Sams
Sams
net/publication/361607151
CITATIONS READS
8 13,645
8 authors, including:
Gomathi Krishna
Imam Abdulrahman Bin Faisal University
19 PUBLICATIONS 335 CITATIONS
SEE PROFILE
All content following this page was uploaded by Atta Rahman on 29 June 2022.
1
Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam
Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
2
Department of Computer Information System (CIS), College of Computer Science and Information Technology (CCSIT),
Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
personal identification. The popularity of fingerprint cryptographic keys, have a significant level of
verification can be attributed to fingerprints' unpredictability. There is a lot of variances between
uniqueness, stability, permanence, and ease of use [4]. biometric samples obtained at various times from the
This system proposes a new automatic attendance same individual. As a result, the match is always made
management system that incorporates fingerprint on a probabilistic basis. This contrasts with password
authentication into the attendance management and token-based methods, which need a precise match.
process for both employees and students. Enrolment False Acceptance Rate (FAR) and False Rejection
and authentication are the two procedures that make Rate (FRR) are two types of mistakes caused by
up this system. The user's biometrics are collected inexact matching [6].
during enrolment, and the minutiae data is extracted False Acceptance: An imposter may be mistaken
and saved in a database as a template for the topic, for a real user if his template is close enough to the
along with the user's ID. After feature extraction, the actual user's intra-user variation.
enrollment module's goal is to accept a user into a False Reject: Even a valid user may be denied during
database using his or her ID and fingerprints. These authentication if the biometric signal obtained is of
characteristics create a template for determining the poor quality. A 'false reject' is the term for this type of
user's identification and formulating the mistake. If you don't match against your own template,
authentication procedure. An administrator of the you've been rejected incorrectly.
attendance management system handles the
enrollment process. During authentication, the user's B) Barcode-based Attendance Management System
biometrics are collected once more, and the extracted
characteristics are compared to those previously Every employee must be given a badge/card with
stored in the database to see if they match. Following a barcode as part of the barcode attendance system.
a successful match, attendance is recorded using the The badge/card is exchanged on the time clock to
user's id that was used to match the templates. The check into or out of the firm, and the data is recorded
project used a fingerprint reader as an input to capture by the clock. Data is encoded in the magnetic stripe of
pictures and built a program with a fingerprint the employee card in the magnetic stripe attendance
recognition and identification system as well as a system. The information on the card's magnetic stripe
database to store user data. The fingerprint templates is captured by the time clock when the card is swiped
and other biodata of the users, as well as the through the employee time clock [7]. This method
attendance records kept by the users, are stored in the scans one card at a time and requires that the reader be
database. The attendance management system's design in touch with it. RFID is a technology that uses radio
is depicted in Figure 1. waves to send data from an electronic tag, also known
as an RFID tag or label, affixed to an object to a reader
for the purpose of identifying and tracking the thing.
Employee ID cards have an RFID tag inserted in them,
which is read by a reader. This RFID technology uses
a computer to connect to a database. When an
employee enters or departs, an RFID card is used, and
the data is recorded by the reader [8]. The RFID-based
attendance management system architecture is
depicted in Figure 2. Although the benefits of RFID
for tracking and controlling daily things are obvious,
wireless RFID sensors (both digital and analog) have
yet to become widely used in the home and personal
electronics sector. RFID sensing is now being held
Fig. 1. Architecture of the fingerprint-based attendance back by several major roadblocks. Collisions between
management system [5].
sensor responses, An RFID sensing application
consists of at least one reader and multiple RFID
In a realistic situation, one would like to evaluate
sensors, each of which has at least one sensor. When
the accuracy and speed of a fingerprint matcher.
interrogating these tags, the tag collision problem
Biometric templates, unlike passwords and
764 IJCSNS International Journal of Computer Science and Network Security, VOL.22 No.6, June 2022
becomes the major emphasis. Because they share the not connected to the internet. The drawback is that the
same communication channel, their replies must be QR Codes generated are only for that single event. As
arbitrated to avoid collisions caused by simultaneous a result, students in a university context will be
responses. This issue is one of the leading causes of required to preserve and maintain upwards of 10 codes
energy waste, longer identification times, and lower every year for all their courses [14].
read rates [10].
Hackers have devised creative methods of getting database for all students. The system will request
illegal access to personal data held on phones, and the student login with the id. At the time of taking
battle to protect that data is never-ending. attendance, the location of the student is determined,
will be checked If the student is inside the class
building, the system will record the student as present
in the class, and if it is not there, the student is
considered absent. Furthermore, the id and location
will be encrypted and sent to the server. The system
workflow is depicted in Figure 6. But it is not very
effective because, like the current days, some lecture
is performed online, and it is not possible to track
location when outside the class building because the
location of the student may be diverse as it is possible
for the student to complete the lecture outside the
home, such as the cafe or the library.
fingerprint (using their smartphones) and together the identity of the student by checking the fingerprint
with the date/time stamp and location ID of the or Real-time face verification, as it is one of the
classroom. Consequently, the app running on the recently used technologies based on deep learning by
students’ smartphone will upload the information to CNN model as it is used before in visual analyzing the
the server unit to confirm attendance. Smartphones image to find the pattern, by training the model to
may communicate with the server either through local detect the face and then preprocessing the image to
intranet coverage provided by the universities or extract features and the output will be number stored
through the internet. System will only assist in terms in an array. Real-time face verification is achieved
of smart attendance, but also help in calculating the with MobileFaceNets. in addition to checking the
aggregate attendance during or at the end of semester. location of the student to prove that the student is in
It will help the instructor in calculation the defaulters the classroom. all the techniques used will provide
(DN) students list, who would not be able to appear in high accuracy and security in attendance management
the exam due to short attendance policy of the rather than manually processing. The SAMS intends
university. to be a mechanism for documenting student
attendance using smartphones, which will save a lot of
A) Goal paperwork from the existing, manual attendance
system. The SAMS is a standalone mobile application
The main goal of SAMS is enabling university or that will be beneficial for instructors and students at
college students to use smart attendance. Its ability to universities to keep track of attendance using location,
individually identify each student based on their face ID, and/or fingerprints. This is the system's most
fingerprint or face ID and class location makes important feature. The system should generate a report
providing security access easier, faster, and more on attendance. There should primarily be interfaces
secure than in the past. that are linked to a single database. Figure 7 Show the
overall architecture of the system. In general, the
B) Scope/Limitation instructor is responsible to manage the attendance. As
for the student can check the attendance performance.
The suggested SAMS was created with
universities in mind. There was a range for students as
well as a range for instructors. The project's design and
platform are an iOS-based system and android-based
system that keeps track of students' attendance. In
addition, the system assists the instructor in
calculating the DN students list.
The proposed attendance system SAMS should
be able to enroll the student in the courses Fig. 7. Overall architecture of the system
automatically. But that shall be excluded from the
project due to restrictions, we postpone this feature
because it requires to connect with "PeopleSoft"
system to get access the information of students and
will be the instructor enrolled her students through
importing CSV file of enrolled students.
SAMS require the students must have a smartphone
device during the class having inbuilt camera and/or
fingerprint sensor. Failing to which, students won’t be
able to get the access.
Fig. 8. General view of the system
4. Proposed System Architecture The DFD context depicts the intended SAMS
implementation's capabilities and limits. The context
Building a mobile application to manage the DFD depicts the system's limits as well as its
attendance based on the biometrics in order to prove interactions with its surroundings. The DFD context is
IJCSNS International Journal of Computer Science and Network Security, VOL.22 No.6, June 2022 767