SlideShare a Scribd company logo
1 of 24
G.L.BAJAJ INSTITUTE OF TECHNOLOGY AND
MANAGEMENT
DEPARTMENT OF
MASTER OF COMPUTER APPLICATION
Submitted by :-
MANISHA
ABSTRACT
⮚ Our project aims at designing an employee attendance system which could
effectively manage attendance of employees at different organizations.
⮚ Fingerprints are considered to be the best and fastest method for biometric
identification.
⮚ Mainly due to the low-cost of devices for deployment and high user
acceptance.
⮚ This project set out to overcome the drawbacks of the current attendance
system.
⮚ We have developed an identification system which is faster in
implementation than any other available today in the market.
⮚ Although we are using this fingerprint identification system for employee
identification purpose in our project, the matching results are so good that it
could perform very well on large databases.
INTRODUCTION
• Many organizations are trying to identify accurate, safe, and reliable
techniques to protect access rights to their existing services or
operation.
• Fingerprint is one answer to these concerns.
• Fingerprint offers a secure method of access to sensitive services
and obviates the need to carry a token, card or to remember several
passwords.
• Identification or authentication through FR has three main
advantages:
• Low cost of deployment (cost effective).
• Simple to implement and remotable.
• User must be physically available at the point of identification
or verification.
OBJECTIVES
• To make a dataset
• To investigate and understand current fingerprint identification
methods
• To generate in and out time
• To track attendance of employees
FRAMEWORK
Hardware - Software Level Design
Proposed hardware consists following parts:
❖ Fingerprint Scanner
❖ Mobile phone
❖ Internet connection
Proposed software consists following parts:
❖ Android studio
❖ Java
❖ Firebase
ATTENDANCE MANAGEMENT APPROACH
• All the hardware will be inside organizations building. So outside
interference will be absent.
• To remove unauthorized access and unwanted attempt to corrupt
the hardware by anyone, all the hardware except fingerprint
scanner could be put inside a small cabin. As an alternate
solution, we can install CCTV cameras to prevent unprivileged
activities.
• When employee enters the organization, the attendance marking
will start. Computer software will start the process after input
fingerprint of an employee. It will store the time as In-time on the
software.
E-R_DIAGRAM
DATA FLOW DIAGRAMS (DFD)
LEVEL 0 DIAGRAM
LEVEL 1 DFD DIAGRAM
LEVEL 2 DFD DIAGRAM
FLOW DIAGRAM
DEVELOP USER INTERFACE
NEW REGISTRATION
HI
MARKING
ATTENDANCE
LIST OF REGISTER
EMPLOYED
EMPLOYEE DETAIL
IMPLEMENTATION
• Opening Application
• Main Display
• Connect finger print scanner
• Registering
• Identification
OUTCOMES OF THE PROJECT
• A Scientific approach was developed during project work.
• Skills and self-confidence in coding and working with software's
like Android studio were developed.
• An applicable attendance management system was designed for
educational organizations. Ideas were presented for making
whole system online using portable device and 3G mobile
technology.
• An improved and faster fingerprint identification system was
developed for student identification purpose.
FUTURE EXPECTATION
• A website will be hosted on the server for online access to
attendance reports. For this purpose, html, JSP or ASP dot net
would be used.
• Fingerprint identification system will be improved further for working
in a specific region or premises.
• Fingerprint identification system will be improved further using more
indexing techniques like ridge density tolerance etc.
FPTS

More Related Content

What's hot

Employee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogEmployee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refog
RefogCom
 

What's hot (14)

Employee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refogEmployee monitoring-solutions-from-refog
Employee monitoring-solutions-from-refog
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Incident Management Software from Safetymint
Incident Management Software from SafetymintIncident Management Software from Safetymint
Incident Management Software from Safetymint
 
Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial...
Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial...Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial...
Were we Just Hacked? Applying Digital Forensic Techniques for your Industrial...
 
Selecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorSelecting and Working with a Systems Integrator
Selecting and Working with a Systems Integrator
 
Infinit security card-mark capwell
Infinit security card-mark capwellInfinit security card-mark capwell
Infinit security card-mark capwell
 
Innovatiview - Auxiliary Examination Services
Innovatiview - Auxiliary Examination ServicesInnovatiview - Auxiliary Examination Services
Innovatiview - Auxiliary Examination Services
 
Visitor induction & gatepass system
Visitor induction & gatepass systemVisitor induction & gatepass system
Visitor induction & gatepass system
 
A Brief Insight into Penetration Testing
A Brief Insight into Penetration TestingA Brief Insight into Penetration Testing
A Brief Insight into Penetration Testing
 
Testing Tools and Tips
Testing Tools and TipsTesting Tools and Tips
Testing Tools and Tips
 
Resume
ResumeResume
Resume
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Safety Inspection Software
Safety Inspection SoftwareSafety Inspection Software
Safety Inspection Software
 
Ptw Mobile App
Ptw Mobile AppPtw Mobile App
Ptw Mobile App
 

Similar to FPTS

Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
منیزہ ہاشمی
 

Similar to FPTS (20)

ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
RECRUITMENT MANAGEMENT SYSTEM USING SALESFORCE.COM
RECRUITMENT MANAGEMENT SYSTEM USING SALESFORCE.COMRECRUITMENT MANAGEMENT SYSTEM USING SALESFORCE.COM
RECRUITMENT MANAGEMENT SYSTEM USING SALESFORCE.COM
 
Top 5 DevOps Monitoring Tools
Top 5 DevOps Monitoring ToolsTop 5 DevOps Monitoring Tools
Top 5 DevOps Monitoring Tools
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Ias sl atrack-guard tour monitoring ver1
Ias sl atrack-guard tour monitoring ver1Ias sl atrack-guard tour monitoring ver1
Ias sl atrack-guard tour monitoring ver1
 
Ias sl atrack-guard tour monitoring ver1
Ias sl atrack-guard tour monitoring ver1Ias sl atrack-guard tour monitoring ver1
Ias sl atrack-guard tour monitoring ver1
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Online Building Plan
Online Building PlanOnline Building Plan
Online Building Plan
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Human Resource Management using Phone Gap
Human Resource Management using Phone GapHuman Resource Management using Phone Gap
Human Resource Management using Phone Gap
 
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
Software Quality Management in Wipro and case tools ,Wipro Introduction and c...
 
Codafication – Insurtech Innovation Award 2024
Codafication – Insurtech Innovation Award 2024Codafication – Insurtech Innovation Award 2024
Codafication – Insurtech Innovation Award 2024
 
Fingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management SystemFingerprint Alert System A Solution for Effective Management System
Fingerprint Alert System A Solution for Effective Management System
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

FPTS

  • 1.
  • 2. G.L.BAJAJ INSTITUTE OF TECHNOLOGY AND MANAGEMENT DEPARTMENT OF MASTER OF COMPUTER APPLICATION Submitted by :- MANISHA
  • 3. ABSTRACT ⮚ Our project aims at designing an employee attendance system which could effectively manage attendance of employees at different organizations. ⮚ Fingerprints are considered to be the best and fastest method for biometric identification. ⮚ Mainly due to the low-cost of devices for deployment and high user acceptance. ⮚ This project set out to overcome the drawbacks of the current attendance system. ⮚ We have developed an identification system which is faster in implementation than any other available today in the market. ⮚ Although we are using this fingerprint identification system for employee identification purpose in our project, the matching results are so good that it could perform very well on large databases.
  • 4. INTRODUCTION • Many organizations are trying to identify accurate, safe, and reliable techniques to protect access rights to their existing services or operation. • Fingerprint is one answer to these concerns. • Fingerprint offers a secure method of access to sensitive services and obviates the need to carry a token, card or to remember several passwords. • Identification or authentication through FR has three main advantages: • Low cost of deployment (cost effective). • Simple to implement and remotable. • User must be physically available at the point of identification or verification.
  • 5. OBJECTIVES • To make a dataset • To investigate and understand current fingerprint identification methods • To generate in and out time • To track attendance of employees
  • 6. FRAMEWORK Hardware - Software Level Design Proposed hardware consists following parts: ❖ Fingerprint Scanner ❖ Mobile phone ❖ Internet connection Proposed software consists following parts: ❖ Android studio ❖ Java ❖ Firebase
  • 7. ATTENDANCE MANAGEMENT APPROACH • All the hardware will be inside organizations building. So outside interference will be absent. • To remove unauthorized access and unwanted attempt to corrupt the hardware by anyone, all the hardware except fingerprint scanner could be put inside a small cabin. As an alternate solution, we can install CCTV cameras to prevent unprivileged activities. • When employee enters the organization, the attendance marking will start. Computer software will start the process after input fingerprint of an employee. It will store the time as In-time on the software.
  • 9. DATA FLOW DIAGRAMS (DFD) LEVEL 0 DIAGRAM
  • 10. LEVEL 1 DFD DIAGRAM
  • 11. LEVEL 2 DFD DIAGRAM
  • 14.
  • 16.
  • 17. HI
  • 21. IMPLEMENTATION • Opening Application • Main Display • Connect finger print scanner • Registering • Identification
  • 22. OUTCOMES OF THE PROJECT • A Scientific approach was developed during project work. • Skills and self-confidence in coding and working with software's like Android studio were developed. • An applicable attendance management system was designed for educational organizations. Ideas were presented for making whole system online using portable device and 3G mobile technology. • An improved and faster fingerprint identification system was developed for student identification purpose.
  • 23. FUTURE EXPECTATION • A website will be hosted on the server for online access to attendance reports. For this purpose, html, JSP or ASP dot net would be used. • Fingerprint identification system will be improved further for working in a specific region or premises. • Fingerprint identification system will be improved further using more indexing techniques like ridge density tolerance etc.