SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4267
Survey on Development of Fingerprint Biometric Attendance
Management System using Wireless Connectivity
Tejaswini E S1, Zeba Afza2, Prof. Pushpaveni H. P3
1Tejaswini E S, Dept. Of Computer Science Engineering, Dr.AIT college, Bangalore, Karnataka,India
2Zeba Afza, Dept. Of Computer Science Engineering, Dr.AIT college, Bangalore, Karnataka,India
3Professor Pushpaveni H.P, Dept. Of Computer Science Engineering, Dr.AIT college, Bangalore, Karnataka,India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In the modern era, various organizations,
institutions and companies are keeping track of
employees/staffs attendance using the biometric fingerprint
authentication system. Attendance management is an
important and herculean task. Along with this, the
institutions with a single device tend to accumulate crowd
and becomes a clumsy and chaotic task. In the biometric
fingerprint authentication system, the system keeps track of
employee attendance avoiding fake entries. But the question
arises about the complete presence of the employee/staff
during the working hours after he/she has punched in the
attendance for the day. It has been usually noticed that the
workers tend to escape their workplace after giving the
attendance at the right time. In this paper, we focus on
proposing a smart attendance management system which
has the integration of both concepts- biometric fingerprint
system and wireless connectivity for a particular restricted
area. We mainly encompass the idea of using an android
mobile phone device as a smart ID card for which we
develop a mobile application in Java. The system will
register the user and accept the attendance of the employee
through the use of this smart ID card, with all the records
being saved for subsequent operations in the backend using
database. The system provides portability since the input
image is accepted using a mobile device and reduces need
for external fingerprint scanning device which also reduces
the hardware cost and maintenance.
Key Words: Smart ID card(android mobile phone),
android application, fingerprint authentication,
wireless LAN, smart attendance management system.
1. INTRODUCTION
Biometric Identification acts as a unique ID proof for any
individual. Recently Biometric Identification has become
popular due to its uniqueness, consistency and specificity.
Biometric authentication is the process of analyzing the
data for the person's characteristics to that person's
biometric template to determine resemblance. This
technique cannot be duplicated and it is highly secured.
The main goal of applying biometrics to user
authentication is to provide security to users and detect
imposters in terms of user’s physiological or behavioral
characteristics.
Approximately there exist about 14 types of biometric
technologies which are DNA, Iris, Retina, face, fingerprint,
finger geometry, hand geometry, odor, typing, vein , voice,
and gait recognition. These are all techniques of
identifying and authenticating individuals that would
provide a more reliable and efficient way of verifying a
person identification also preventing access to
unauthorized personnel.
Fingerprint based biometric authentication and
verification systems have gained enormous demand in the
market. As it is easy to operate install, alter and easy
recovery of fingerprint. Achieving fingerprint recognition
system as secure to use since the uniqueness of a
fingerprint does not change in a lifetime. Different
organizations use Biometric fingerprint authentication to
identify their employees. It diminishes the proxy giving
attitude of the employees. To identify the employee, the
fingerprint sensors are generally set up in front of the
entrance or exit door. Sometimes, some employee misuses
the advantage of this fingerprint sensor. An employee uses
his own fingerprint to open the door for someone else to
leave. So, the fingerprint sensor can't ensure the presence
of an employee in the workplace. [1]. To avoid the misuse
of the hardware we can come up with an easy going, cost
efficient approach. There is a cumulative progress of
android technology and its availability over a decade.
Android application has made life easier and convenient.
Here android technology plays an important role. In recent
years, mobile phones have become one of the popular
gadgets. So, we have developed a fusion of wireless
network and fingerprint authentication system as a mobile
application.
Only a mobile application cannot ensure the presence of
an employee in an organization. To ensure their physical
presence not only a mobile application is required but the
organization should be linked with a router. Here the
android phone acts as a smart card to all the employees of
an organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4268
An employee can be able to give his attendance only if he
is connected to that specific router. This ensures the
physical presence of an employee. A counter will be there
in the system which will calculate the time of being
present in the workplace as long as someone is connected
to the router. When an employee leaves, the device will get
disconnected and as soon as it comes into the range of the
router it will be reconnected again and resume the
counting process where it was left. The whole system is a
fusion of fingerprint authentication system and wireless
router where the attendance will be started counting only
after an employee is in the router range and gets logged in
through fingerprint authentication at the same time. This
is a session based log-in system which will randomly get
signed out at any time of the working hour and needs the
employee to get logged in again through fingerprint
authentication within a given time to resume the
attendance process. The log in process is session based so
that an employee cannot leave the place without the
device. [2]
Our proposed system can set aside the traditional
attendance system as it has many advantages such as high
accuracy; optimize time complexity and router system.
Some characteristics of the proposal system are:
1) Dependency on biometric hardware is reduced.
2) Due to reduced dependency, cost of the system as
whole is reduced.
3) Provides increased portability to system.
2. LITERATURE SURVEY
In the present hi-tech world, there is an ever growing need
to authenticate and identify people for security purposes.
A wide variety of modern systems requires consistent
personal recognition schemes to either confirm or
determine the identity of an individual requesting their
services. The objective is to ensure that the rendered
services are accessed only by a legitimate user and no one
else, to discourage fraud and enhance security and to
specifically identify individuals in corporate areas. Person
identification methods are generally classified into three
categories namely, a) Knowledge-based approach: Person
who knows something to make his/her personal identity
such as password or personal identification number (PIN).
b) Token based approach: It uses particular ID, such as a
passport, keys, ID card. c) Biometric based approach: This
approach uses physiological or behavioral features of an
individual which cannot be stolen or lost. The biometric
identification method consists of three operations, they
firstly capture biometric sample of the person and make a
digital representation of the sample, then extract unique
features from the digital representation using feature
extractor, and then compare the extracted feature set
against the template set in the database via matcher.[3]
The manual attendance tracking system for any system is
a very tedious and cumbersome process. It consumes a lot
of time. Our advanced attendance system will help to get
rid of this problem. In this section we have briefly
discussed those works which are related to automating
the attendance system.
Some studies have been found that especially focused on
the attendance system using biometric fingerprint
authentication. J.Chandramohan et al. [5] discussed the
system which was basically a micro-controller based
prototype which used fingerprint sensor and in order to
track individual missing person's location it used GSM
technology. They only dealt with biometric authentication
using micro-controller which is a hardware concept.A
study conducted by Jennifer C et al. [6] introduced an
advance attendance system. It was basically an Arduino
based system which combined with MATLAB. They
developed a fingerprint identification system using
Adafruit Fingerprint algorithm with the help of Arduino.
To detect and recognize the face, they used Viola-Jones
Face Detection Method and Principal Component Analysis
(PCA) with the help of MATLAB.
Sarkar et al. [7] designed and implemented smart
Attendance system using multiple steps. They focused on
to overcome the inconveniences due to manual attendance
system by using radio frequency identification, biometric
fingerprint sensor, and password based technologies. They
developed a C based desktop application to monitor the
attendance system which gives a better solution because
they developed a software application. Adeoye Temitope
Onaolamipo [8] adopted a biometric access control
techniques. A system was designed with an extended
graphical user interface by using Microsoft visual studio
2010 and merged with Microsoft fingerprint reader. In the
users computer or server, the student information was
stored on the server with the help of MySQL. Parul
Wadhwa [9] focused on an android application. She
developed a system where a student could give their
attendance with the help of a fingerprint sensor and later
on the data would be stored in a centralized database. An
Android application would use this database and from that
application, students would be able to view their
attendance. Another study has been conducted where
Akshay A. Kumbhar et al. [10] focused on storing the
attendance information in an Attendance Monitoring
System (AMS) using the Android platform. The system
consisted of two apk files, one was for the teacher and
another was for the students. Just with the help of a click,
students would able to give their class attendance and just
with the help of a click, the teacher would generate a
report of all the students.
There are some studies which focus on the wireless
network. A study conducted by Sharma and Jain [11]
where they introduced a system where they used only a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4269
smartphone to identify a person's location with the help of
Global Positioning System (GPS), Wireless Fidelity (Wi-Fi)
and Network signals. In another study, Shermin st al. [12]
included a location-based time and attendance system
where employees used an android application. When an
employee has entered his workplace area, the system
connects to the office internet and sent the employee id
and local time to the server. Then the server stores the
information in the database. When the employee leaves
the system, a notification would be generated by the
system. In sum, most of the system introduced a different
kind of methods to eliminate the manual attendance
system so that the working time is optimized. But some of
them considered a hardware approach which will create a
queue in front of the device which will be another reason
for wasting the working time. Few others consider this
factor but again end up with a desktop application which
means the solution is not handy and available to everyone.
Others have implemented an android application which is
handy but again cannot able to track after giving
attendance employees still remain in their work place.
This study will dwindle this research gap to some extent
by introducing a system which will keep track of an
employee with time intervals.[13]
3. SYSTEM IMPLEMENTATION
3.1: Data Capturing:-
The authentication of fingerprint is usually not done
with extreme care when placed during the process of
registration and this result in rejection. Fingerprint is been
done in their respective android phone where their
fingerprint is been taken once they enter within the router
area it connects to the wireless network and fingerprint of
the individual is asked to consider once attendance. When
they are out of range of the router it automatically
disconnected from wireless and the employee logout.
3.2: Decision Making:-
The template stored in the database is compared with
the fingerprint image. If the fingerprint matches the
template then attendance of the user will be marked. If the
fingerprint is not the same then it will not be considered.
The system is created using java programming for the
front end and sqlYog database for storage on backend. It
involves the interaction with the server database
containing all information of the staff. The records provide
details of attendance.
3.3: Enrolment Phase:-
This phase involves registration of user. The process
of registration is important in order to identify each user
uniquely. All of the staff members are required to enter
certain personal information like staff fingerprint, names,
phone number, email address, sex, occupation, state of
origin, house address, as well as academic information like
staff id, department, and designation. The registered
information is then stored in database.
3.4: Identification Phase:-
The identification is accomplished by comparing the
input image with stored template in the database. If both
the fingerprints are matched, then it is considered as a
positive match.
3.5: Attendance Report:-
The report can be found under the report menu,
where daily attendance of all staff can be generated
according to employee id. The attendance of every staff
member is stored on the server database. Thus the system
allows the database admin to view the attendance report
based on daily basis and also employee’s monthly
attendance.
Fig -1: System Implementation
4. Design of Proposed Architecture
In this section, we will be discussing the system design.
There are two processes 1. Finding the importance of the
system, 2. Developing a conceptual design.
4.1 Finding the Importance:-
This system can take over the traditional attendance
system through fingerprint authentication. To find the
need of this system, we have collected notes from our
college institute and asked them questions regarding the
traditional Biometric attendance system as to how they
feel and what are the changes they wish to see. We noticed
a number of disadvantages and needs:
 The traditional fingerprint attendance system
consumes a lot of time to take attendance
accurately.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4270
 There is often a queue in the front of the gate
where the biometric hardware is installed.
 The hardware maintenance is cumbersome and
tedious. When there is some problem with these
sensors then the whole of the system collapses
and the organization needs to maintain
attendance in a manual format until the hardware
sensors are up and working.
 One common thing and the biggest disadvantage
that we noticed was that the employee leaves the
workplace once he/she has punched in their
attendance for the day. This is a huge loss for the
organization.
Our guide has also agreed for the need of efficient and
accurate attendance management system.
4.2 Developing the conceptual design:-
Here we state the conceptual design which is a block-
diagrammatic representation of the system proposed.
Figure-2 depicts the block diagram of proposed
architecture.
One of the major factors of our proposed system is User
authentication. To ensure authenticity of the user we use
their fingerprint. Bio-metric fingerprint helps in uniquely
representing and identifying a person. Fingerprint
authentication will ensure the physical presence of an
employee inside the working place. Initially, in the
beginning the employee will have to install the relevant
APK files on their android mobile phones which act as a
smart id card.
This step is followed by the registration of the employee
on the system with his fingerprint and his details like
name, employee id, designation, phone number etc. The
system does not allow duplicate entries to prevent
redundancy and duplication of data. Thereafter, that
employee's mobile phone is registered on this system
through the corresponding MAC address.
The android application will fetch the MAC address from
the device and send it to the server. There is a counter
used that gets initialized before the starting of the working
hours and it will continue to count till the working hours
end. To ensure the presence of that employee, he has to
give his fingerprint with the help of his android mobile
phone which is allowed after he is in the range of the
router. Once connected, the counter in the system will get
initialized and starts counting the time period for which
the device is connected to the router.
Fig -2: Block Diagram of the Proposed System
The organization is able to see the devices through the
admin login portal thereby implying the presence of those
respective employees. This system is a session-based log-
in system meaning that , if an employee is working for 8
hours in the organization, his mobile would log out of the
system randomly for say 3/4th times during the day which
pauses the counter. The system asks the employee to log-
in again within some limited amount of time, failing which,
the system would interpret the employee’s absence from
the institute. If he logs in back within the given time limit
by giving the fingerprint, the counter resumes. At the end
of the day, the system shows the total number of hours
that the corresponding device was connected to the
router.
The flow chart for the session based login is shown in
Figure-3.
At the end of the working time, the status column of each
employee will show the attendance of every employee.
The attendance will be sent to the server. This attendance
will be automatically updated into the profile of each
employee.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4271
Fig-3: The flowchart of session-based login
The flowchart of the system is given in Figure- 4.
Fig-4: The flowchart of the system
The summary of the process is shown in a table below:
Is the device
in WIFI
range?
Fingerprint
Authenticated?
Account Status
No No Logged Out
No Yes Logged Out
Yes No Logged Out
Yes Yes Logged In
5. Development of Proposed Architecture
5.1: User Interface:-
The layout of the user interface is done by extensive
markup language (XML). XML is mainly created to store
and transport data. XML is self-descriptive. XML is derived
from Standard Generalized Markup Language (SGML) and
a text based markup language. We used the android
platform to develop the whole development system in
Android Studio. We have also used Java for the
development purpose which is the official language of
Android development and is well supported by Android
Studio.
The figure-5 below depicts the UI design of our mobile
application:
Fig-5: The UI design of our mobile application.
5.2: Database:-
We have used MySQL database, MySQL is a database
system, used for developing web-based software
applications. MySQL is a relational database management
system (RDBMS). MySQL supports standard
SQL (Structured Query Language). After registration of the
employees into the system, their identity is followed by a
unique key in MySQL server and we considered that as
MAC ADDRESS. In the MySQL server, several rows have
been allocated for every employee’s where they have
features like name, employee ID, device's MAC ADDRESS,
Fingerprint sample etc.[14]
5.3: MAC Address Access:-
The MAC Addresses of the devices are kept in the
same. MySQL server where attendance procedure is
authorized depending upon whether it is matched of the
employee on the same server. Information about the
amount of time a device is connected to the router shows
the time he is in the company .Is retrieved from the
WNetWatcher software and sent to the server for further
process.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4272
5.4: Server:-
We have used JDBC to connect the MySQL database
server to the Android studio. Java server pages is a server
side technology that does all the processing at server.
5.5: Session Based Log In:-
Session-based log in is handled using random number
generator in Java which is kept random for the
development purpose of the system. [15]
5.6: Android Based Mobile Application:-
Android provides robust security at the OS level
through the Linux kernel. It is mandatory application
sandbox for all applications. It also provides secure
interprocess communication. Application framework is
used higher-level services to applications. The
development of the proposed app is done in such a way
that it files permission and access to the admin and system
permission at any type of situation about any security
issues.
Fig-5: Development of Proposed Architecture
6. Evaluation
It is assured that this system has the following benefits:
>>Accuracy: This system can accurately take the
attendance of the employees as it is fingerprint-based and
no one can give the proxy of others.
>>Time Consuming: This system reduces the time of
taking attendance as the employees only need to give the
fingerprint through the mobile phone.
>>Maximizing number of employees in the working place:
As the mobile phones of the employees need to be
connected to the router, it counts the time they remain
present in the working place. As a result, the employees
barely leave the working place.
Thus the system has advantages which make it
separate from the existing attendance taking method. The
difference between this method and the existing method
are given in Table II.
Table-II: Difference between the existing and the
proposed system.
Existing System Proposed System
1. Most of the existing
attendance taking
systems are only
fingerprint based.
1. This attendance
taking system consists
of fingerprint and
wireless network
(router).
2. The existing
fingerprint system is
usually placed in front of
the working place or at
the entrance of the
institution, so it can only
detect if an employee has
entered into the working
place but it cannot detect
whether an employee
tries to escape from the
working place or not.
2. This system has a
router which counts
the amount of time an
employee spends in the
workplace.
3. An employee can leave
the work place after
giving the attendance
through this system.
3. An employee has to
remain in the
workplace because the
system counts the
amount of time the
device is connected to
the router. So he
chooses not to leave
the place.
4. In existing systems, an
employee can let others
enter and leave using his
fingerprint.
4. In our proposed
system it is not
possible.
7. CONCLUSION
The proposed has been developed by observing the
existing system. This system automates the existing
system. It provides higher level security compared to that
of the existing system but also is cost efficient as the
mobile phone acts a smart card. Due to the phone acting as
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4273
the smart card employees going out company is reduced
which leads to
efficiency of the employees which leads to progress of the
organization.
REFERENCES
[1] Hamim Adal, Nawsheen Promy, Sanjana Srabanti,
Mahbubur Rahman, “Android Based Advanced Attendance
Vigilance System Using Wireless Network with Fusion of
Bio-metric Fingerprint Authentication” in International
Conference on Advanced Communications
Technology(ICACT), IEEE 2018, pp 217.
[2] Hamim Adal, Nawsheen Promy, Sanjana Srabanti,
Mahbubur Rahman, “Android Based Advanced Attendance
Vigilance System Using Wireless Network with Fusion of
Bio-metric Fingerprint Authentication” in International
Conference on Advanced Communications
Technology(ICACT), IEEE 2018, pp 217.
[3] T. Agarwal, Biometric Sensors Types and Its Working,
2014.[Online]Available:
https://www.elprocus.com/different-types-biometric-
sensors .
[4] Weizhi Meng, Duncan S. Wong, Steven Furnell, and
Jianying Zhou, “Surveying the Development of Biometric
User Authentication on Mobile Phones” in
10.1109/COMST.2014.2386915, IEEE Communications
Surveys & Tutorials.
[5] M. A. k. T. G. R. J.Chandramohan, R.Nagarajan,
Attendance monitoring system of students based on
biometric and gps tracking system," International Journal
of Advanced Engineering, Management and Science
(IJAEMS), vol. 3, no. 3, 2017.
[6] J. C. D. Cruz, A. C. Paglinawan, M. I. R. Bonifacio, A. J. D.
Flores, and E. V. B. Hurna, “Biometrics based attendance
checking using principal component analysis," in
Humanitarian Technology Conference (R10-HTC), 2015
IEEE Region 10. IEEE, 2015, pp
1-5.
[7] D. K. Sarker, N. I. Hossain, and I. A. Jamil, “Design and
implementation of smart attendance management system
using multiple step authentication," in Computational
Intelligence (IWCI), International Workshop on. IEEE,
2016, pp 91-95.
[8] A. T. Onaolamipo, “Development of a computerized
biometric control examination screening and attendance
monitoring system with fees management," Development,
vol. 4, no. 6, pp. 76-81, 2014.
[9] P. Wadhwa, “Attendance system using android
integrated bio-metric fingerprint recognition,"
International Research Journal of
Engineering and Technology (IRJET), vol. 4, no. 6, 2017.
[10] A. A. Kumbhar, K. S. Wanjara, D. H. Trivedi, A. U.
Khairatkar, and D. Sharma, “Automated attendance
monitoring system using android platform," International
Journal of Current Engineering and Technology, vol. 4, no.
2, pp. 1096-1099, 2014.
[11] V. J. A. Sharma, “Location based attendance tracking
using mobile devices," International Journal of Computer
Sciences and Engineering, vol. 5, no. 4, 2017.
[12] S. Sultana, A. Enayet, and I. J. Mouri, “A smart, location
based time and attendance tracking system using android
application" International Journal of Computer Science,
Engineering and Information Technology (IJCSEIT), vol. 5,
no. 1, pp. 1-5, 2015.
[13],[14],[15] Hamim Adal, Nawsheen Promy, Sanjana
Srabanti, Mahbubur Rahman, “Android Based Advanced
Attendance Vigilance System Using Wireless Network with
Fusion of Bio-metric Fingerprint Authentication” in
International Conference on Advanced Communications
Technology(ICACT), IEEE 2018, pp 217.
BIOGRAPHIES
Tejaswini E S was born in 1997.
She is currently a B. E. student in
the department of Computer
science and engineering, in Dr.
Ambedkar Institute of
Technology, Bangalore. She’ll be
receiving her B. E. degree in July
2019.
Zeba Afza was born in 1997. She
is currently a B. E. student in the
department of Computer science
and engineering, in Dr. Ambedkar
Institute of Technology,
Bangalore. She’ll be receiving her
B. E. degree in July 2019.

More Related Content

What's hot

Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in IndiaKshitij Behl
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User InputIRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMijsptm
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET Journal
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 
A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time andijcseit
 

What's hot (15)

Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 
A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time and
 

Similar to IRJET- Survey on Development of Fingerprint Biometric Attendance Management System using Wireless Connectivity

ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...IRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...IRJET Journal
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...ijcseit
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...ijcseit
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...ijcseit
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...ijcseit
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 

Similar to IRJET- Survey on Development of Fingerprint Biometric Attendance Management System using Wireless Connectivity (20)

ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APP...
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

IRJET- Survey on Development of Fingerprint Biometric Attendance Management System using Wireless Connectivity

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4267 Survey on Development of Fingerprint Biometric Attendance Management System using Wireless Connectivity Tejaswini E S1, Zeba Afza2, Prof. Pushpaveni H. P3 1Tejaswini E S, Dept. Of Computer Science Engineering, Dr.AIT college, Bangalore, Karnataka,India 2Zeba Afza, Dept. Of Computer Science Engineering, Dr.AIT college, Bangalore, Karnataka,India 3Professor Pushpaveni H.P, Dept. Of Computer Science Engineering, Dr.AIT college, Bangalore, Karnataka,India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In the modern era, various organizations, institutions and companies are keeping track of employees/staffs attendance using the biometric fingerprint authentication system. Attendance management is an important and herculean task. Along with this, the institutions with a single device tend to accumulate crowd and becomes a clumsy and chaotic task. In the biometric fingerprint authentication system, the system keeps track of employee attendance avoiding fake entries. But the question arises about the complete presence of the employee/staff during the working hours after he/she has punched in the attendance for the day. It has been usually noticed that the workers tend to escape their workplace after giving the attendance at the right time. In this paper, we focus on proposing a smart attendance management system which has the integration of both concepts- biometric fingerprint system and wireless connectivity for a particular restricted area. We mainly encompass the idea of using an android mobile phone device as a smart ID card for which we develop a mobile application in Java. The system will register the user and accept the attendance of the employee through the use of this smart ID card, with all the records being saved for subsequent operations in the backend using database. The system provides portability since the input image is accepted using a mobile device and reduces need for external fingerprint scanning device which also reduces the hardware cost and maintenance. Key Words: Smart ID card(android mobile phone), android application, fingerprint authentication, wireless LAN, smart attendance management system. 1. INTRODUCTION Biometric Identification acts as a unique ID proof for any individual. Recently Biometric Identification has become popular due to its uniqueness, consistency and specificity. Biometric authentication is the process of analyzing the data for the person's characteristics to that person's biometric template to determine resemblance. This technique cannot be duplicated and it is highly secured. The main goal of applying biometrics to user authentication is to provide security to users and detect imposters in terms of user’s physiological or behavioral characteristics. Approximately there exist about 14 types of biometric technologies which are DNA, Iris, Retina, face, fingerprint, finger geometry, hand geometry, odor, typing, vein , voice, and gait recognition. These are all techniques of identifying and authenticating individuals that would provide a more reliable and efficient way of verifying a person identification also preventing access to unauthorized personnel. Fingerprint based biometric authentication and verification systems have gained enormous demand in the market. As it is easy to operate install, alter and easy recovery of fingerprint. Achieving fingerprint recognition system as secure to use since the uniqueness of a fingerprint does not change in a lifetime. Different organizations use Biometric fingerprint authentication to identify their employees. It diminishes the proxy giving attitude of the employees. To identify the employee, the fingerprint sensors are generally set up in front of the entrance or exit door. Sometimes, some employee misuses the advantage of this fingerprint sensor. An employee uses his own fingerprint to open the door for someone else to leave. So, the fingerprint sensor can't ensure the presence of an employee in the workplace. [1]. To avoid the misuse of the hardware we can come up with an easy going, cost efficient approach. There is a cumulative progress of android technology and its availability over a decade. Android application has made life easier and convenient. Here android technology plays an important role. In recent years, mobile phones have become one of the popular gadgets. So, we have developed a fusion of wireless network and fingerprint authentication system as a mobile application. Only a mobile application cannot ensure the presence of an employee in an organization. To ensure their physical presence not only a mobile application is required but the organization should be linked with a router. Here the android phone acts as a smart card to all the employees of an organization.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4268 An employee can be able to give his attendance only if he is connected to that specific router. This ensures the physical presence of an employee. A counter will be there in the system which will calculate the time of being present in the workplace as long as someone is connected to the router. When an employee leaves, the device will get disconnected and as soon as it comes into the range of the router it will be reconnected again and resume the counting process where it was left. The whole system is a fusion of fingerprint authentication system and wireless router where the attendance will be started counting only after an employee is in the router range and gets logged in through fingerprint authentication at the same time. This is a session based log-in system which will randomly get signed out at any time of the working hour and needs the employee to get logged in again through fingerprint authentication within a given time to resume the attendance process. The log in process is session based so that an employee cannot leave the place without the device. [2] Our proposed system can set aside the traditional attendance system as it has many advantages such as high accuracy; optimize time complexity and router system. Some characteristics of the proposal system are: 1) Dependency on biometric hardware is reduced. 2) Due to reduced dependency, cost of the system as whole is reduced. 3) Provides increased portability to system. 2. LITERATURE SURVEY In the present hi-tech world, there is an ever growing need to authenticate and identify people for security purposes. A wide variety of modern systems requires consistent personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The objective is to ensure that the rendered services are accessed only by a legitimate user and no one else, to discourage fraud and enhance security and to specifically identify individuals in corporate areas. Person identification methods are generally classified into three categories namely, a) Knowledge-based approach: Person who knows something to make his/her personal identity such as password or personal identification number (PIN). b) Token based approach: It uses particular ID, such as a passport, keys, ID card. c) Biometric based approach: This approach uses physiological or behavioral features of an individual which cannot be stolen or lost. The biometric identification method consists of three operations, they firstly capture biometric sample of the person and make a digital representation of the sample, then extract unique features from the digital representation using feature extractor, and then compare the extracted feature set against the template set in the database via matcher.[3] The manual attendance tracking system for any system is a very tedious and cumbersome process. It consumes a lot of time. Our advanced attendance system will help to get rid of this problem. In this section we have briefly discussed those works which are related to automating the attendance system. Some studies have been found that especially focused on the attendance system using biometric fingerprint authentication. J.Chandramohan et al. [5] discussed the system which was basically a micro-controller based prototype which used fingerprint sensor and in order to track individual missing person's location it used GSM technology. They only dealt with biometric authentication using micro-controller which is a hardware concept.A study conducted by Jennifer C et al. [6] introduced an advance attendance system. It was basically an Arduino based system which combined with MATLAB. They developed a fingerprint identification system using Adafruit Fingerprint algorithm with the help of Arduino. To detect and recognize the face, they used Viola-Jones Face Detection Method and Principal Component Analysis (PCA) with the help of MATLAB. Sarkar et al. [7] designed and implemented smart Attendance system using multiple steps. They focused on to overcome the inconveniences due to manual attendance system by using radio frequency identification, biometric fingerprint sensor, and password based technologies. They developed a C based desktop application to monitor the attendance system which gives a better solution because they developed a software application. Adeoye Temitope Onaolamipo [8] adopted a biometric access control techniques. A system was designed with an extended graphical user interface by using Microsoft visual studio 2010 and merged with Microsoft fingerprint reader. In the users computer or server, the student information was stored on the server with the help of MySQL. Parul Wadhwa [9] focused on an android application. She developed a system where a student could give their attendance with the help of a fingerprint sensor and later on the data would be stored in a centralized database. An Android application would use this database and from that application, students would be able to view their attendance. Another study has been conducted where Akshay A. Kumbhar et al. [10] focused on storing the attendance information in an Attendance Monitoring System (AMS) using the Android platform. The system consisted of two apk files, one was for the teacher and another was for the students. Just with the help of a click, students would able to give their class attendance and just with the help of a click, the teacher would generate a report of all the students. There are some studies which focus on the wireless network. A study conducted by Sharma and Jain [11] where they introduced a system where they used only a
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4269 smartphone to identify a person's location with the help of Global Positioning System (GPS), Wireless Fidelity (Wi-Fi) and Network signals. In another study, Shermin st al. [12] included a location-based time and attendance system where employees used an android application. When an employee has entered his workplace area, the system connects to the office internet and sent the employee id and local time to the server. Then the server stores the information in the database. When the employee leaves the system, a notification would be generated by the system. In sum, most of the system introduced a different kind of methods to eliminate the manual attendance system so that the working time is optimized. But some of them considered a hardware approach which will create a queue in front of the device which will be another reason for wasting the working time. Few others consider this factor but again end up with a desktop application which means the solution is not handy and available to everyone. Others have implemented an android application which is handy but again cannot able to track after giving attendance employees still remain in their work place. This study will dwindle this research gap to some extent by introducing a system which will keep track of an employee with time intervals.[13] 3. SYSTEM IMPLEMENTATION 3.1: Data Capturing:- The authentication of fingerprint is usually not done with extreme care when placed during the process of registration and this result in rejection. Fingerprint is been done in their respective android phone where their fingerprint is been taken once they enter within the router area it connects to the wireless network and fingerprint of the individual is asked to consider once attendance. When they are out of range of the router it automatically disconnected from wireless and the employee logout. 3.2: Decision Making:- The template stored in the database is compared with the fingerprint image. If the fingerprint matches the template then attendance of the user will be marked. If the fingerprint is not the same then it will not be considered. The system is created using java programming for the front end and sqlYog database for storage on backend. It involves the interaction with the server database containing all information of the staff. The records provide details of attendance. 3.3: Enrolment Phase:- This phase involves registration of user. The process of registration is important in order to identify each user uniquely. All of the staff members are required to enter certain personal information like staff fingerprint, names, phone number, email address, sex, occupation, state of origin, house address, as well as academic information like staff id, department, and designation. The registered information is then stored in database. 3.4: Identification Phase:- The identification is accomplished by comparing the input image with stored template in the database. If both the fingerprints are matched, then it is considered as a positive match. 3.5: Attendance Report:- The report can be found under the report menu, where daily attendance of all staff can be generated according to employee id. The attendance of every staff member is stored on the server database. Thus the system allows the database admin to view the attendance report based on daily basis and also employee’s monthly attendance. Fig -1: System Implementation 4. Design of Proposed Architecture In this section, we will be discussing the system design. There are two processes 1. Finding the importance of the system, 2. Developing a conceptual design. 4.1 Finding the Importance:- This system can take over the traditional attendance system through fingerprint authentication. To find the need of this system, we have collected notes from our college institute and asked them questions regarding the traditional Biometric attendance system as to how they feel and what are the changes they wish to see. We noticed a number of disadvantages and needs:  The traditional fingerprint attendance system consumes a lot of time to take attendance accurately.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4270  There is often a queue in the front of the gate where the biometric hardware is installed.  The hardware maintenance is cumbersome and tedious. When there is some problem with these sensors then the whole of the system collapses and the organization needs to maintain attendance in a manual format until the hardware sensors are up and working.  One common thing and the biggest disadvantage that we noticed was that the employee leaves the workplace once he/she has punched in their attendance for the day. This is a huge loss for the organization. Our guide has also agreed for the need of efficient and accurate attendance management system. 4.2 Developing the conceptual design:- Here we state the conceptual design which is a block- diagrammatic representation of the system proposed. Figure-2 depicts the block diagram of proposed architecture. One of the major factors of our proposed system is User authentication. To ensure authenticity of the user we use their fingerprint. Bio-metric fingerprint helps in uniquely representing and identifying a person. Fingerprint authentication will ensure the physical presence of an employee inside the working place. Initially, in the beginning the employee will have to install the relevant APK files on their android mobile phones which act as a smart id card. This step is followed by the registration of the employee on the system with his fingerprint and his details like name, employee id, designation, phone number etc. The system does not allow duplicate entries to prevent redundancy and duplication of data. Thereafter, that employee's mobile phone is registered on this system through the corresponding MAC address. The android application will fetch the MAC address from the device and send it to the server. There is a counter used that gets initialized before the starting of the working hours and it will continue to count till the working hours end. To ensure the presence of that employee, he has to give his fingerprint with the help of his android mobile phone which is allowed after he is in the range of the router. Once connected, the counter in the system will get initialized and starts counting the time period for which the device is connected to the router. Fig -2: Block Diagram of the Proposed System The organization is able to see the devices through the admin login portal thereby implying the presence of those respective employees. This system is a session-based log- in system meaning that , if an employee is working for 8 hours in the organization, his mobile would log out of the system randomly for say 3/4th times during the day which pauses the counter. The system asks the employee to log- in again within some limited amount of time, failing which, the system would interpret the employee’s absence from the institute. If he logs in back within the given time limit by giving the fingerprint, the counter resumes. At the end of the day, the system shows the total number of hours that the corresponding device was connected to the router. The flow chart for the session based login is shown in Figure-3. At the end of the working time, the status column of each employee will show the attendance of every employee. The attendance will be sent to the server. This attendance will be automatically updated into the profile of each employee.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4271 Fig-3: The flowchart of session-based login The flowchart of the system is given in Figure- 4. Fig-4: The flowchart of the system The summary of the process is shown in a table below: Is the device in WIFI range? Fingerprint Authenticated? Account Status No No Logged Out No Yes Logged Out Yes No Logged Out Yes Yes Logged In 5. Development of Proposed Architecture 5.1: User Interface:- The layout of the user interface is done by extensive markup language (XML). XML is mainly created to store and transport data. XML is self-descriptive. XML is derived from Standard Generalized Markup Language (SGML) and a text based markup language. We used the android platform to develop the whole development system in Android Studio. We have also used Java for the development purpose which is the official language of Android development and is well supported by Android Studio. The figure-5 below depicts the UI design of our mobile application: Fig-5: The UI design of our mobile application. 5.2: Database:- We have used MySQL database, MySQL is a database system, used for developing web-based software applications. MySQL is a relational database management system (RDBMS). MySQL supports standard SQL (Structured Query Language). After registration of the employees into the system, their identity is followed by a unique key in MySQL server and we considered that as MAC ADDRESS. In the MySQL server, several rows have been allocated for every employee’s where they have features like name, employee ID, device's MAC ADDRESS, Fingerprint sample etc.[14] 5.3: MAC Address Access:- The MAC Addresses of the devices are kept in the same. MySQL server where attendance procedure is authorized depending upon whether it is matched of the employee on the same server. Information about the amount of time a device is connected to the router shows the time he is in the company .Is retrieved from the WNetWatcher software and sent to the server for further process.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4272 5.4: Server:- We have used JDBC to connect the MySQL database server to the Android studio. Java server pages is a server side technology that does all the processing at server. 5.5: Session Based Log In:- Session-based log in is handled using random number generator in Java which is kept random for the development purpose of the system. [15] 5.6: Android Based Mobile Application:- Android provides robust security at the OS level through the Linux kernel. It is mandatory application sandbox for all applications. It also provides secure interprocess communication. Application framework is used higher-level services to applications. The development of the proposed app is done in such a way that it files permission and access to the admin and system permission at any type of situation about any security issues. Fig-5: Development of Proposed Architecture 6. Evaluation It is assured that this system has the following benefits: >>Accuracy: This system can accurately take the attendance of the employees as it is fingerprint-based and no one can give the proxy of others. >>Time Consuming: This system reduces the time of taking attendance as the employees only need to give the fingerprint through the mobile phone. >>Maximizing number of employees in the working place: As the mobile phones of the employees need to be connected to the router, it counts the time they remain present in the working place. As a result, the employees barely leave the working place. Thus the system has advantages which make it separate from the existing attendance taking method. The difference between this method and the existing method are given in Table II. Table-II: Difference between the existing and the proposed system. Existing System Proposed System 1. Most of the existing attendance taking systems are only fingerprint based. 1. This attendance taking system consists of fingerprint and wireless network (router). 2. The existing fingerprint system is usually placed in front of the working place or at the entrance of the institution, so it can only detect if an employee has entered into the working place but it cannot detect whether an employee tries to escape from the working place or not. 2. This system has a router which counts the amount of time an employee spends in the workplace. 3. An employee can leave the work place after giving the attendance through this system. 3. An employee has to remain in the workplace because the system counts the amount of time the device is connected to the router. So he chooses not to leave the place. 4. In existing systems, an employee can let others enter and leave using his fingerprint. 4. In our proposed system it is not possible. 7. CONCLUSION The proposed has been developed by observing the existing system. This system automates the existing system. It provides higher level security compared to that of the existing system but also is cost efficient as the mobile phone acts a smart card. Due to the phone acting as
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4273 the smart card employees going out company is reduced which leads to efficiency of the employees which leads to progress of the organization. REFERENCES [1] Hamim Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman, “Android Based Advanced Attendance Vigilance System Using Wireless Network with Fusion of Bio-metric Fingerprint Authentication” in International Conference on Advanced Communications Technology(ICACT), IEEE 2018, pp 217. [2] Hamim Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman, “Android Based Advanced Attendance Vigilance System Using Wireless Network with Fusion of Bio-metric Fingerprint Authentication” in International Conference on Advanced Communications Technology(ICACT), IEEE 2018, pp 217. [3] T. Agarwal, Biometric Sensors Types and Its Working, 2014.[Online]Available: https://www.elprocus.com/different-types-biometric- sensors . [4] Weizhi Meng, Duncan S. Wong, Steven Furnell, and Jianying Zhou, “Surveying the Development of Biometric User Authentication on Mobile Phones” in 10.1109/COMST.2014.2386915, IEEE Communications Surveys & Tutorials. [5] M. A. k. T. G. R. J.Chandramohan, R.Nagarajan, Attendance monitoring system of students based on biometric and gps tracking system," International Journal of Advanced Engineering, Management and Science (IJAEMS), vol. 3, no. 3, 2017. [6] J. C. D. Cruz, A. C. Paglinawan, M. I. R. Bonifacio, A. J. D. Flores, and E. V. B. Hurna, “Biometrics based attendance checking using principal component analysis," in Humanitarian Technology Conference (R10-HTC), 2015 IEEE Region 10. IEEE, 2015, pp 1-5. [7] D. K. Sarker, N. I. Hossain, and I. A. Jamil, “Design and implementation of smart attendance management system using multiple step authentication," in Computational Intelligence (IWCI), International Workshop on. IEEE, 2016, pp 91-95. [8] A. T. Onaolamipo, “Development of a computerized biometric control examination screening and attendance monitoring system with fees management," Development, vol. 4, no. 6, pp. 76-81, 2014. [9] P. Wadhwa, “Attendance system using android integrated bio-metric fingerprint recognition," International Research Journal of Engineering and Technology (IRJET), vol. 4, no. 6, 2017. [10] A. A. Kumbhar, K. S. Wanjara, D. H. Trivedi, A. U. Khairatkar, and D. Sharma, “Automated attendance monitoring system using android platform," International Journal of Current Engineering and Technology, vol. 4, no. 2, pp. 1096-1099, 2014. [11] V. J. A. Sharma, “Location based attendance tracking using mobile devices," International Journal of Computer Sciences and Engineering, vol. 5, no. 4, 2017. [12] S. Sultana, A. Enayet, and I. J. Mouri, “A smart, location based time and attendance tracking system using android application" International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), vol. 5, no. 1, pp. 1-5, 2015. [13],[14],[15] Hamim Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman, “Android Based Advanced Attendance Vigilance System Using Wireless Network with Fusion of Bio-metric Fingerprint Authentication” in International Conference on Advanced Communications Technology(ICACT), IEEE 2018, pp 217. BIOGRAPHIES Tejaswini E S was born in 1997. She is currently a B. E. student in the department of Computer science and engineering, in Dr. Ambedkar Institute of Technology, Bangalore. She’ll be receiving her B. E. degree in July 2019. Zeba Afza was born in 1997. She is currently a B. E. student in the department of Computer science and engineering, in Dr. Ambedkar Institute of Technology, Bangalore. She’ll be receiving her B. E. degree in July 2019.