SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3421
A Proposed GSM Biometric Attendance
Management System for Ghana Education
Charles Antoh-Baffoe
School of Technology, GIMPA
Email : Charles.antoh-baffoe@gimpa.edu.gh
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
The purpose of this research is to implement interactive and reliable attendance management using GSM/GPRS
signal to transfer and retrieve data from remote locations in Ghana tested with alert and management
functionality on real time. It also discussed the technological approach in automating subject and attendance
administration in the schools and also ascertained the business success with attendance management systems for
Ghana education service. Rapid application development (RAD) software development methodology was
deployed to build the Biometric Attendance System (BAS). The BAS was designed and implemented. The system
provides users with an efficient way of generating reports and retrieving of attendance information of a teacher in
specific districts. It supports unified access and management through a simple standard web browser interface. It
is recommended that evaluation of the system be carried out in future works to ascertain the success of the system.
Keywords - Biometric System, GSM, Education, Cellular System.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Oct 10, 2017 Date of Acceptance: Nov 04, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Organizations have become concerned with the issue of
absenteeism in their various organizations. Employers
across the UK have become significantly more concerned
over the levels of sickness absence in their workforce
(Bevan, 2003) as Ghana ranks first in teacher absenteeism
in West Africa; reports from the World Bank and
the United Nations International Children’s
Emergency Fund (UNICEF) have revealed
(http://www.dailyguideghana.com). The latter case was
mentioned by Mr Alex Kyeremeh, a Deputy Minister of
Education, who made this known at a stakeholders’ forum
on education at Dormaa- Ahenkro, in the Brong Ahafo
Region of Ghana (www.dailyguideghana.com, 2014). The
Northern Network for Education Development (NNED)
conducted a research to find the extent of absenteeism in
public schools by surveying “30 schools sampled out of
the lot in two of the three northern regions and found out
that there was an average of 30 percent absenteeism.
Among this percentage, 48 percent were caused by
unpreventable factors such as pregnancy, malaria or lack
of accommodation” (www.nnedghana.org). That means
there is a large proportion unexplained. The Government
has taken some measures to address this issue and has
succeeded to some extent. “We carried out surprise visits
at 11,594 schools at the basic levels and are happy to
announce that teacher absenteeism in Ghana has declined
from 27 percent to 11” (www.thebftonline.com, 2014).
The Government has even further gone on to establish a
committee to design modalities with the aim of achieving
Zero Absenteeism in Ghana.
“The Ghana Education Service (GES) was established as
part of the Ministry of Education of Ghana under the Civil
Service Law 327 and under the PNDC Law 1993 with the
mandate to provide relevant education to all Ghanaians. It
is responsible for instituting the national education
curriculum, appointing and managing the work and issues
of teachers and other educational workers. The Ghana
Education Service (GES) is mandated among others to
maintain high standards of education at the first and
second cycle levels. To ensure the achievement of its
mandate, GES employed its own workers who are
categorized into teaching and non-teaching staff”
(www.moe.gov.gh). The Director of GES, Mr Enoch
Cobbinah accompanied the Minister of Education, Prof.
Naana Jane Opoku-Agyemang to pay unannounced visits
to the Dangbe West District of the Greater Accra Region
and found many teachers and heads absent from their
posts. It decided to sanction them as a measure to curb the
act or its future occurrence (www. graphic.com.gh, 2014).
In 2003, the Nkoranza District Directorate of the Ghana
Education Service (GES) has established some measures
to check absenteeism and malingering among students and
teachers by residing district circuit supervisors close to the
schools to establish more frequent checks on teachers and
students alike. They also provided some bicycles to the
teachers who lived far from the schools to enable commute
quicker to the schools (www.modernghana.com, 2003). In
2014, Vice President of Ghana Mr. Kwesi Bekoe
Amissah-Arthur voiced his displeasure among others at
the issue absenteeism by teachers in public schools at the
World Teachers Day Celebration in Cape Coast. He
condemned the behavior as inexcusable and unacceptable
(www.regional.citifmonline.com). The issue has been
bothering all stakeholders within the country and can be
has attracted views from governmental as well as non-
governmental agencies/organizations. In government,
views have been expressed from even the top hierarchy
and this problem remains a grass-root problem. It is the
teachers and other educational workers who have been
indulging in these acts. It can be inferred even at this point
that the current mechanisms and proposed or attempted
solutions have not yielded the desired results and impact.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3422
II. LITERATURE REVIEW
Organizations have become concerned with the issue of
absenteeism in their various organizations. Employers
across the UK have become significantly more concerned
over the levels of sickness absence in their workforce
(Bevan, 2003) as Ghana ranks first in teacher absenteeism
in West Africa; reports from the World Bank and
the United Nations International Children’s
Emergency Fund (UNICEF) have revealed
(http://www.dailyguideghana.com). The latter case was
mentioned by Mr Alex Kyeremeh, a Deputy Minister of
Education, who made this known at a stakeholders’ forum
on education at Dormaa- Ahenkro, in the Brong Ahafo
Region of Ghana (www.dailyguideghana.com, 2014). The
Northern Network for Education Development (NNED)
conducted a research to find the extent of absenteeism in
public schools by surveying “30 schools sampled out of
the lot in two of the three northern regions and found out
that there was an average of 30 percent absenteeism.
Among this percentage, 48 percent were caused by
unpreventable factors such as pregnancy, malaria or lack
of accommodation” (www.nnedghana.org). That means
there is a large proportion unexplained. The Government
has taken some measures to address this issue and has
succeeded to some extent. “We carried out surprise visits
at 11,594 schools at the basic levels and are happy to
announce that teacher absenteeism in Ghana has declined
from 27 percent to 11” (www.thebftonline.com, 2014).
The Government has even further gone on to establish a
committee to design modalities with the aim of achieving
Zero Absenteeism in Ghana.
“The Ghana Education Service (GES) was established as
part of the Ministry of Education of Ghana under the Civil
Service Law 327 and under the PNDC Law 1993 with the
mandate to provide relevant education to all Ghanaians. It
is responsible for instituting the national education
curriculum, appointing and managing the work and issues
of teachers and other educational workers. The Ghana
Education Service (GES) is mandated among others to
maintain high standards of education at the first and
second cycle levels. To ensure the achievement of its
mandate, GES employed its own workers who are
categorized into teaching and non-teaching staff”
(www.moe.gov.gh). The Director of GES, Mr Enoch
Cobbinah accompanied the Minister of Education, Prof.
Naana Jane Opoku-Agyemang to pay unannounced visits
to the Dangbe West District of the Greater Accra Region
and found many teachers and heads absent from their
posts. It decided to sanction them as a measure to curb the
act or its future occurrence (www. graphic.com.gh, 2014).
In 2003, the Nkoranza District Directorate of the Ghana
Education Service (GES) has established some measures
to check absenteeism and malingering among students and
teachers by residing district circuit supervisors close to the
schools to establish more frequent checks on teachers and
students alike. They also provided some bicycles to the
teachers who lived far from the schools to enable commute
quicker to the schools (www.modernghana.com, 2003). In
2014, Vice President of Ghana Mr. Kwesi Bekoe
Amissah-Arthur voiced his displeasure among others at
the issue absenteeism by teachers in public schools at the
World Teachers Day Celebration in Cape Coast. He
condemned the behavior as inexcusable and unacceptable
(www.regional.citifmonline.com). The issue has been
bothering all stakeholders within the country and can be
has attracted views from governmental as well as non-
governmental agencies/organizations. In government,
views have been expressed from even the top hierarchy
and this problem remains a grass-root problem. It is the
teachers and other educational workers who have been
indulging in these acts. It can be inferred even at this point
that the current mechanisms and proposed or attempted
solutions have not yielded the desired results and impact.
III. METHODOLOGY
The biometric attendance was designed and developed
with the Rapid Application Development (RAD) model.
The RAD model would enable us to create this solution
without the need to carry out prolonged planning activities
since the specifications are well known.
3.1 Business Modeling Phase
Business Modeling Phase seeks to understand the
workflow as required under the project. It involves the
studying of the attendance system as it currently exists
with GES to understand how their mechanism operates by
observing the workflows and interviewing of the relevant
entities. It also includes the analysis of factors that are
necessary for the smooth flow of information.
3.2 Data Modeling Phase
The second phase to analyze the information gathered in
the business modeling phase from a data point of view.
Each flow is analyzed carefully with the objective of
finding out what data is required, how it is used and how
and where it flows to. The attributes that define the data
objects are clearly defined as well as the establishment of
relationships between the various data objects.
3.3 Process Modeling Phase
The data objects model created in the Data Modeling
phase are extended to show the processes that each object
is processed on. These may include adding, retrieving,
modifying or even deletion of data or parts of its attributes
(www.tutorialspoint.com).
3.4 Application Generation Phase
The fourth phase of the RAD system development model
involves the conversion of the process model and data
model into a solution. These include the coding of the
software using established automation tools to create the
application and database. It also involves the integration
and configuration of the biometric devices. This prototype
is then taken through the final step that involves testing
and turnover
3.5 Testing and Turnover Phase
Testing and Turnover Phase requires that a systematic and
thorough search is done to. It is worth noting that, even
though the previous phase where programming was done
would have come along with some sort of unit testing, it is
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3423
still important to carry out this form of comprehensive
testing.
Figure 1: Rapid Application Development Model
The RAD allows changing requirements to be considered.
Iteration is quicker as there is drastic reduction in
development time. It encourages the flow of feedback
from the customer/client. Also, it accommodates
integration of component and modules from the very
beginning to solve the issues of unpredictability that might
occur as a result of integration. RAD however requires
highly skilled developers/designers. Its dependency on
model is immense and it implies that careful care and
expertise be taken to prepare this. Its lifecycle is such that
it would require involvement as it scaled or evolves with
time (www.tutorialspoint.com).
Start
Final DFDs
Drafted DFDs
Sequence
Diagrams
Drafted Class
Diagrams
Final Use Cases
Initial Use Case
Models and
Scenarios
Context Diagrams
Observations
Reports
Interview Reports
Final Software
Prototype
Database
Entity Relationship
Diagrams
Attendance Management
System
Biometric device
Application
Interface
Connected device
Carry out interviews
Final Class
Diagrams
Review Drafted Class Diagrams
Draft Class Diagrams
Review Initial Use Cases
Draft Use Cases
Draft Use Cases
Review DFDs
Create Context Diag.
Draft DFDs
Create Sequence Diag.
Create Databases
Create ER
Diag
Create ER Diag.
Create ER Diag.
Test software
Connect Database
to Application
Write Codes
Design Forms
Design Forms
Integrate with
SMS systems
Configure GSM
Integrate with Application
Observe Systems
Timetable
Load with basedata
Installbiometric device
Figure 2: Product Flow Diagram
Fig. 2 offers a different approach to the planning of the
project into distinguishable components that would allow
easy identification and tracking. This approach is based on
the model (RAD) chosen its management approach as
well. It enables level categorization of products under each
level with the aim of identifying the products that are to be
delivered under each phase and stage. The items that are
not broken down at any point in time are the low-level
items of interest.
BiometricAttendance
ManagementSystem
Specialistproducts
Management
products
BusinessModel DataModel ProcessModel Application Testing
Observationand
interviewreports
Classdiagrams
UsecasemodelSequenceDiagrams
ContextDiagram
System
requirements
specifications
E-Rdiagrams
Database Webapplication Integratedsystems
ConfiguredSMS Biometricdevice
PrototypeUserManuals
Figure 3: Product Breakdown Structure
IV. THE PROPOSED SYSTEM
The new systems proposed to introduce an automated
teacher attendance management system that would serve
as a real-time mechanism to deal with the issue of
absenteeism. It affords some good opportunities that
would add value to the attendance management process.
Figure 4: Architecture of the Proposed System
Fig. 4 presents a general overview of how the system is to
work. Several biometric devices sited at various schools
would be used by the teachers for recording their
attendance to school at the stipulated time. These
biometric devices would send attendance data in real time
to the central server. The GES staff who reside in the
district offices and the headquarters and are interested in
these data as part of their work would have access to the
stored data in different forms for use in other functions.
The data generated would reach the server via a modem
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3424
that is attached to it. This modem would also have a SIM
card in it to facilitate easy communication using the GSM
network for which both SIMs are compatible. In an
expanded view, all the sites that have the biometric
devices would all use GSM as to communicate with the
central server.
4.1.1 Key Features of the System and System
Components
 The biometric devices that have been chosen
possess SIM card slots that ensures that they are
compatible with mobile network technologies
such as GSM, GPRS, and EDGE etc. This
capability means that there would not be a need
to acquire two or more separate devices for
enabling connection.
 The GSM network chosen offers relatively lower
cost as compared to other. This is readily
available as there are network providers who
offer such services. There would be no need to
create a dedicated network as the cost and time
for this would be very large considering the wide
geographical bounds.
 The centralization of database would ensure that
there would be no need to install databases or
storage media at the various sites to store or
retrieve data. When a user is to be authenticated,
the GSM network would enable connection to the
server and this also happens when attendance is
being clocked.
 In the current system it takes time for data to be
prepared and even longer to reach to transform or
reach its intended target. This new system would
ensure that the data generated would be in real
time.
 The application that is to be used by the circuit
supervisors and other administrative workers,
who use the attendance management system,
would be designed using web technologies. This
means the users would require only a connection
and basic web browser on their client machines to
gain access.
 Reports required by the various administrative
workers would be pre-configured and would be
available for use “at the click of a button”. This
means all reports formats would be considered by
during designing and development.
 Unlike the current system that is mostly paper-
based and unidirectional, this new system would
incorporate a feedback mechanism to give
feedback to the teachers at certain times.
 The system would incorporate an access-rights
mechanism for checking abuse or unauthorized
use of the system.
4.1.2 Functional requirements of the new system
The analyses of the current and new system based on the
proposed architecture have helped in the identification of
the following functional requirements:
 The system should allow the administrator to add
and manage teacher details. They should also be
able to add and manage courses and the times
they are supposed to be taught by the respective
teachers. This would create a prepopulated list for
use within the system.
 The biometric device should enable one-time
registration of teachers. This should be done with
the database enabled. This would be done against
the prepopulated data of teachers within the
system.
 The biometric device should be used by the
teacher to clock attendance and have data
generated and sent to the server in real time.
 The biometric device should verify the individual
who is attempting to clock in by checking for the
essential elements within the centralized
database. The response should be matched by the
matcher and indicate successful/unsuccessful
authentication to the user. A successful
authentication would automatically indicate
attendance clocked within the system database.
 The database should maintain proper data on
teachers from various schools within various
districts within the country such that it can
support easy searching and transformation.
 The accompanying application should be such
that every user would require a set of security
login credentials to gain access.
 The application should be preconfigured with
formatted reports that would be generated upon
minimal user interaction.
 The feedback mechanism should send
information to teachers when prompted as well
send predefined feedback at specific periods.
4.1.3 Non-Functional Requirements of the New System
In trying to assess what non-functional requirements this
system holds we consider some work done by Kotonya
and Sommerville (1998) who provide a three-item
categorization of information systems. These are product
requirements, organizational requirements and external
requirements. They further go on to breakdown these three
items into several sub items that even though granular are
still generic and can be adapted for use in different
information systems projects. For the purposes of this
project, we only consider those that are essential and
relevant.
 Usability: The system should be streamlined in
such a way as to rid of unwanted steps. This
would ensure that very simple flows exist. The
system should be user-friendly, self-intuitive and
easy to remember.
 Reliability: The system should produce output as
expected and in a timely manner at an
appreciable amount of time. It should not be
compromised or open to manipulation by users.
 Availability: The system should always be
available to the user at any time and from
anywhere.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3425
 Standards: The system should perform at
acceptable levels of standard to be compared to
any similar software and make it easy for
evaluation of performance.
 Safety: The biometric devices used for
attendance clocking should be safe to use. They
should be mounted at safe locations in the
schools and contain components that would not
cause any damage to any user or individual near
it. The GSM communication should not interfere
with any other communication setup.
 Privacy: Data gathered and stored must be
properly secured with appropriate access control
policies in place to prevent unauthorized access
or use. The communication medium should not
give way to any interception of data at any point
in time.
User
-StaffID
-Last Name
-First Name
-Telephone
-Role
+Login()
Admin
+RegisterUser()
+Enroll courses()
+SetTimetable()
+View Reports()
Headmaster
+View Reports()
+Check Attendance
CircuitSupervisor
+Check Attendance()
+Send SMS()
+View Reports()
Teacher
-biometricdata
+Capturebiodata()
+Clock Attendance()
Courses
-CourseID
-Course Name
-Course date
-Course Time
+Add course ()
+Assign Timetable()
Timetable
-ID
-Details
+Create Timetable()
+View Timetable()
Report
-Reportname
+Generate report()
+Printreport()
Biometric data
-StaffID
-Biometricimage
+Registerdetails()
+Verify details()
SMS
-SMStitle
-SMS message
-Date
-Time
-Sender
-Recipient
+Prepare SMS()
+Send SMS()
Attendance
-ID
-Date
-Time
+Record Attendance()
1
*
1..*
1
*
1..*
1
*
1
1..*
1
1..*
1
1..*
1
1..*
1 1..*
1
1
1
1
1 *
Figure 5: Class Diagram
The class diagram shown in Fig. 5 views various users and
artefacts as objects that possess set of attributes as well as
operations that they perform or can be performed on them.
The class diagram also shows the relationships between
the various the various objects. The users who would use
the web application all have similar attributes and thus
have been generalized but their operations differ. The
teacher as a user has additional attribute that make it differ
from other users because of the biometric data that is
captured in addition to the other attribute. The lower level
of the diagram contains various objects of interest as seen
within the application. These together with the user classes
can be used as the building blocks for database tables as it
relationships. Also, the operations contained within the
classes coupled with the relationships shown can assist in
the coding phase of the application development as well as
the integration.
Various Unified Modeling Language (UML) approaches
have given us the opportunity to prepare designs as
required by the business, data and data modelling phases
of the system. These designs have all led to the
development of a good application database as well as a
good functioning application interface that is also
functional. The technicalities that one would have
considered to be sophisticated were made very clear using
the widely accepted specification documents. The
systematic manner of the documents went a long way to
aid in the development and integration of the system.
V. CONCLUSION AND FURTHER RESEARCH
The objective of the GSM-based biometric attendance
system was to create a highly reliable platform for both
teachers and educational administrators in their attempt to
track, monitor and record teacher attendance respectively.
At the end the project has achieved the following
objectives initially discussed and outline below:
 Gathering of information and analyses of the current
system to better understand its mechanisms and
associated pros and cons.
 Designing and developing a robust and centralized
database that stores data regarding subject been taught
as well as profiles of teachers.
 Designing and developing a web application interface
integrated with the database to allow supervisors have
access to stored data created by teachers’ attendances,
confirm attendances, print reports, send feedback to
teachers etc.
Gathering information from the various stakeholders took
a little longer than estimated. The channels that were in
place at the GES required that some high level of approval
had to be given before the relevant people could offer
assistance. Information gathered was always pointing to
manual systems and forms of attendance management.
Some artefacts were shown to give further clarity on the
various explanations and insights given. The next
objective was to design and develop a robust and
centralized solution. This objective was broken down into
two parts but from a developmental point-of-view this
discussion has been merged into one. The system
development model chosen was the Rapid Application
Development (RAD) model. The model requires that very
refined designs be made produced to speed up the actual
development. The design of the system came up from the
second (Data Modelling) and third (Process Modelling)
phases of the RAD model. The designs involved the use of
standard UML approaches to ensure that consistency is
achieved. Diagrams such as the class diagram eased the
consideration that went into the creation of the database
while the use of use cases and sequence diagrams depicted
the flow of the application design.
5.1 Challenges
The system was not tested at other remote locations where
GSM/GPRS has weak signal strength. It was tested at
Akuapim south district where GSM/GPRS has strong
signal strength. This limitation is due to lack of funds to
travel to other areas within the country. The system can be
viewed via a mobile browser, it is not responsive to
varying screen sizes. The system is best viewed on 800 by
600 screen resolution. It is not adaptable to other screen
resolutions. It was also difficult to get willing GES-
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3426
enrolled teachers and other staff whose data could be used
for use in this project.
5.2 Recommendations for Further Work
The research has shown to hold very good prospect for the
management of attendance of teachers employed by the
GES. It uses could be adapted for other public as well as
private institution as well. The availability of the system is
very dependent on the strength and speed of the GSM
network technology adopted. That infers that its use can be
limited in this regard. As a recommendation, other forms
of network connectivity that spans wide geographical
areas should be researched into.
The third point is to have a system that offers an adaptive
or alternative form of biometric attendance clocking.
There could be instances where someone may have injured
the required finger or for some unfortunate reason may
have lost it. This should not mean the person cannot clock
attendance. Other forms of biometry should be explored to
ensure that electronic attendance clocking is always
available. The systems justification would be further
enhanced if its use is not limited only to its primary
objective of effectively managing attendance. It can be
integrated with other systems such as payroll systems,
appraisal systems, Learning Management Systems (LMS)
or even Enterprise Resource Planning systems to provide
data or enable functional use.
REFERENCES
1. Bevan, S., 2003, Absence Management, The
Work Foundation, retrieved from
http://www.theworkfoundation.com
2. Chapman W. David (1994). Reducing teacher
absenteeism and attrition: causes, consequences
and responses. Paris, France: International
Institute for Educational Planning, UNESCO.
3. Chaudhury Nazmul, Hammer Jeffrey, Kremer
Michael, Muralidharan Karthik, and Rogers F.
Halsey. (2005) Missing in Action: Teacher and
Health Worker Absence in Developing Countries
Revised JEP version.
4. Citi FM Online. (2014). VEEP clashes with
teachers over absenteeism. Retrieved from
http://www.regional.citifmonline.com
5. Clotfelter CT, Ladd HF, Vigdor JL (2009) Are
teacher absences worth worrying about in the
U.S.? CALDER Working Paper No. 24.
Retrieved from www.caldercenter.org
6. Daily Guide. (2014).Ghana Tops Teacher
Absenteeism in West Africa. Retrieved from
http://www.dailyguideghana.com
7. Das, Jishnu, Stefan Dercon, James Habyarimana,
and Pramila Krishnan. 2007. ÊșTeacher Shocks
and Student Learning: Evidence from Zambia.Êș
Journal of Human Resources, 42 4, pp. 820‐ 62.
8. Davenport, T.H., and Short, J.E. (1990) “The
New Industrial Engineering: Information
Technology and Business Process Redesign” In A
study of the impact of information technology on
business processes using discrete even
simulation: a reprise. Department of Information
Systems and Computing, Brunel University,
Middlesex, United Kingdom.
9. Gaur Shweta, Shah V.A. and Thakker Manish.
(2012). Biometric Recognition Techniques: A
Review. International Journal of Advanced
Research in Electrical, Electronics and
Instrumentation Engineering Vol. 1, Issue 4,
ISSN 2278 – 8875.
10. Graphic Online. (2014). Minister commissions
committee to tackle teacher absenteeism
Retrieved from http://www. graphic.com.gh
11. Hammer, M., and Champy, J. (1993).
“Reengineering the Corporation” In A study of
the impact of information technology on business
processes using discrete even simulation: a
reprise. Department of Information Systems and
Computing, Brunel University, Middlesex,
United Kingdom.
12. International Journal of Science and Research
(IJSR). ISSN (Online): 2319-7064 Volume 2
Issue 10.
13. Jain A. K., Bolle R., and Pankanti S., Biometrics:
Personal Identification in Networked Society.
14. Josphineleela R. and Ramakrishnan M. (2012).
An Efficient Automatic Attendance System Using
Fingerprint Reconstruction Technique (IJCSIS).
International Journal of Computer Science and
Information Security, Vol. 10, No. 3.
15. Konsbruck Robert Lee. (2014). Impacts of
Information Technology on Society in the new
Century CH-1007 Lausanne-Vidy, Switzerland.
P3.
16. Kotonya G. and Sommerville I., (1998).
Processes and Techniques, Requirements
Engineering – Wiley.
17. Kroeker, B. (2000). Changing Roles in
Information Dissemination and Education in G.
D. Garson Social Dimensions of Information
Technology: Issues for the New Millennium.
(pp.141 – 159) Hershey, PA: IDEA Group.
18. Malone, T.W.,  Crowston, K. (1994). “The
Interdisciplinary Study of Coordination” In The
Impact of Information and Communication
Technology on Interorganizational Coordination:
Guidelines from Theory by Mariëlle den Hengst
and Henk G. Sol. (2001). Delft University of
Technology, the Netherlands.
19. Maltoni Davide. (2003). Biometrics:
Authentication and recognition, DEIS, University
of Bologna, Italy.
20. Ministry of Education. About MOE. Retrieved
from http://www.moe.gov.gh
21. Modern Ghana. (2003). Nkoranza GES adopts
measures to check absenteeism among teachers.
Retrieved from http://www.modernghana.com
22. Modern Ghana. (2014). Ghana Tops Teacher
Absenteeism in West Africa. Retrieved from
http://www.modernghana.com
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290
3427
23. Mouly M. and Pautet M-B. (1992). The GSM
system for Mobile Communication.
24. NITA. (2014). Mission  Vision. Retrieved from
http://www.nita.gov.gh/Mission-Vision
25. Northern Network for Education Development,
Teacher Absenteeism. Retrieved from
http://www.nnedghana.org
26. Painter, M.K., Fernades, R., Padmanaban, N., and
Mayer, R.J. (1996). “A Methodology for
Integrating Business Process and Information
Infrastructure Models” In A study of the impact of
information technology on business processes
using discrete even simulation: a reprise.
Department of Information Systems and
Computing, Brunel University, Middlesex,
United Kingdom.
27. Patel Rajan, Patel Nimisha, Gajjar Mona. (2012).
Online Students’ Attendance Monitoring System
in Classroom Using Radio Frequency
Identification Technology: A Proposed System
Framework, International Journal of Emerging
Technology and Advanced Engineering Volume
2, Issue 2
28. Rajasekar L., Vivek S. (2012). Wireless
Fingerprint Attendance System using ZigBee
Technology International Journal of Power
Control Signal and Computation (IJPCSC), Vol
3. No1.
29. Rogers F. Halsey and Vegas Emiliana. (2009).
No More Cutting Class? Reducing Teacher
Absence and Providing Incentives for
Performance. The World Bank Development
Research Group Human Development and Public
Services Team  Human Development Network
Education Team. Policy Research Working Paper
4847
30. Sumhr.com. (2014). What is a Biometric
Fingerprint Reader and RFID machine? Retrieved
from http://www.sumhr.com
31. The Business  Financial Times. (2014). Teacher
absenteeism reduces to 11%. Retrieved from
http://thebftonline.com
32. TutorialsPoint. SDLC – RAD Model. Retrieved
from http://www.tutorialspoint.com
33. Venkateswarlu T. and Naresh K. An automatic
frequency planning of GSM networks using
evolutionary algorithms. International Journal of
Engineering Research and Applications (IJERA).
Vol. 1, Issue 3, ISSN: 2248-9622
34. Verma Pallavi and Gupta Namit. (2013).
Fingerprint Based Student Attendance System
Using GSM
35. Wiredu G. (). “User appropriation of mobile
technologies: Motives, conditions and design
properties”, Information Systems and Innovation
Group, Department of Management, The London
School of Economics and Political Science,
London, UK. p24.
36. Boateng S. M. (2012). “The Role of Information
and Communication Technologies in Ghana’s
Rural Development”. University of Nebraska –
Lincoln.
37. Frempong, G.K. and Atubra, W.H. (2001).
“Liberalisation of TELECOMS: the Ghanaian
experience”. Telecommunication Policy, 25, p.
197-210.
38. Cobbinah, J.R. (2003). “Enhancing strategic
competitiveness in information and
communication technology (ICT) Ghana Country
Paper”. Telematics and Informatics, 20,p.1-9.
39. M. Zhang and Richard S. Wolff. (2004). “Using
Multi‐ hop for Broadband Fixed Wireless Access
in Rural Areas”, Wireless 2004, Calgary, CA.
40. Qiang C. Z. W. and Rossotto C. M. (2009).
Information and Communications for
Development: Extending Reach and Increasing
impact. The World Bank, Washington DC.
41. Gartner.com. (2007). Gartner Says Number of
Identity Theft Victims Has Increased More Than
50 Percent Since 2003. Retrieved from
http://www.gartner.com/it/page.jsp?id=501912.
42. Shiboleth. (1995). An Introduction to Role-Based
Access Control. Retrieved from
http://csrc.nist.gov/rbac/NIST-ITL-RBAC-
bulletin.html
43. Gutterman, B., Rahman S. Supelano J. Thies L.
Yang Mai. (2009). “White Paper – ICT in
Education for Development”. Global Alliance for
ICT and Development.
44. Martey Alfred (2004). ICT in distance education
in Ghana. Library High Tech News Vol. 21 Iss.
5, pp 16-18, University of Cape Coast.

More Related Content

Similar to A Proposed GSM Biometric Attendance Management System for Ghana Education

IICD Ghana Education Programme 2015
IICD Ghana Education Programme 2015IICD Ghana Education Programme 2015
IICD Ghana Education Programme 2015
Smart Resultancy
 
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
SIR SUCCESS PRINCE DUAH DUAH
 
A Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in AfricaA Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in Africa
WandeOwolabi
 
A Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in AfricaA Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in Africa
omololasalami
 
Open schooling programme
Open schooling programmeOpen schooling programme
Open schooling programme
Komakech Robert Agwot
 
2017 UAB GHCC Case
2017 UAB GHCC Case2017 UAB GHCC Case
2017 UAB GHCC Case
SparkmanCenter
 
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
SIR SUCCESS PRINCE DUAH DUAH
 
Suraju Danjuma Project
Suraju Danjuma ProjectSuraju Danjuma Project
Suraju Danjuma Project
Joshua Olaoye
 
An empirical investigation of viability of alternative approaches
An empirical investigation of viability of alternative approachesAn empirical investigation of viability of alternative approaches
An empirical investigation of viability of alternative approaches
Alexander Decker
 
Ej895749
Ej895749Ej895749
Ej895749
Megbaru Tashu
 
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIES
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIESCHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIES
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIES
Kweku Zurek
 
A comparison of “well endowed” and “deprived” districts in
A comparison of “well endowed” and “deprived” districts inA comparison of “well endowed” and “deprived” districts in
A comparison of “well endowed” and “deprived” districts in
Alexander Decker
 
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
Challenge:Future
 
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
Challenge:Future
 
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
SIR SUCCESS PRINCE DUAH DUAH
 
Chapter 3 Respiratory disorders.pptx
Chapter 3 Respiratory disorders.pptxChapter 3 Respiratory disorders.pptx
Chapter 3 Respiratory disorders.pptx
Tashriiq_Ahmed
 
THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...
THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...
THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...
SIR SUCCESS PRINCE DUAH DUAH
 
CV _ MASIBO_MINOS_CHELONGO-2015.
CV _ MASIBO_MINOS_CHELONGO-2015.CV _ MASIBO_MINOS_CHELONGO-2015.
CV _ MASIBO_MINOS_CHELONGO-2015.
Minos Chelongo Masibo
 
A secure web based universal basic educational administrative
A secure web based universal basic educational administrativeA secure web based universal basic educational administrative
A secure web based universal basic educational administrative
Alexander Decker
 
A secure web based universal basic educational administrative
A secure web based universal basic educational administrativeA secure web based universal basic educational administrative
A secure web based universal basic educational administrative
Alexander Decker
 

Similar to A Proposed GSM Biometric Attendance Management System for Ghana Education (20)

IICD Ghana Education Programme 2015
IICD Ghana Education Programme 2015IICD Ghana Education Programme 2015
IICD Ghana Education Programme 2015
 
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
 
A Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in AfricaA Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in Africa
 
A Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in AfricaA Study on Mlearning Implementation in Africa
A Study on Mlearning Implementation in Africa
 
Open schooling programme
Open schooling programmeOpen schooling programme
Open schooling programme
 
2017 UAB GHCC Case
2017 UAB GHCC Case2017 UAB GHCC Case
2017 UAB GHCC Case
 
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
 
Suraju Danjuma Project
Suraju Danjuma ProjectSuraju Danjuma Project
Suraju Danjuma Project
 
An empirical investigation of viability of alternative approaches
An empirical investigation of viability of alternative approachesAn empirical investigation of viability of alternative approaches
An empirical investigation of viability of alternative approaches
 
Ej895749
Ej895749Ej895749
Ej895749
 
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIES
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIESCHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIES
CHILD RIGHTS INTERNATIONAL EMPOWERS CIDLDREN IN COCOA- GROWING COMMUNITIES
 
A comparison of “well endowed” and “deprived” districts in
A comparison of “well endowed” and “deprived” districts inA comparison of “well endowed” and “deprived” districts in
A comparison of “well endowed” and “deprived” districts in
 
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
 
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
[Challenge:Future] Provision of Sanitary Towels to Girls Through Fun Sports a...
 
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
 
Chapter 3 Respiratory disorders.pptx
Chapter 3 Respiratory disorders.pptxChapter 3 Respiratory disorders.pptx
Chapter 3 Respiratory disorders.pptx
 
THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...
THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...
THE IMPACT OF E-LIBRARY ON THE PERFORMANCE OF STUDENTS AND FACULTY MEMBERS IN...
 
CV _ MASIBO_MINOS_CHELONGO-2015.
CV _ MASIBO_MINOS_CHELONGO-2015.CV _ MASIBO_MINOS_CHELONGO-2015.
CV _ MASIBO_MINOS_CHELONGO-2015.
 
A secure web based universal basic educational administrative
A secure web based universal basic educational administrativeA secure web based universal basic educational administrative
A secure web based universal basic educational administrative
 
A secure web based universal basic educational administrative
A secure web based universal basic educational administrativeA secure web based universal basic educational administrative
A secure web based universal basic educational administrative
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo GĂłmez Abajo
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

A Proposed GSM Biometric Attendance Management System for Ghana Education

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3421 A Proposed GSM Biometric Attendance Management System for Ghana Education Charles Antoh-Baffoe School of Technology, GIMPA Email : Charles.antoh-baffoe@gimpa.edu.gh -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- The purpose of this research is to implement interactive and reliable attendance management using GSM/GPRS signal to transfer and retrieve data from remote locations in Ghana tested with alert and management functionality on real time. It also discussed the technological approach in automating subject and attendance administration in the schools and also ascertained the business success with attendance management systems for Ghana education service. Rapid application development (RAD) software development methodology was deployed to build the Biometric Attendance System (BAS). The BAS was designed and implemented. The system provides users with an efficient way of generating reports and retrieving of attendance information of a teacher in specific districts. It supports unified access and management through a simple standard web browser interface. It is recommended that evaluation of the system be carried out in future works to ascertain the success of the system. Keywords - Biometric System, GSM, Education, Cellular System. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Oct 10, 2017 Date of Acceptance: Nov 04, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Organizations have become concerned with the issue of absenteeism in their various organizations. Employers across the UK have become significantly more concerned over the levels of sickness absence in their workforce (Bevan, 2003) as Ghana ranks first in teacher absenteeism in West Africa; reports from the World Bank and the United Nations International Children’s Emergency Fund (UNICEF) have revealed (http://www.dailyguideghana.com). The latter case was mentioned by Mr Alex Kyeremeh, a Deputy Minister of Education, who made this known at a stakeholders’ forum on education at Dormaa- Ahenkro, in the Brong Ahafo Region of Ghana (www.dailyguideghana.com, 2014). The Northern Network for Education Development (NNED) conducted a research to find the extent of absenteeism in public schools by surveying “30 schools sampled out of the lot in two of the three northern regions and found out that there was an average of 30 percent absenteeism. Among this percentage, 48 percent were caused by unpreventable factors such as pregnancy, malaria or lack of accommodation” (www.nnedghana.org). That means there is a large proportion unexplained. The Government has taken some measures to address this issue and has succeeded to some extent. “We carried out surprise visits at 11,594 schools at the basic levels and are happy to announce that teacher absenteeism in Ghana has declined from 27 percent to 11” (www.thebftonline.com, 2014). The Government has even further gone on to establish a committee to design modalities with the aim of achieving Zero Absenteeism in Ghana. “The Ghana Education Service (GES) was established as part of the Ministry of Education of Ghana under the Civil Service Law 327 and under the PNDC Law 1993 with the mandate to provide relevant education to all Ghanaians. It is responsible for instituting the national education curriculum, appointing and managing the work and issues of teachers and other educational workers. The Ghana Education Service (GES) is mandated among others to maintain high standards of education at the first and second cycle levels. To ensure the achievement of its mandate, GES employed its own workers who are categorized into teaching and non-teaching staff” (www.moe.gov.gh). The Director of GES, Mr Enoch Cobbinah accompanied the Minister of Education, Prof. Naana Jane Opoku-Agyemang to pay unannounced visits to the Dangbe West District of the Greater Accra Region and found many teachers and heads absent from their posts. It decided to sanction them as a measure to curb the act or its future occurrence (www. graphic.com.gh, 2014). In 2003, the Nkoranza District Directorate of the Ghana Education Service (GES) has established some measures to check absenteeism and malingering among students and teachers by residing district circuit supervisors close to the schools to establish more frequent checks on teachers and students alike. They also provided some bicycles to the teachers who lived far from the schools to enable commute quicker to the schools (www.modernghana.com, 2003). In 2014, Vice President of Ghana Mr. Kwesi Bekoe Amissah-Arthur voiced his displeasure among others at the issue absenteeism by teachers in public schools at the World Teachers Day Celebration in Cape Coast. He condemned the behavior as inexcusable and unacceptable (www.regional.citifmonline.com). The issue has been bothering all stakeholders within the country and can be has attracted views from governmental as well as non- governmental agencies/organizations. In government, views have been expressed from even the top hierarchy and this problem remains a grass-root problem. It is the teachers and other educational workers who have been indulging in these acts. It can be inferred even at this point that the current mechanisms and proposed or attempted solutions have not yielded the desired results and impact.
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3422 II. LITERATURE REVIEW Organizations have become concerned with the issue of absenteeism in their various organizations. Employers across the UK have become significantly more concerned over the levels of sickness absence in their workforce (Bevan, 2003) as Ghana ranks first in teacher absenteeism in West Africa; reports from the World Bank and the United Nations International Children’s Emergency Fund (UNICEF) have revealed (http://www.dailyguideghana.com). The latter case was mentioned by Mr Alex Kyeremeh, a Deputy Minister of Education, who made this known at a stakeholders’ forum on education at Dormaa- Ahenkro, in the Brong Ahafo Region of Ghana (www.dailyguideghana.com, 2014). The Northern Network for Education Development (NNED) conducted a research to find the extent of absenteeism in public schools by surveying “30 schools sampled out of the lot in two of the three northern regions and found out that there was an average of 30 percent absenteeism. Among this percentage, 48 percent were caused by unpreventable factors such as pregnancy, malaria or lack of accommodation” (www.nnedghana.org). That means there is a large proportion unexplained. The Government has taken some measures to address this issue and has succeeded to some extent. “We carried out surprise visits at 11,594 schools at the basic levels and are happy to announce that teacher absenteeism in Ghana has declined from 27 percent to 11” (www.thebftonline.com, 2014). The Government has even further gone on to establish a committee to design modalities with the aim of achieving Zero Absenteeism in Ghana. “The Ghana Education Service (GES) was established as part of the Ministry of Education of Ghana under the Civil Service Law 327 and under the PNDC Law 1993 with the mandate to provide relevant education to all Ghanaians. It is responsible for instituting the national education curriculum, appointing and managing the work and issues of teachers and other educational workers. The Ghana Education Service (GES) is mandated among others to maintain high standards of education at the first and second cycle levels. To ensure the achievement of its mandate, GES employed its own workers who are categorized into teaching and non-teaching staff” (www.moe.gov.gh). The Director of GES, Mr Enoch Cobbinah accompanied the Minister of Education, Prof. Naana Jane Opoku-Agyemang to pay unannounced visits to the Dangbe West District of the Greater Accra Region and found many teachers and heads absent from their posts. It decided to sanction them as a measure to curb the act or its future occurrence (www. graphic.com.gh, 2014). In 2003, the Nkoranza District Directorate of the Ghana Education Service (GES) has established some measures to check absenteeism and malingering among students and teachers by residing district circuit supervisors close to the schools to establish more frequent checks on teachers and students alike. They also provided some bicycles to the teachers who lived far from the schools to enable commute quicker to the schools (www.modernghana.com, 2003). In 2014, Vice President of Ghana Mr. Kwesi Bekoe Amissah-Arthur voiced his displeasure among others at the issue absenteeism by teachers in public schools at the World Teachers Day Celebration in Cape Coast. He condemned the behavior as inexcusable and unacceptable (www.regional.citifmonline.com). The issue has been bothering all stakeholders within the country and can be has attracted views from governmental as well as non- governmental agencies/organizations. In government, views have been expressed from even the top hierarchy and this problem remains a grass-root problem. It is the teachers and other educational workers who have been indulging in these acts. It can be inferred even at this point that the current mechanisms and proposed or attempted solutions have not yielded the desired results and impact. III. METHODOLOGY The biometric attendance was designed and developed with the Rapid Application Development (RAD) model. The RAD model would enable us to create this solution without the need to carry out prolonged planning activities since the specifications are well known. 3.1 Business Modeling Phase Business Modeling Phase seeks to understand the workflow as required under the project. It involves the studying of the attendance system as it currently exists with GES to understand how their mechanism operates by observing the workflows and interviewing of the relevant entities. It also includes the analysis of factors that are necessary for the smooth flow of information. 3.2 Data Modeling Phase The second phase to analyze the information gathered in the business modeling phase from a data point of view. Each flow is analyzed carefully with the objective of finding out what data is required, how it is used and how and where it flows to. The attributes that define the data objects are clearly defined as well as the establishment of relationships between the various data objects. 3.3 Process Modeling Phase The data objects model created in the Data Modeling phase are extended to show the processes that each object is processed on. These may include adding, retrieving, modifying or even deletion of data or parts of its attributes (www.tutorialspoint.com). 3.4 Application Generation Phase The fourth phase of the RAD system development model involves the conversion of the process model and data model into a solution. These include the coding of the software using established automation tools to create the application and database. It also involves the integration and configuration of the biometric devices. This prototype is then taken through the final step that involves testing and turnover 3.5 Testing and Turnover Phase Testing and Turnover Phase requires that a systematic and thorough search is done to. It is worth noting that, even though the previous phase where programming was done would have come along with some sort of unit testing, it is
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3423 still important to carry out this form of comprehensive testing. Figure 1: Rapid Application Development Model The RAD allows changing requirements to be considered. Iteration is quicker as there is drastic reduction in development time. It encourages the flow of feedback from the customer/client. Also, it accommodates integration of component and modules from the very beginning to solve the issues of unpredictability that might occur as a result of integration. RAD however requires highly skilled developers/designers. Its dependency on model is immense and it implies that careful care and expertise be taken to prepare this. Its lifecycle is such that it would require involvement as it scaled or evolves with time (www.tutorialspoint.com). Start Final DFDs Drafted DFDs Sequence Diagrams Drafted Class Diagrams Final Use Cases Initial Use Case Models and Scenarios Context Diagrams Observations Reports Interview Reports Final Software Prototype Database Entity Relationship Diagrams Attendance Management System Biometric device Application Interface Connected device Carry out interviews Final Class Diagrams Review Drafted Class Diagrams Draft Class Diagrams Review Initial Use Cases Draft Use Cases Draft Use Cases Review DFDs Create Context Diag. Draft DFDs Create Sequence Diag. Create Databases Create ER Diag Create ER Diag. Create ER Diag. Test software Connect Database to Application Write Codes Design Forms Design Forms Integrate with SMS systems Configure GSM Integrate with Application Observe Systems Timetable Load with basedata Installbiometric device Figure 2: Product Flow Diagram Fig. 2 offers a different approach to the planning of the project into distinguishable components that would allow easy identification and tracking. This approach is based on the model (RAD) chosen its management approach as well. It enables level categorization of products under each level with the aim of identifying the products that are to be delivered under each phase and stage. The items that are not broken down at any point in time are the low-level items of interest. BiometricAttendance ManagementSystem Specialistproducts Management products BusinessModel DataModel ProcessModel Application Testing Observationand interviewreports Classdiagrams UsecasemodelSequenceDiagrams ContextDiagram System requirements specifications E-Rdiagrams Database Webapplication Integratedsystems ConfiguredSMS Biometricdevice PrototypeUserManuals Figure 3: Product Breakdown Structure IV. THE PROPOSED SYSTEM The new systems proposed to introduce an automated teacher attendance management system that would serve as a real-time mechanism to deal with the issue of absenteeism. It affords some good opportunities that would add value to the attendance management process. Figure 4: Architecture of the Proposed System Fig. 4 presents a general overview of how the system is to work. Several biometric devices sited at various schools would be used by the teachers for recording their attendance to school at the stipulated time. These biometric devices would send attendance data in real time to the central server. The GES staff who reside in the district offices and the headquarters and are interested in these data as part of their work would have access to the stored data in different forms for use in other functions. The data generated would reach the server via a modem
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3424 that is attached to it. This modem would also have a SIM card in it to facilitate easy communication using the GSM network for which both SIMs are compatible. In an expanded view, all the sites that have the biometric devices would all use GSM as to communicate with the central server. 4.1.1 Key Features of the System and System Components  The biometric devices that have been chosen possess SIM card slots that ensures that they are compatible with mobile network technologies such as GSM, GPRS, and EDGE etc. This capability means that there would not be a need to acquire two or more separate devices for enabling connection.  The GSM network chosen offers relatively lower cost as compared to other. This is readily available as there are network providers who offer such services. There would be no need to create a dedicated network as the cost and time for this would be very large considering the wide geographical bounds.  The centralization of database would ensure that there would be no need to install databases or storage media at the various sites to store or retrieve data. When a user is to be authenticated, the GSM network would enable connection to the server and this also happens when attendance is being clocked.  In the current system it takes time for data to be prepared and even longer to reach to transform or reach its intended target. This new system would ensure that the data generated would be in real time.  The application that is to be used by the circuit supervisors and other administrative workers, who use the attendance management system, would be designed using web technologies. This means the users would require only a connection and basic web browser on their client machines to gain access.  Reports required by the various administrative workers would be pre-configured and would be available for use “at the click of a button”. This means all reports formats would be considered by during designing and development.  Unlike the current system that is mostly paper- based and unidirectional, this new system would incorporate a feedback mechanism to give feedback to the teachers at certain times.  The system would incorporate an access-rights mechanism for checking abuse or unauthorized use of the system. 4.1.2 Functional requirements of the new system The analyses of the current and new system based on the proposed architecture have helped in the identification of the following functional requirements:  The system should allow the administrator to add and manage teacher details. They should also be able to add and manage courses and the times they are supposed to be taught by the respective teachers. This would create a prepopulated list for use within the system.  The biometric device should enable one-time registration of teachers. This should be done with the database enabled. This would be done against the prepopulated data of teachers within the system.  The biometric device should be used by the teacher to clock attendance and have data generated and sent to the server in real time.  The biometric device should verify the individual who is attempting to clock in by checking for the essential elements within the centralized database. The response should be matched by the matcher and indicate successful/unsuccessful authentication to the user. A successful authentication would automatically indicate attendance clocked within the system database.  The database should maintain proper data on teachers from various schools within various districts within the country such that it can support easy searching and transformation.  The accompanying application should be such that every user would require a set of security login credentials to gain access.  The application should be preconfigured with formatted reports that would be generated upon minimal user interaction.  The feedback mechanism should send information to teachers when prompted as well send predefined feedback at specific periods. 4.1.3 Non-Functional Requirements of the New System In trying to assess what non-functional requirements this system holds we consider some work done by Kotonya and Sommerville (1998) who provide a three-item categorization of information systems. These are product requirements, organizational requirements and external requirements. They further go on to breakdown these three items into several sub items that even though granular are still generic and can be adapted for use in different information systems projects. For the purposes of this project, we only consider those that are essential and relevant.  Usability: The system should be streamlined in such a way as to rid of unwanted steps. This would ensure that very simple flows exist. The system should be user-friendly, self-intuitive and easy to remember.  Reliability: The system should produce output as expected and in a timely manner at an appreciable amount of time. It should not be compromised or open to manipulation by users.  Availability: The system should always be available to the user at any time and from anywhere.
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3425  Standards: The system should perform at acceptable levels of standard to be compared to any similar software and make it easy for evaluation of performance.  Safety: The biometric devices used for attendance clocking should be safe to use. They should be mounted at safe locations in the schools and contain components that would not cause any damage to any user or individual near it. The GSM communication should not interfere with any other communication setup.  Privacy: Data gathered and stored must be properly secured with appropriate access control policies in place to prevent unauthorized access or use. The communication medium should not give way to any interception of data at any point in time. User -StaffID -Last Name -First Name -Telephone -Role +Login() Admin +RegisterUser() +Enroll courses() +SetTimetable() +View Reports() Headmaster +View Reports() +Check Attendance CircuitSupervisor +Check Attendance() +Send SMS() +View Reports() Teacher -biometricdata +Capturebiodata() +Clock Attendance() Courses -CourseID -Course Name -Course date -Course Time +Add course () +Assign Timetable() Timetable -ID -Details +Create Timetable() +View Timetable() Report -Reportname +Generate report() +Printreport() Biometric data -StaffID -Biometricimage +Registerdetails() +Verify details() SMS -SMStitle -SMS message -Date -Time -Sender -Recipient +Prepare SMS() +Send SMS() Attendance -ID -Date -Time +Record Attendance() 1 * 1..* 1 * 1..* 1 * 1 1..* 1 1..* 1 1..* 1 1..* 1 1..* 1 1 1 1 1 * Figure 5: Class Diagram The class diagram shown in Fig. 5 views various users and artefacts as objects that possess set of attributes as well as operations that they perform or can be performed on them. The class diagram also shows the relationships between the various the various objects. The users who would use the web application all have similar attributes and thus have been generalized but their operations differ. The teacher as a user has additional attribute that make it differ from other users because of the biometric data that is captured in addition to the other attribute. The lower level of the diagram contains various objects of interest as seen within the application. These together with the user classes can be used as the building blocks for database tables as it relationships. Also, the operations contained within the classes coupled with the relationships shown can assist in the coding phase of the application development as well as the integration. Various Unified Modeling Language (UML) approaches have given us the opportunity to prepare designs as required by the business, data and data modelling phases of the system. These designs have all led to the development of a good application database as well as a good functioning application interface that is also functional. The technicalities that one would have considered to be sophisticated were made very clear using the widely accepted specification documents. The systematic manner of the documents went a long way to aid in the development and integration of the system. V. CONCLUSION AND FURTHER RESEARCH The objective of the GSM-based biometric attendance system was to create a highly reliable platform for both teachers and educational administrators in their attempt to track, monitor and record teacher attendance respectively. At the end the project has achieved the following objectives initially discussed and outline below:  Gathering of information and analyses of the current system to better understand its mechanisms and associated pros and cons.  Designing and developing a robust and centralized database that stores data regarding subject been taught as well as profiles of teachers.  Designing and developing a web application interface integrated with the database to allow supervisors have access to stored data created by teachers’ attendances, confirm attendances, print reports, send feedback to teachers etc. Gathering information from the various stakeholders took a little longer than estimated. The channels that were in place at the GES required that some high level of approval had to be given before the relevant people could offer assistance. Information gathered was always pointing to manual systems and forms of attendance management. Some artefacts were shown to give further clarity on the various explanations and insights given. The next objective was to design and develop a robust and centralized solution. This objective was broken down into two parts but from a developmental point-of-view this discussion has been merged into one. The system development model chosen was the Rapid Application Development (RAD) model. The model requires that very refined designs be made produced to speed up the actual development. The design of the system came up from the second (Data Modelling) and third (Process Modelling) phases of the RAD model. The designs involved the use of standard UML approaches to ensure that consistency is achieved. Diagrams such as the class diagram eased the consideration that went into the creation of the database while the use of use cases and sequence diagrams depicted the flow of the application design. 5.1 Challenges The system was not tested at other remote locations where GSM/GPRS has weak signal strength. It was tested at Akuapim south district where GSM/GPRS has strong signal strength. This limitation is due to lack of funds to travel to other areas within the country. The system can be viewed via a mobile browser, it is not responsive to varying screen sizes. The system is best viewed on 800 by 600 screen resolution. It is not adaptable to other screen resolutions. It was also difficult to get willing GES-
  • 6. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3426 enrolled teachers and other staff whose data could be used for use in this project. 5.2 Recommendations for Further Work The research has shown to hold very good prospect for the management of attendance of teachers employed by the GES. It uses could be adapted for other public as well as private institution as well. The availability of the system is very dependent on the strength and speed of the GSM network technology adopted. That infers that its use can be limited in this regard. As a recommendation, other forms of network connectivity that spans wide geographical areas should be researched into. The third point is to have a system that offers an adaptive or alternative form of biometric attendance clocking. There could be instances where someone may have injured the required finger or for some unfortunate reason may have lost it. This should not mean the person cannot clock attendance. Other forms of biometry should be explored to ensure that electronic attendance clocking is always available. The systems justification would be further enhanced if its use is not limited only to its primary objective of effectively managing attendance. It can be integrated with other systems such as payroll systems, appraisal systems, Learning Management Systems (LMS) or even Enterprise Resource Planning systems to provide data or enable functional use. REFERENCES 1. Bevan, S., 2003, Absence Management, The Work Foundation, retrieved from http://www.theworkfoundation.com 2. Chapman W. David (1994). Reducing teacher absenteeism and attrition: causes, consequences and responses. Paris, France: International Institute for Educational Planning, UNESCO. 3. Chaudhury Nazmul, Hammer Jeffrey, Kremer Michael, Muralidharan Karthik, and Rogers F. Halsey. (2005) Missing in Action: Teacher and Health Worker Absence in Developing Countries Revised JEP version. 4. Citi FM Online. (2014). VEEP clashes with teachers over absenteeism. Retrieved from http://www.regional.citifmonline.com 5. Clotfelter CT, Ladd HF, Vigdor JL (2009) Are teacher absences worth worrying about in the U.S.? CALDER Working Paper No. 24. Retrieved from www.caldercenter.org 6. Daily Guide. (2014).Ghana Tops Teacher Absenteeism in West Africa. Retrieved from http://www.dailyguideghana.com 7. Das, Jishnu, Stefan Dercon, James Habyarimana, and Pramila Krishnan. 2007. ÊșTeacher Shocks and Student Learning: Evidence from Zambia.Êș Journal of Human Resources, 42 4, pp. 820‐ 62. 8. Davenport, T.H., and Short, J.E. (1990) “The New Industrial Engineering: Information Technology and Business Process Redesign” In A study of the impact of information technology on business processes using discrete even simulation: a reprise. Department of Information Systems and Computing, Brunel University, Middlesex, United Kingdom. 9. Gaur Shweta, Shah V.A. and Thakker Manish. (2012). Biometric Recognition Techniques: A Review. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 1, Issue 4, ISSN 2278 – 8875. 10. Graphic Online. (2014). Minister commissions committee to tackle teacher absenteeism Retrieved from http://www. graphic.com.gh 11. Hammer, M., and Champy, J. (1993). “Reengineering the Corporation” In A study of the impact of information technology on business processes using discrete even simulation: a reprise. Department of Information Systems and Computing, Brunel University, Middlesex, United Kingdom. 12. International Journal of Science and Research (IJSR). ISSN (Online): 2319-7064 Volume 2 Issue 10. 13. Jain A. K., Bolle R., and Pankanti S., Biometrics: Personal Identification in Networked Society. 14. Josphineleela R. and Ramakrishnan M. (2012). An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique (IJCSIS). International Journal of Computer Science and Information Security, Vol. 10, No. 3. 15. Konsbruck Robert Lee. (2014). Impacts of Information Technology on Society in the new Century CH-1007 Lausanne-Vidy, Switzerland. P3. 16. Kotonya G. and Sommerville I., (1998). Processes and Techniques, Requirements Engineering – Wiley. 17. Kroeker, B. (2000). Changing Roles in Information Dissemination and Education in G. D. Garson Social Dimensions of Information Technology: Issues for the New Millennium. (pp.141 – 159) Hershey, PA: IDEA Group. 18. Malone, T.W., Crowston, K. (1994). “The Interdisciplinary Study of Coordination” In The Impact of Information and Communication Technology on Interorganizational Coordination: Guidelines from Theory by MariĂ«lle den Hengst and Henk G. Sol. (2001). Delft University of Technology, the Netherlands. 19. Maltoni Davide. (2003). Biometrics: Authentication and recognition, DEIS, University of Bologna, Italy. 20. Ministry of Education. About MOE. Retrieved from http://www.moe.gov.gh 21. Modern Ghana. (2003). Nkoranza GES adopts measures to check absenteeism among teachers. Retrieved from http://www.modernghana.com 22. Modern Ghana. (2014). Ghana Tops Teacher Absenteeism in West Africa. Retrieved from http://www.modernghana.com
  • 7. Int. J. Advanced Networking and Applications Volume: 09 Issue: 03 Pages: 3421-3427 (2017) ISSN: 0975-0290 3427 23. Mouly M. and Pautet M-B. (1992). The GSM system for Mobile Communication. 24. NITA. (2014). Mission Vision. Retrieved from http://www.nita.gov.gh/Mission-Vision 25. Northern Network for Education Development, Teacher Absenteeism. Retrieved from http://www.nnedghana.org 26. Painter, M.K., Fernades, R., Padmanaban, N., and Mayer, R.J. (1996). “A Methodology for Integrating Business Process and Information Infrastructure Models” In A study of the impact of information technology on business processes using discrete even simulation: a reprise. Department of Information Systems and Computing, Brunel University, Middlesex, United Kingdom. 27. Patel Rajan, Patel Nimisha, Gajjar Mona. (2012). Online Students’ Attendance Monitoring System in Classroom Using Radio Frequency Identification Technology: A Proposed System Framework, International Journal of Emerging Technology and Advanced Engineering Volume 2, Issue 2 28. Rajasekar L., Vivek S. (2012). Wireless Fingerprint Attendance System using ZigBee Technology International Journal of Power Control Signal and Computation (IJPCSC), Vol 3. No1. 29. Rogers F. Halsey and Vegas Emiliana. (2009). No More Cutting Class? Reducing Teacher Absence and Providing Incentives for Performance. The World Bank Development Research Group Human Development and Public Services Team Human Development Network Education Team. Policy Research Working Paper 4847 30. Sumhr.com. (2014). What is a Biometric Fingerprint Reader and RFID machine? Retrieved from http://www.sumhr.com 31. The Business Financial Times. (2014). Teacher absenteeism reduces to 11%. Retrieved from http://thebftonline.com 32. TutorialsPoint. SDLC – RAD Model. Retrieved from http://www.tutorialspoint.com 33. Venkateswarlu T. and Naresh K. An automatic frequency planning of GSM networks using evolutionary algorithms. International Journal of Engineering Research and Applications (IJERA). Vol. 1, Issue 3, ISSN: 2248-9622 34. Verma Pallavi and Gupta Namit. (2013). Fingerprint Based Student Attendance System Using GSM 35. Wiredu G. (). “User appropriation of mobile technologies: Motives, conditions and design properties”, Information Systems and Innovation Group, Department of Management, The London School of Economics and Political Science, London, UK. p24. 36. Boateng S. M. (2012). “The Role of Information and Communication Technologies in Ghana’s Rural Development”. University of Nebraska – Lincoln. 37. Frempong, G.K. and Atubra, W.H. (2001). “Liberalisation of TELECOMS: the Ghanaian experience”. Telecommunication Policy, 25, p. 197-210. 38. Cobbinah, J.R. (2003). “Enhancing strategic competitiveness in information and communication technology (ICT) Ghana Country Paper”. Telematics and Informatics, 20,p.1-9. 39. M. Zhang and Richard S. Wolff. (2004). “Using Multi‐ hop for Broadband Fixed Wireless Access in Rural Areas”, Wireless 2004, Calgary, CA. 40. Qiang C. Z. W. and Rossotto C. M. (2009). Information and Communications for Development: Extending Reach and Increasing impact. The World Bank, Washington DC. 41. Gartner.com. (2007). Gartner Says Number of Identity Theft Victims Has Increased More Than 50 Percent Since 2003. Retrieved from http://www.gartner.com/it/page.jsp?id=501912. 42. Shiboleth. (1995). An Introduction to Role-Based Access Control. Retrieved from http://csrc.nist.gov/rbac/NIST-ITL-RBAC- bulletin.html 43. Gutterman, B., Rahman S. Supelano J. Thies L. Yang Mai. (2009). “White Paper – ICT in Education for Development”. Global Alliance for ICT and Development. 44. Martey Alfred (2004). ICT in distance education in Ghana. Library High Tech News Vol. 21 Iss. 5, pp 16-18, University of Cape Coast.