality and non-functionality of the proposed attendance system featuring biometric
fingerprint authentication.
Visual representation of entities and their interconnections within the information system,
31
Diagram (ERD) illustrates the entities within a system and their interactions, providing a visual
Illustration of data flow through the system, depicting data movement and transformation
processes.
Provides an overarching view of the core entities, processes, and data flow within the system,
Flowchart for fingerprint biometrics attendance system. Figure 3.4 shows the
flowchart diagram
32
Figure 3.4 Flowchart of the System.
iv. Use Case Diagram.
The use case diagram visually presents the essential components and actions involved in a
system. Actors represent the fundamental elements, while use cases represent the actions or
processes. It illustrates the interactions between actors and use cases. Figure 3.5 displays the
33
Figure 3.5 Diagram showing use case
Actor: Student
1. Registration: This critical function involves students entering their information and
fingerprint templates into the system, which are then stored in the database.
2. Fingerprint Enrollment: Students are required to register their fingerprints, which will
3. Authenticate and Validate: Fingerprint data is verified for accuracy before each class or
examination.
checkpoints.
5. View Past Attendance: Students have access to their attendance history for monitoring
purposes.
Actor: Admin The admin oversees the operation of the mobile fingerprint app.
34
ii. Manage Student Attendance Reports: Admins can view attendance reports for each
service.
iii. Create Service Type: Admins can set up service types for attendance tracking.
iv. Edit Service Type: Admins can modify or delete service types.
v. Delete Past Attendance: Admins have the ability to remove outdated attendance records.
HIPO diagrams depict system processes and their connections. Two diagrams illustrate
student registration and the attendance system, outlining logical pathways for registration,
Fi
35
3.6 THE FINGERPRINT MODULE
The module used is the mobile android devices specifically from android version of 5.0 upwards,
as long as your android phone as a fingerprint sensor as ninety percent of phones today.
i. Fingerprint Enrollment: This process involves collecting and storing fingerprint data from
users, ensuring its accuracy and association with the respective user.
ii. Enrollment Workflow Procedure: A step-by-step guide for capturing and storing fingerprint
data, including obtaining user identification, capturing fingerprint samples, and creating
fingerprint templates.
iii. Fingerprint Verification: Verification entails comparing fingerprint data to stored templates
The suggested system integrates fingerprint authentication into the staff and student attendance
management process. Authentication and enrollment are the two procedures involved. The user's
biometrics are gathered during enrollment, and the specifics are taken out and stored in a
database along with the user's ID as a template for the subject. Accepting a person into a
database using their ID and fingerprints after feature extraction is the aim of the enrollment
module. These traits make up a template that is used to determine the identity of the user, hence
establishing the authentication procedure. The enrollment process is carried out by an attendance
management system administrator. The user's biometrics are collected again during
authentication, and the extracted traits are compared to those already stored in the database to see
36
if there is a match. Attendance is tracked against the user ID that was used to match the
The system architecture can be broken down the designs and the way in which we want to
implement and develop the fingerprint-based attendance management system in the following
stages/modules:
a. Enrolment Stage
b. Authentication Stage
c. System Database
At the enrolment stage in the project, the primary role is to register users and their
fingerprints in our system's database. The fingerprints and other bio-data of users are captured,
and the unique features are retrieved and saved in our database as a template for the software,
including the Matriculation Number, Surname, Other Names, Level and Course of Study,
College (Faculty), and Passport Photograph are the bio-data to be captured for students, while
those for staff may include: Surname, Other Names, Sex, Position, Staff Type, Phone Number,
email, Department, and Passport Photograph. A clear picture sample per fingerprint is taken to
increase the quality of the kind of image obtained during registration and enrollment. When
fingerprint photos and the user's name of a person to be registered are supplied into the
enrollment module, a minutiae extraction method is used to the fingerprint images and the
minutiae patterns (features) are retrieved. These characteristics combine to build a template that
is utilized to identify the user's identity, so forming the authentication process. An administrator
of the attendance management system handles the enrollment process. The enrollment and
registration phases are administrative in nature. For the first time, the user's fingerprint and other
37
bio-data are saved into the database for registration. This module contains all of the data and
38
CHAPTER FOUR
4.0 INTRODUCTION
This chapter explores the implementation of ATTENDIFY which is a smart based attendance
system. Its focus will be on the front end development and cloud integration of the complete
system. In this section will provide a lot of details about the software implementation process,
such as the choice of frameworks, programming language used, screenshot of the result, also the
code, and how each page line of code maps to its result.
Some tools used in the implementation of the Software are given below:
development was JavaScript. JavaScript was used to create both the frontend (using
abstract a lot of details in the creation of software products. The use of a framework
speeds up the process of software creation and allows developers to focus on the major
functionality of their application. The major framework used in this project is the React-
iii. Development Tools: For the development of this software, Visual studio code (widely
known as VS Code) was used as the code editor. It is an open-source code editor
developed and maintained by Microsoft. For maintaining versions of the application, Git
39
and GitHub were used as the version control system. Git is a version control system,
iv. Deployment Platform: This software is a mobile app that is compatible with both
android and ios platform. It was created using Expo a React-Native library that allows
you to run mobile app easily from development stage to deployment stage.
v. Operating System: The software was built on a windows 10 OS. And can run on any
The key features that make up the systems are shown below:
implement the functionality. This method was picked because of its simplicity and fast
response. If a user has an account, and the authentication is successful, the details for the
software are fetched from the cloud database. (which in this case is Google’s cloud
firestore). If the user doesn’t have an account already he can also create one with the sign
up option. This user is the admin who has access to the attendance records.
40
Figure 4.1 Login Screen
Figure 4.1 is the first screen that is displayed when the admin opens the app. This is where he or
she inputs her details to get logged in without this authentication being complete the user cannot
It has different option for the user to sign-in depending on the users operating system. Google
Authentication was enabled for android users, while Apple Authentication was enabled for IOS
users. This Application can run on multiple platform even on the Web.
41
Figure 4.2 Signup Screen.
Figure 4.2 is the first screen that is displayed when a new user opens the app, a user that has no
account before. This is where he or she inputs her details to get an account created without this
authentication being complete the user cannot proceed further in the app.
It has different option for the user to sign-in depending on the users operating system. Google
Authentication was enabled for android users, while Apple Authentication was enabled for IOS
users. This Application can run on multiple platform even on the Web.
42
ii. Dashboard: The dashboard is the screen that displays after the user authentication is
complete. It can also be referred to as the home screen because it contains link to the
various parts of the app. The homepage contains links to Student registration page, course
list, attendance list, attendance page etc. This page helps with easy navigation through the
43
iii. Student Registration Page: This is the page where the Student data is collected and
stored in the data base. It contains filed for name, matriculation number, department,
faculty, and gender which it can use to clearly sort student’s data. This operation is
44
iv. Attendance List: This screen displays the attendance List for each Specific Date It
accurately sorts each list according to the course offered that day. The admin has access
to the list to cross check and generate an excel spreadsheet for that day attendance.
45
v. Course List: The course list page shows the course Timetable for the department. With
this course list the attendance can be tracked daily as separate list are being generated for
The front end part of the app (Which is what this project focuses on) was designed using React-
Native. React-Native is a JavaScript framework that is used to create cross platform Application.
Expo Libraries were used which is an open-source platform for making universal native apps for
Android, iOS, and the web with JavaScript and React. Figure 4.6 shows the codes for the student
registration page
The block of Code below in figure 4.7 check if a user is logged into the software, if a user is
logged into the software it renders the inside stack which contains the main screens of the app. If
the user is not signed or there’s an authentication error, it renders the Outside stack which
46
contains the Login and Signup screens. These code are for the frontend side of the application
47
CHAPTER FIVE
5.1 SUMMARY
This project documented the development of a smart base attendance system using fingerprint
techniques for the Computer Science department at the University of Benin. The Attendance
platform for online database storage for student data, a software for attendance tracking and
follow up. Chapter one introduced the challenges of the existing system and outlined the project's
goals. Chapter two reviewed the history and evolution of biometrics and attendance systems.
Chapter three described the system model, design, architecture, and compared the current state
with the proposed smart base attendance system. Chapter four detailed the development tools and
system documentation. Finally, we have a summary and conclusion on the project topic.
5.2 CONCLUSION
The Attendance system is a cross platform software that provides a host of functionalities, as
mentioned in previous chapters. Traditionally, student attendance was recorded manually using
management system would considerably aid institutions or any company and therefore eliminate
obtain student attendance statistics as well as monitor weekly or monthly attendance summaries.
This will increase the net productivity of institutions or any organization. The suggested system
is dependable, secure, and efficient, and it is capable of replacing the existing manual and
unreliable way of attendance management. This approach maintains the security of student
48
records, eliminates phony attendance records, saves time, and reduces the amount of effort done
by the administrator in acquiring student attendance records. The suggested system may be
enhanced by using multimodal biometric technologies to increase the security of the student
attendance management system. The system was developed using a cloud database (Google
Cloud Platform) to manage the user information (lecturers, students, admins), as well as the
courses and their properties. The system has been made to tackle the current problems
learning is dynamic with the change in technology devices, it might not be able to handle some
• Scalability: The current cost of maintaining the Attendance system for a department
might increase significantly for university-wide deployment. Unforeseen expenses may arise
Other challenges, apart from the mentioned, exist but would show effect with time.
5.3 RECOMMENDATIONS
The proposed system, when implemented properly, has the potential to enhance the learning
experience for students allowing lecturer to focus more on teaching the students than collecting
of attendance. A more refined user interface and experience can also be provided to improve the
usability of the software for the users cause human needs change overtime.
As we all know a normal android phone can’t retrieve and store Students data on a database as
there are specific android devices made for such purpose. I would recommend that the school has
some if we are to switch from a paper based attendance system to a biometric based attendance
system.
49
REFERENCES
literature_review_on_smart_attendance_systems.
Adesua, O. (2016, November 21). Online voting system with biometric authentication for UI.
https://www.researchgate.net/publication/275605455_online_voting_system_with_biome
tric_authentication_for_UI.
www.bioconnect.com:https://bioconnect.com/2021/12/08/a-briefhistoryofbiometrics
Ali, N., Alhilali, A., Rjeib, H., Al-Sadawi, B., & Alsharqi, H. (2022). Automated attendance
Alexander S. Gilis, Peter Loshin, Micheal Cobb (2022). What is Identity and access
searchsecurity/definition/biometrics#
Anil K. Jain, A. R. (2024, August 9). Fingerprint A means of biometric identification. Retrieved
Ashish Yadav and Sanjay Bhole (2019). A comprehensive and systematic literature review on
the employee attendance management systems based on cloud computing. Retrieved May
_A_literature_review_on_employee_attendance_management_system.
Bawar Ali Abdalkarim and Devrim Akgün (2022). A literature review on smart attendance
50
Systems. Retrieved May 8, 2024, from Research Gate: https://www.researchgate.net
/publication/362405196_A_Literature_Review_on_Smart_Attendance_Systems
biometricAuthentication#
publication/4236452799_A_review_of_the_state_of_the_art_computer_system.
Chandavarkar, A (2021). “Securing the Login Interface: A Review of Current Practices and
Hoo, S., & Ibrahim, H. (2019). Biometric-Based Attendance Tracking System for Education
doi:10.1155/2019/7410478.
www.interpol.int: https://www.interpol.int/en/How-we-work/Forensics/Fingerprints
Krish Bhojwani, Krishh Lohar, Aachal Awasare, Sayali Golatkar , Vaishali bodhale (2024)
Fingerprint Based Attendance System. Retrieved May 9, 2024, from The World Financial
Review: https://worldfinancialreview.com/wp-content/uploads/2024/4
L.S. Ezema, C.K.A. Joe-Uzuegbu, J. N. Eneh and I. Amanze (2019) FINGERPRINT BASED
51
ATTENDANCE MANAGEMENT SYSTEM. International Journal of Scientific &
Md. Saidur Rahman, K. M. Rumman, Rubab Ahmmed , Md. Abdur Rahman , Md. Asaduzzaman
_A_fingerprint_based_biometric_attendance_system.
Mwapasa, M., Gooding, K., Kumwenda, M., Nliwasa, M., Sambakunsi, R., Parker, M., Bull, S.,
& Desmond, N. (2020). Are we getting the biometric bioethics right? The use of
biometrics within the healthcare system. Global Bioethics, 31(1), 67–80. Retrived May 8,
_The_right_way_to_use_biometrics
Nabeel Salih Ali, Ahmed Hazim Alhilali, Hasanein D. Rjeib, Haider Alsharqi, and Basheer
gate.net/publication/2192764578_Automated_attendance_management_systems.
Nancy Singla, Manvjeet Kaur, Sanjeev Sofat, (2023) Automated latent fingerprint identification
Olasupo, A. O., Ademiluyi, O. S., Usman, M. A., Abdullah, K. A., Olubanwo, O. O., Ayo, F. E.,
Singh, G., Bhardwaj, G., Singh, S.V., Garg, V. (2021). Biometric Identification System: Security
52
and Privacy Concern.
Awasthi, S., Travieso-González, C.M., Sanyal, G., Kumar Singh, D. Artificial Intelligence for a
030-77070-9_15
Williams, J. (2019) Various types of Fingerprint from humans. Retrieved May 3, 2024, from
www.attorneyatlawmagazine.com/various-typesfingerprints/amp:www.attorney
atlawmagazine.com/various-types-fingerprints/amp
53
APPENDIX
SOURCE CODE
'Inter-Bold': require('./assets/fonts/Inter-Bold.ttf'),
'Inter-Medium': require('./assets/fonts/Inter-Medium.ttf'),
'Inter-Regular': require('./assets/fonts/Inter-Regular.ttf'),
});
useEffect(() => {
auth.onAuthStateChanged((user) => {
console.log('user:', user)
54
setUser(user);
});
}, []);
return (
<NavigationContainer >
user ?
</Stack.Navigator>
</NavigationContainer>
);
Login Page
55
import loginStyle from '../styles/loginStyle';
setIsLoading(true);
try {
} catch (error) {
console.error(error);
} finally {
setIsLoading(false);
};
return (
<SafeAreaView style={loginStyle.container}>
56
<ScrollView showsVerticalScrollIndicator={false}>
<View style={loginStyle.div}>
<Text style={loginStyle.text}>LOGIN</Text>
<TextInput
onChangeText={setEmail}
placeholder='Email'
value={email}
style={loginStyle.input}
/>
<TextInput
onChangeText={setPassword}
placeholder='Password'
value={password}
style={loginStyle.input}
secureTextEntry
/>
<Text style={loginStyle.buttonText}>Login</Text>
57
</TouchableOpacity>
<TouchableOpacity style={loginStyle.googleButton}>
</TouchableOpacity>
<TouchableOpacity style={loginStyle.appleButton}>
</TouchableOpacity>
'Inter-Medium'}}>Sign up</Text>
</TouchableOpacity>
</View>
</View>
</ScrollView>
</SafeAreaView>
);
58
export default Login;
SignUp Page
setIsLoading(true);
try {
} catch (error) {
console.error(error);
} finally {
59
setIsLoading(false);
};
return (
<SafeAreaView style={signUpStyle.container}>
<ScrollView showsVerticalScrollIndicator={false}>
<View style={signUpStyle.div}>
<TextInput
onChangeText={setEmail}
placeholder='Email Address'
value={email}
style={signUpStyle.input}
/>
<TextInput
onChangeText={setPassword}
placeholder='Password'
value={password}
secureTextEntry
style={signUpStyle.input}
/>
60
<TouchableOpacity style={signUpStyle.button} onPress={signUp}>
</TouchableOpacity>
<TouchableOpacity style={signUpStyle.googleButton}>
</TouchableOpacity>
<TouchableOpacity style={signUpStyle.appleButton}>
</TouchableOpacity>
'Inter-Medium'}}>Login</Text>
</TouchableOpacity>
</View>
</View>
</ScrollView>
61
</SafeAreaView>
);
Home Page
return (
<StatusBar />
<HomeHeader />
<View style={homeStyle.container}>
<View style={homeStyle.topRectangle}>
62
</View>
navigation.navigate(Registration) }>
</TouchableOpacity>
navigation.navigate(MarkAttendance) }>
style={homeStyle.gridIcons}/>
</TouchableOpacity>
<TouchableOpacity style={homeStyle.grid}>
</TouchableOpacity>
navigation.navigate(AttendanceList) }>
style={homeStyle.gridIcons}/>
63
</TouchableOpacity>
<TouchableOpacity style={homeStyle.grid}>
</TouchableOpacity>
<TouchableOpacity style={homeStyle.grid}>
style={homeStyle.gridIcons}/>
</TouchableOpacity>
</View>
</SafeAreaView>
StudentRegistration Page
native';
64
import styles from '../styles/RegistrationStyle';
setIsLoading(true);
try {
{ department: department,
faculty: faculty,
firstName: firstName,
lastName: lastName,
level: level,
matNo: matNO,
65
)
} catch (error) {
console.error(error);
alert('registration failed')
} finally {
setIsLoading(false);
};
upLoadImage();
submitDoc();
};
return (
<View style={styles.container}>
<TextInput
66
onChangeText={setFirstName}
placeholder='First Name'
value={firstName}
style={styles.input}
/>
<TextInput
onChangeText={setLastName}
placeholder='Last Name'
value={lastName}
style={styles.input}
/>
<TextInput
onChangeText={setMatNO}
placeholder='Matriculation Number'
value={matNO}
style={styles.input}
/>
<TextInput
onChangeText={setLevel}
placeholder='Level'
value={level}
style={styles.input}
/>
67
<TextInput
onChangeText={setDepartment}
placeholder='Department'
value={department}
style={styles.input}
/>
<TextInput
onChangeText={setFaculty}
placeholder='Faculty'
value={faculty}
style={styles.input}
/>
<Text style={styles.buttonText}>SUBMIT</Text>
</TouchableOpacity>
</View>
</ScrollView>
);
68
export default Registration;
69