SlideShare a Scribd company logo
1 of 5
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 514
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 1 | Issue – 5
International Journal of Trend in Scientific
Research and Development (IJTSRD)
UGC Approved International Open Access Journal
Smart Attendance System using Raspberry Pi
Pradeep Kumar M S
Asst. Professor, Dept. of TCE, DBIT College,
Bangalore, Karnataka, India
Dr. K. Suresh
Principal, SDMIT college, Ujire, Karnataka, India
Indumati T
Asst. Professor, Dept. of CSE, EWIT College,
Bangalore, India
Kishor kumar
Asst. Professor, Dept. of TCE, DBIT College,
Bangalore, Karnataka, India
ABSTRACT
Biometric authentication is one of the most popular
and accurate technology. Now days, it is used in many
real time applications. However, recognizing finger
prints in Linux based embedded computers (raspberry
pi) is still a very complex problem. This entire work is
done on the Linux based embedded computer called
raspberry pi, in which database creation, fingerprint
reader access, authentication and recognition using
python were entirely done on raspberry pi This paper
discusses on the standardized authentication model
which is capable of extracting the finger prints of
individual and store that in database . Then the use of
final finger print to match with others in finger prints
present in the database to show the capability of this
model and also updating the database obtained to the
organisation by creating an application through cloud.
Keywords: finger print authentication, python,
raspberry pi
1. INTRODUCTION
The human body has the privilege of having features
that are unique and exclusive to each individual. This
exclusivity and unique characteristic has led to the
field of biometrics and its application in ensuring
security in various fields with various embedded
controllers and embedded computers. Biometrics has
gained popularity and has proved itself to be a reliable
mode of ensuring privacy, maintaining security and
identifying individuals. It has wide acceptance
throughout the globe and now is being used at places
like airports, hospitals, schools, colleges, corporate
offices etc.
Biometrics is the study of identifying a person by
their physical traits that are inherent and unique to
only the person concerned. Biometric identification
include fingerprint verification, palm geometry, face
recognition, iris recognition, etc. The above
mentioned techniques work with different levels of
functionality and accuracy.
Accuracy and reliability are the two most important
parameters when it comes to biometric applications
and that too with advanced embedded computers.
Fingerprint verification is one of the oldest known
biometric techniques known but still is the most
widely used because of its simplicity and good levels
of accuracy. It’s a well known fact that every human
being is born with a different pattern on the fingers
and this feature is exploited to identify and
differentiate between two different persons that is
what the factor which helped to initiate the model.
1.1 LITERATURE SURVEY
Sonam Shukla, Pradeep Mishra suggested increasing
the Accuracy of an Existing Fingerprint Recognition
System Using Adaptive Technique, in this approach
developer mainly focusing on Integrated Automated
Fingerprint Identification Service (IAFIS) of the most
famous police agencies. [1] They extracted fingerprint
pattern is characterized by a set of ridgelines that
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 515
often flow in parallel, but intersect and terminate at
some points. The uniqueness of a fingerprint is
determined by the local ridge characteristics and their
relationships. Main drawback of this model is this
approach is not so apt for real time applications but
the accuracy of system is highly adaptable. Most
automatic systems for fingerprint comparison are
based on minutiae matching.
Le Hoang Thai and Ha Nhat Tam in 2010 suggested
Fingerprint recognition using standardized fingerprint
model, now a days, fingerprint recognition is one of
the most Important biometric technologies based on
fingerprint distinctiveness,[2] in this approach they
focused on improving the quality of fingerprint
images. In fingerprint recognition process, the
important step which affects on system accuracy is
matching between template and query fingerprint
This approach functions based on the uniqueness of
each person and it integrating the biometric device to
transmit the information obtained in this approach
they are using fingerprint extraction and matching
algorithm and they maintaining the database to
authenticate the person who approaching for the
access through the
On line web page created in the local server.
2. SYSTEM OUTLINE:
2.1. HARDWARE ARCHITECTURE:
This proposed system consists of raspberry pi and
fingerprint module. This system provides the features
of real time authentication facilities
Fig 1: Proposed System Block Diagram
2.1.1 RASPBERRY PI:
Hardware is a physical device that can be touched or
held, like a hard drive or a mobile phone. Software
can be thought of as a program or a collection of
programs that instruct a computer on what to do and
how to do it. Below is an image of the Raspberry Pi
which describes some of the components that make
up the hardware.
Fig.2. Hardware Components of Raspberry Pi
Fig.2 shows the hardware description of raspberry pi.
The real time vehicle tracking system uses the GPIO
pin, Micro SD slot, USB port and Micro USB
connector. The GPIO pins are used for serial
communication for interfacing GSM and GPS. It uses
8GB SD for installing the Raspbian OS and for
storage. The USB port is used for connecting
keyboard, mouse, dongle and pen drive. The power
supply is given through USB connector.
2.1.2 FINGERPRINT READER:
The R305 is the module which is used in the project.
This module supports both windows and Linux based
operating system. This self-contained module
optically scans the fingerprint when the user touches
the glowing window.
Fig 3: Finger print module
RASP PI 3B
CLOUD
Wi-Fi
Power supply
Finger
Print
Reader
GUI
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 516
Optical technology gives the highest quality fingerprint
templates and reliability along with the raspberry pi
embedded computer.
The device can automatically control calibration,
encryption, and data transfer through the USB interface.
This module is found to be more reliable for all kind of
OS, even its easy to interface with raspberry pi.The R305
Module and digital Persona Fingerprint Recognition
Engine have an unmatched ability to authenticate even the
most difficult fingerprints accurately and rapidly.
2.1.3 GUI (Graphical User Interface):
The graphical user interface (GUI) is a type of user
interface that allows users to interact with electronic
devices through graphical icons. Visual indicators such as
secondary notation, instead of text-based user interfaces,
typed command labels or text navigation.
2.1.4 POWER SUPPLY:
Model uses 5 volt power supply and has a ability to drive
2.5 amperes of current.
2.2 SOFTWARE ARCHITECTURE:
For this project the used softwares are like PHP,
postgresql, opencv (python script). The configuring
procedures, saving and retrieval of fingerprint templates
procedures are mentioned in the upcoming chapters.
2.2.1 SOFTWARE- ALGORITHM:
The software algorithm of authentication system is
described here,
Step 1: Initialize the device by switching on the power
supply.
Step 2: Run the processor.
Step 3: Connect the fingerprint module.
Step 4: Open the fingerprint_demo gui.
Step 5 : Read and save the image template.
Step 6: Covert the image template in to binary template
Step 7: Save the obtained template in the MSQL database
Step 8: Now comparison between various templates can be
carried out using the python script.
Step 9: The accurate matching points will obtain between
the images.
Step 10: After matching and comparison, the overall
database is stored in excel file to upload it to the cloud.
2.3 IMPLEMENTATION PROCEDURE:
2.3.1 FPRINT DEMO: GRAPHICAL:
DEMONSTRATION APPLICATION:
This proposed system is implemented in a Linux based
GUI application, fprint demo and fingerprint model, with
the intention of using this to demonstrate the functionality
of the finger print device along with raspberry pi
embedded computer. fprint demo offers an interface for
enrolling fingers and deleting enrollment data for
previously enrolled fingers with the help of fprint GUI, an
interface for verifying a specific finger and an Interface for
identifying a finger from a selection of previously enrolled
fingerprint data.
2.3.2 CONVERTING THE TEMPLATE IN TO
BINARAIZED TEMPLATE
This GUI is capable of converting the fingerprint template
in to binary template. The imaging performance of this
device is excellent. The returned images are large and find
a large number of minutiae, leading to suitably distinct
scores for matching/non-matching fingers. Fig 4 shows an
image returned by this driver and its binarized form with
minutiae plotted with the help of raspberry pi embedded
computer.
Fig 4: Normal and binarized template
Fig 5 given below shows mismatched fingerprints of
different persons the python program is running as the
background process. Thus the below figure shows the
mismatched characteristics of two different fingers,
while comparing the same fingers I got the matching
points almost everywhere in finger template.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 517
Fig 5: Mismatched finger print
Fig 6 given below shows exactly matched fingerprints
of a person the python program is running as the
background process The green coloured lines
connecting two templates showing the number of
matching points in the templates The below
experimental results clearly states the ability of the
proposed design to distinguish the matched and
mismatched fingers.
Fig 6 . Matched fingers print
3. EXPREIMENTAL RESULTS:
After extracting the fingerprint template using finger
print demo GUI, Then comparison has been carried
out with the help of open cv programming tool with
python script and generate the excel file database to
upload it to cloud.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 518
4. CONCLUSIONS AND FUTURE WORK:
Fingerprint recognition is one of the most popular and
accurate Biometric technologies. Nowadays, it is used
in many real time applications. However, recognizing
fingerprints in Linux based recognition using python
were entirely done on raspberry pi This paper
discusses on the standardized fingerprint model which
is used to synthesize the template of fingerprints. In
this model, after pre- processing step, find the
transformation between templates, adjust parameters
and synthesize fingerprint. Then the use of final
fingerprint to match with others in fingerprints present
in the database to show the capability of this model.
Embedded computers (raspberry pi) are still a very
complex problem. This entire work is done on the
Linux based embedded computer called raspberry pi ,
in which database creation and management,
fingerprint reader access, authentication and fine
tuning has to be done to improve the accuracy of the
system and developing the system for real time higher
end application development using cloud created are
done. In future this single device can also be
implemented, and used by many lecturers.
5. ANDROID
Android is a mobile operating system developed by
Google, based on the Linux kernel and designed
primarily for touch screen mobile devices such as
smart phones and tablets. Application is created to see
the student attendance report for organisation use.
REFERENCES
1) Sonam Shukla, Pradeep Mishra
[2012],"Increasing The Accuracy Of An Existing
Recognition System Using Adaptive Technique"
International Journal of Advanced Research in
Computer Science and Software Engineering,
Volume 2, Issue 6, PP 52-57.
2) Le Hoang Thai and Ha Nhat Tam [2010],"
Fingerprint recognition using Standardized M
fingerprint model" IJCSI International Journal of
Computer Science Issues, Vol. 7, Issue 3, PP
1116.
3) Mukesh Kumar Thakur, Ravi Shankar Kumar,
Mohit Kumar, Raju Kumar [2013],"Wireless
Fingerprint Based Security System Using Zigbee
Technology" International Journal of Inventive
Engineering and Sciences (IJIES),ISSN:2319–
9598, Volume-1, Issue-5, PP 14-17
4) Arun, Emmanuel., Diwakar& Rajeswari
Automated attendance system using biometrics
with Embedded web server‖ Graduate Research in
Engineering and Technology (GRET): An
International Journal, page No-(54to57).
5) Karthik Vignesh E, Shanmuganathan S,
A.Sumithra S.Kishore and P. Karthikeyan ―A
Foolproof Biometric Attendance Management
System‖ International Journal of Information and
ComputationTechnology.ISSN:0974-2239.

More Related Content

What's hot

Embedded systems class notes
Embedded systems  class notes Embedded systems  class notes
Embedded systems class notes Dr.YNM
 
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Moe Moe Myint
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systemsmahalakshmimalini
 
Serial Communication Interfaces
Serial Communication InterfacesSerial Communication Interfaces
Serial Communication Interfacesanishgoel
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 
Introduction to Arduino
Introduction to ArduinoIntroduction to Arduino
Introduction to ArduinoOmer Kilic
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart CardsRebecca D'souza
 
Introduction to ESP32 Programming [Road to RIoT 2017]
Introduction to ESP32 Programming [Road to RIoT 2017]Introduction to ESP32 Programming [Road to RIoT 2017]
Introduction to ESP32 Programming [Road to RIoT 2017]Alwin Arrasyid
 
Electric_Electronic_Architecture
Electric_Electronic_ArchitectureElectric_Electronic_Architecture
Electric_Electronic_ArchitectureFlorent Bonetto
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pihetvi naik
 
Automatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptAutomatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptJOLLUSUDARSHANREDDY
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systemsApurva Zope
 
Introduction to arduino ppt main
Introduction to  arduino ppt mainIntroduction to  arduino ppt main
Introduction to arduino ppt maineddy royappa
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded SystemZakaria Gomaa
 
SEMINAR REPORT OF RASPBERRY PI
SEMINAR REPORT OF RASPBERRY PI SEMINAR REPORT OF RASPBERRY PI
SEMINAR REPORT OF RASPBERRY PI GANESH GOVIND BHOR
 

What's hot (20)

Embedded systems class notes
Embedded systems  class notes Embedded systems  class notes
Embedded systems class notes
 
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systems
 
Serial Communication Interfaces
Serial Communication InterfacesSerial Communication Interfaces
Serial Communication Interfaces
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
Introduction to Arduino
Introduction to ArduinoIntroduction to Arduino
Introduction to Arduino
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Embedded system in Smart Cards
Embedded system in Smart CardsEmbedded system in Smart Cards
Embedded system in Smart Cards
 
Computer science
Computer scienceComputer science
Computer science
 
Introduction to ESP32 Programming [Road to RIoT 2017]
Introduction to ESP32 Programming [Road to RIoT 2017]Introduction to ESP32 Programming [Road to RIoT 2017]
Introduction to ESP32 Programming [Road to RIoT 2017]
 
Electric_Electronic_Architecture
Electric_Electronic_ArchitectureElectric_Electronic_Architecture
Electric_Electronic_Architecture
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
 
Automatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptAutomatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos ppt
 
Traffic Violation Detector using Object Detection
Traffic Violation Detector using Object DetectionTraffic Violation Detector using Object Detection
Traffic Violation Detector using Object Detection
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 
Introduction to arduino ppt main
Introduction to  arduino ppt mainIntroduction to  arduino ppt main
Introduction to arduino ppt main
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
 
SEMINAR REPORT OF RASPBERRY PI
SEMINAR REPORT OF RASPBERRY PI SEMINAR REPORT OF RASPBERRY PI
SEMINAR REPORT OF RASPBERRY PI
 

Similar to Smart Attendance System using Raspberry Pi

Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET Journal
 
Real Time Hand Gesture Recognition Based Control of Arduino Robot
Real Time Hand Gesture Recognition Based Control of Arduino RobotReal Time Hand Gesture Recognition Based Control of Arduino Robot
Real Time Hand Gesture Recognition Based Control of Arduino Robotijtsrd
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET Journal
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMijsptm
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
Hand Gesture Identification
Hand Gesture IdentificationHand Gesture Identification
Hand Gesture IdentificationIRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Hand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic MediapipeHand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic MediapipeIRJET Journal
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User InputIRJET Journal
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep LearningIRJET Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET- Review on Portable Camera based Assistive Text and Label Reading f...
IRJET-  	  Review on Portable Camera based Assistive Text and Label Reading f...IRJET-  	  Review on Portable Camera based Assistive Text and Label Reading f...
IRJET- Review on Portable Camera based Assistive Text and Label Reading f...IRJET Journal
 
Augmented Reality Design of Indonesia Fruit Recognition
Augmented Reality Design of Indonesia Fruit Recognition Augmented Reality Design of Indonesia Fruit Recognition
Augmented Reality Design of Indonesia Fruit Recognition IJECEIAES
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET Journal
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 

Similar to Smart Attendance System using Raspberry Pi (20)

Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion DetectionIRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion Detection
 
Real Time Hand Gesture Recognition Based Control of Arduino Robot
Real Time Hand Gesture Recognition Based Control of Arduino RobotReal Time Hand Gesture Recognition Based Control of Arduino Robot
Real Time Hand Gesture Recognition Based Control of Arduino Robot
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance System
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
Hand Gesture Identification
Hand Gesture IdentificationHand Gesture Identification
Hand Gesture Identification
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Hand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic MediapipeHand Gesture Recognition System Using Holistic Mediapipe
Hand Gesture Recognition System Using Holistic Mediapipe
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
IRJET- Review on Portable Camera based Assistive Text and Label Reading f...
IRJET-  	  Review on Portable Camera based Assistive Text and Label Reading f...IRJET-  	  Review on Portable Camera based Assistive Text and Label Reading f...
IRJET- Review on Portable Camera based Assistive Text and Label Reading f...
 
Augmented Reality Design of Indonesia Fruit Recognition
Augmented Reality Design of Indonesia Fruit Recognition Augmented Reality Design of Indonesia Fruit Recognition
Augmented Reality Design of Indonesia Fruit Recognition
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Smart Attendance System using Raspberry Pi

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 514 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 1 | Issue – 5 International Journal of Trend in Scientific Research and Development (IJTSRD) UGC Approved International Open Access Journal Smart Attendance System using Raspberry Pi Pradeep Kumar M S Asst. Professor, Dept. of TCE, DBIT College, Bangalore, Karnataka, India Dr. K. Suresh Principal, SDMIT college, Ujire, Karnataka, India Indumati T Asst. Professor, Dept. of CSE, EWIT College, Bangalore, India Kishor kumar Asst. Professor, Dept. of TCE, DBIT College, Bangalore, Karnataka, India ABSTRACT Biometric authentication is one of the most popular and accurate technology. Now days, it is used in many real time applications. However, recognizing finger prints in Linux based embedded computers (raspberry pi) is still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi, in which database creation, fingerprint reader access, authentication and recognition using python were entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the finger prints of individual and store that in database . Then the use of final finger print to match with others in finger prints present in the database to show the capability of this model and also updating the database obtained to the organisation by creating an application through cloud. Keywords: finger print authentication, python, raspberry pi 1. INTRODUCTION The human body has the privilege of having features that are unique and exclusive to each individual. This exclusivity and unique characteristic has led to the field of biometrics and its application in ensuring security in various fields with various embedded controllers and embedded computers. Biometrics has gained popularity and has proved itself to be a reliable mode of ensuring privacy, maintaining security and identifying individuals. It has wide acceptance throughout the globe and now is being used at places like airports, hospitals, schools, colleges, corporate offices etc. Biometrics is the study of identifying a person by their physical traits that are inherent and unique to only the person concerned. Biometric identification include fingerprint verification, palm geometry, face recognition, iris recognition, etc. The above mentioned techniques work with different levels of functionality and accuracy. Accuracy and reliability are the two most important parameters when it comes to biometric applications and that too with advanced embedded computers. Fingerprint verification is one of the oldest known biometric techniques known but still is the most widely used because of its simplicity and good levels of accuracy. It’s a well known fact that every human being is born with a different pattern on the fingers and this feature is exploited to identify and differentiate between two different persons that is what the factor which helped to initiate the model. 1.1 LITERATURE SURVEY Sonam Shukla, Pradeep Mishra suggested increasing the Accuracy of an Existing Fingerprint Recognition System Using Adaptive Technique, in this approach developer mainly focusing on Integrated Automated Fingerprint Identification Service (IAFIS) of the most famous police agencies. [1] They extracted fingerprint pattern is characterized by a set of ridgelines that
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 515 often flow in parallel, but intersect and terminate at some points. The uniqueness of a fingerprint is determined by the local ridge characteristics and their relationships. Main drawback of this model is this approach is not so apt for real time applications but the accuracy of system is highly adaptable. Most automatic systems for fingerprint comparison are based on minutiae matching. Le Hoang Thai and Ha Nhat Tam in 2010 suggested Fingerprint recognition using standardized fingerprint model, now a days, fingerprint recognition is one of the most Important biometric technologies based on fingerprint distinctiveness,[2] in this approach they focused on improving the quality of fingerprint images. In fingerprint recognition process, the important step which affects on system accuracy is matching between template and query fingerprint This approach functions based on the uniqueness of each person and it integrating the biometric device to transmit the information obtained in this approach they are using fingerprint extraction and matching algorithm and they maintaining the database to authenticate the person who approaching for the access through the On line web page created in the local server. 2. SYSTEM OUTLINE: 2.1. HARDWARE ARCHITECTURE: This proposed system consists of raspberry pi and fingerprint module. This system provides the features of real time authentication facilities Fig 1: Proposed System Block Diagram 2.1.1 RASPBERRY PI: Hardware is a physical device that can be touched or held, like a hard drive or a mobile phone. Software can be thought of as a program or a collection of programs that instruct a computer on what to do and how to do it. Below is an image of the Raspberry Pi which describes some of the components that make up the hardware. Fig.2. Hardware Components of Raspberry Pi Fig.2 shows the hardware description of raspberry pi. The real time vehicle tracking system uses the GPIO pin, Micro SD slot, USB port and Micro USB connector. The GPIO pins are used for serial communication for interfacing GSM and GPS. It uses 8GB SD for installing the Raspbian OS and for storage. The USB port is used for connecting keyboard, mouse, dongle and pen drive. The power supply is given through USB connector. 2.1.2 FINGERPRINT READER: The R305 is the module which is used in the project. This module supports both windows and Linux based operating system. This self-contained module optically scans the fingerprint when the user touches the glowing window. Fig 3: Finger print module RASP PI 3B CLOUD Wi-Fi Power supply Finger Print Reader GUI
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 516 Optical technology gives the highest quality fingerprint templates and reliability along with the raspberry pi embedded computer. The device can automatically control calibration, encryption, and data transfer through the USB interface. This module is found to be more reliable for all kind of OS, even its easy to interface with raspberry pi.The R305 Module and digital Persona Fingerprint Recognition Engine have an unmatched ability to authenticate even the most difficult fingerprints accurately and rapidly. 2.1.3 GUI (Graphical User Interface): The graphical user interface (GUI) is a type of user interface that allows users to interact with electronic devices through graphical icons. Visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation. 2.1.4 POWER SUPPLY: Model uses 5 volt power supply and has a ability to drive 2.5 amperes of current. 2.2 SOFTWARE ARCHITECTURE: For this project the used softwares are like PHP, postgresql, opencv (python script). The configuring procedures, saving and retrieval of fingerprint templates procedures are mentioned in the upcoming chapters. 2.2.1 SOFTWARE- ALGORITHM: The software algorithm of authentication system is described here, Step 1: Initialize the device by switching on the power supply. Step 2: Run the processor. Step 3: Connect the fingerprint module. Step 4: Open the fingerprint_demo gui. Step 5 : Read and save the image template. Step 6: Covert the image template in to binary template Step 7: Save the obtained template in the MSQL database Step 8: Now comparison between various templates can be carried out using the python script. Step 9: The accurate matching points will obtain between the images. Step 10: After matching and comparison, the overall database is stored in excel file to upload it to the cloud. 2.3 IMPLEMENTATION PROCEDURE: 2.3.1 FPRINT DEMO: GRAPHICAL: DEMONSTRATION APPLICATION: This proposed system is implemented in a Linux based GUI application, fprint demo and fingerprint model, with the intention of using this to demonstrate the functionality of the finger print device along with raspberry pi embedded computer. fprint demo offers an interface for enrolling fingers and deleting enrollment data for previously enrolled fingers with the help of fprint GUI, an interface for verifying a specific finger and an Interface for identifying a finger from a selection of previously enrolled fingerprint data. 2.3.2 CONVERTING THE TEMPLATE IN TO BINARAIZED TEMPLATE This GUI is capable of converting the fingerprint template in to binary template. The imaging performance of this device is excellent. The returned images are large and find a large number of minutiae, leading to suitably distinct scores for matching/non-matching fingers. Fig 4 shows an image returned by this driver and its binarized form with minutiae plotted with the help of raspberry pi embedded computer. Fig 4: Normal and binarized template Fig 5 given below shows mismatched fingerprints of different persons the python program is running as the background process. Thus the below figure shows the mismatched characteristics of two different fingers, while comparing the same fingers I got the matching points almost everywhere in finger template.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 517 Fig 5: Mismatched finger print Fig 6 given below shows exactly matched fingerprints of a person the python program is running as the background process The green coloured lines connecting two templates showing the number of matching points in the templates The below experimental results clearly states the ability of the proposed design to distinguish the matched and mismatched fingers. Fig 6 . Matched fingers print 3. EXPREIMENTAL RESULTS: After extracting the fingerprint template using finger print demo GUI, Then comparison has been carried out with the help of open cv programming tool with python script and generate the excel file database to upload it to cloud.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 1 | Issue – 5 | July-Aug 2017 Page: 518 4. CONCLUSIONS AND FUTURE WORK: Fingerprint recognition is one of the most popular and accurate Biometric technologies. Nowadays, it is used in many real time applications. However, recognizing fingerprints in Linux based recognition using python were entirely done on raspberry pi This paper discusses on the standardized fingerprint model which is used to synthesize the template of fingerprints. In this model, after pre- processing step, find the transformation between templates, adjust parameters and synthesize fingerprint. Then the use of final fingerprint to match with others in fingerprints present in the database to show the capability of this model. Embedded computers (raspberry pi) are still a very complex problem. This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management, fingerprint reader access, authentication and fine tuning has to be done to improve the accuracy of the system and developing the system for real time higher end application development using cloud created are done. In future this single device can also be implemented, and used by many lecturers. 5. ANDROID Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touch screen mobile devices such as smart phones and tablets. Application is created to see the student attendance report for organisation use. REFERENCES 1) Sonam Shukla, Pradeep Mishra [2012],"Increasing The Accuracy Of An Existing Recognition System Using Adaptive Technique" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 6, PP 52-57. 2) Le Hoang Thai and Ha Nhat Tam [2010]," Fingerprint recognition using Standardized M fingerprint model" IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, PP 1116. 3) Mukesh Kumar Thakur, Ravi Shankar Kumar, Mohit Kumar, Raju Kumar [2013],"Wireless Fingerprint Based Security System Using Zigbee Technology" International Journal of Inventive Engineering and Sciences (IJIES),ISSN:2319– 9598, Volume-1, Issue-5, PP 14-17 4) Arun, Emmanuel., Diwakar& Rajeswari Automated attendance system using biometrics with Embedded web server‖ Graduate Research in Engineering and Technology (GRET): An International Journal, page No-(54to57). 5) Karthik Vignesh E, Shanmuganathan S, A.Sumithra S.Kishore and P. Karthikeyan ―A Foolproof Biometric Attendance Management System‖ International Journal of Information and ComputationTechnology.ISSN:0974-2239.