Over the years the process of manual attendance has been carried out which is not only time consuming
but also provides erroneous result. Automated time and attendance monitoring system provides many
benefits to organizations. This reduces the need of pen and paper based manual attendance tracking
system. Following this thought, we have proposed a smart location based time and attendance tracking
system which is implemented on android mobile application on smartphone reducing the need of additional
biometric scanner device. The location of an organization has a specific location, which can be determine
by the GPS. Each employee’s location can be determined by the GPS using smartphone. This location is
defined as a key of time and attendance tracking in our paper.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
The document discusses a proposed smart attendance management system that integrates fingerprint biometric authentication with wireless connectivity. The system uses an Android mobile application to register users and record their attendance through fingerprint scans. It ensures employees are physically present at work by only allowing attendance checks when the mobile device is connected to the organization's wireless router. This prevents employees from falsely checking in without remaining on-site. The system aims to reduce costs compared to traditional fingerprint scanners while providing increased portability and convenience through the use of mobile phones and wireless technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
This document proposes an employee tracking and monitoring system using Android smartphones. It allows managers to monitor employee call logs, messages, browsing history, location via GPS, and data usage on a centralized server. If an employee leaves a specified area, an alert message is sent to the manager. The system calculates employee behavior - good, bad, average or loyal - using a k-means clustering algorithm based on unauthorized calls and data usage. It uses AES encryption to securely transmit data between devices over a WiFi network. The system aims to give managers better oversight of how employees use company-provided phones.
IRJET - Face Recognition Door Lock using IoTIRJET Journal
This document presents a face recognition door lock system using IoT. The system uses a Raspberry Pi connected to a camera to capture images of people at the door. When the doorbell is rung, the camera takes a picture and the image is checked against images stored in a database. If the image matches someone in the database, the door will open. If no match is found, the image is sent to an IoT website where the owner can log in from anywhere and decide whether to lock or unlock the door by looking at the image of the person. The system aims to provide security and convenience while minimizing human intervention. It discusses related work on face recognition algorithms, presents the system design using blocks diagrams and flowcharts,
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
IRJET - Automated Attendance System using Facial RecognitionIRJET Journal
This document describes an automated attendance system using facial recognition. The system uses the Haar-cascade algorithm with three classifiers (skin, mouth, eyes) implemented in Python's OpenCV library. It also uses PCA to maintain accuracy in facial detection. The system marks employee attendance in real-time by capturing images of employees entering and exiting through gates, without requiring employees to sign papers, use RFID cards, or biometrics. This makes the system more efficient than conventional methods. It provides accurate attendance records to help with performance monitoring and payroll processing.
IRJET - Organisation Automation Using Android Mobile ApplicationIRJET Journal
This document describes an office automation system that uses both hardware and software components. The hardware uses Arduino boards and sensors to control electrical appliances. The software is an Android mobile application that allows different users (CEO, manager, staff) to manage tasks, file sharing, attendance tracking, and appliance control. The system aims to improve productivity, data management, and replace human operators for repetitive or dangerous tasks through automation using an integrated mobile app and hardware solution.
Advancement in Android Authentication System Using Direct Significance ServiceIRJET Journal
This document describes a proposed advancement in the Android authentication system using a Direct Significance Service. The system would allow users to locate a smart phone's position and receive alerts based on time and location through an application installed on the smart phone. The application uses the smart phone's GPS and SMS/email services to periodically share the device's location with registered contacts. It notifies contacts if an unknown location is detected or if the wrong password is entered. The system aims to allow family members to track each other's locations through their smart phones for safety purposes.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
The document discusses a proposed smart attendance management system that integrates fingerprint biometric authentication with wireless connectivity. The system uses an Android mobile application to register users and record their attendance through fingerprint scans. It ensures employees are physically present at work by only allowing attendance checks when the mobile device is connected to the organization's wireless router. This prevents employees from falsely checking in without remaining on-site. The system aims to reduce costs compared to traditional fingerprint scanners while providing increased portability and convenience through the use of mobile phones and wireless technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
This document proposes an employee tracking and monitoring system using Android smartphones. It allows managers to monitor employee call logs, messages, browsing history, location via GPS, and data usage on a centralized server. If an employee leaves a specified area, an alert message is sent to the manager. The system calculates employee behavior - good, bad, average or loyal - using a k-means clustering algorithm based on unauthorized calls and data usage. It uses AES encryption to securely transmit data between devices over a WiFi network. The system aims to give managers better oversight of how employees use company-provided phones.
IRJET - Face Recognition Door Lock using IoTIRJET Journal
This document presents a face recognition door lock system using IoT. The system uses a Raspberry Pi connected to a camera to capture images of people at the door. When the doorbell is rung, the camera takes a picture and the image is checked against images stored in a database. If the image matches someone in the database, the door will open. If no match is found, the image is sent to an IoT website where the owner can log in from anywhere and decide whether to lock or unlock the door by looking at the image of the person. The system aims to provide security and convenience while minimizing human intervention. It discusses related work on face recognition algorithms, presents the system design using blocks diagrams and flowcharts,
This document proposes a cloud-based system to remotely monitor vital health statistics using Internet of Things (IoT). The system would allow children living abroad to monitor parents' health statistics. IoT devices like thermometers and blood pressure monitors would send readings to a smartphone app. The app would send anonymized data like user ID, device ID, and readings to a cloud database. Authorized users could access the aggregate data on a web portal. The system would also send reminders to users and monitors to ensure regular health checks. The goal is to help people remotely monitor loved ones' health with consistency and reliability despite long distances.
IRJET - Automated Attendance System using Facial RecognitionIRJET Journal
This document describes an automated attendance system using facial recognition. The system uses the Haar-cascade algorithm with three classifiers (skin, mouth, eyes) implemented in Python's OpenCV library. It also uses PCA to maintain accuracy in facial detection. The system marks employee attendance in real-time by capturing images of employees entering and exiting through gates, without requiring employees to sign papers, use RFID cards, or biometrics. This makes the system more efficient than conventional methods. It provides accurate attendance records to help with performance monitoring and payroll processing.
IRJET - Organisation Automation Using Android Mobile ApplicationIRJET Journal
This document describes an office automation system that uses both hardware and software components. The hardware uses Arduino boards and sensors to control electrical appliances. The software is an Android mobile application that allows different users (CEO, manager, staff) to manage tasks, file sharing, attendance tracking, and appliance control. The system aims to improve productivity, data management, and replace human operators for repetitive or dangerous tasks through automation using an integrated mobile app and hardware solution.
Advancement in Android Authentication System Using Direct Significance ServiceIRJET Journal
This document describes a proposed advancement in the Android authentication system using a Direct Significance Service. The system would allow users to locate a smart phone's position and receive alerts based on time and location through an application installed on the smart phone. The application uses the smart phone's GPS and SMS/email services to periodically share the device's location with registered contacts. It notifies contacts if an unknown location is detected or if the wrong password is entered. The system aims to allow family members to track each other's locations through their smart phones for safety purposes.
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
This document proposes a proximity detection warning system using ray casting and pathfinding algorithms. The system would detect obstacles in an environment beforehand using ray casting to calculate distances between objects. It would then find an optimal shortest path for a user to navigate safely using the A* pathfinding algorithm. The system architecture involves object detection with ray casting, data preprocessing of threats, continuously tracking objects, and calculating a safe route using A*. The goal is to allow autonomous objects like drones to traverse environments without collisions.
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET Journal
This document summarizes a research paper on developing a biometric e-license system using fingerprints for driver identification and vehicle verification. The system aims to digitize driver's licenses and vehicle documents so that individuals do not need to carry physical documents. It involves developing Android and web applications to extract fingerprint minutiae and match them against a database to retrieve a person's driving records and vehicle details. The system architecture, hardware requirements, algorithm used and benefits of increasing efficiency and reducing documentation are discussed in less than 3 sentences.
This document proposes an online voting system for India that uses Aadhaar ID and fingerprint authentication for security. Voters would log in using their Aadhaar number and have their fingerprint scanned and matched to the database. This would allow voters to cast their votes remotely from anywhere in the country in a secure manner. The system aims to improve on existing electronic and paper-based voting methods by making the process more convenient, flexible, and increasing voter turnout by reducing violence. It also outlines the methodology, which involves minutiae-based fingerprint extraction and matching algorithms to authenticate voters against the Aadhaar database.
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
The project based on mobile application which functions on an Android operating system. The objective of this which
enable the user to locate the mobile phone in a silent mode to General mode when it is misplaced as well as if it is lost and wipe the
data from the device. To create an account the user needs to provide his /her mobile number, a password and 4 trustworthy numbers
this completes the registration process. The application, which is still in a deactivation mode, will operate only when the phone is
misplaced and the user sends the set password/ pass code from one of the 4 trustworthy numbers to one’s own mobile number. This
will change the profile of the misplaced phone i.e. switch it from the silent mode to the sound mode. It will also send an
acknowledgement to the trustworthy number from which the user has sent the message. Furthermore, it will also provide the location
with and also if mobile is lost then we can take back up from another mobile by using same application, we can also wipe the data
remotely by sending the message.
This paper helps us to identify the precision of the
forgery article using Machine Learning Algorithm. Here the
documentation is separated into trail data file and instruct
data file and the trail data file is separated into groups of
similar details. Trail data file islater paired with these groups
and precision is found using machine learning algorithm. It
helps in knowing whether a given article is forgery or real.
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
The document describes a method for fish recognition and detection using deep learning and the R-CNN algorithm. A raspberry pi camera is used to capture underwater images of fish as input datasets. These images are preprocessed using techniques like resizing and background removal. The preprocessed datasets are then trained using the R-CNN deep learning model. This trained model can detect and recognize fish in the images with 85% accuracy. The detected results are stored in an IoT cloud for further use. The proposed method provides high accuracy for fish detection with minimal human intervention.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
PROPOSED SYSTEM FOR MID-AIR HOLOGRAPHY PROJECTION USING CONVERSION OF 2D TO 3...IAEME Publication
Holographic Projections is one of the world’s top trending technologies. As the technology has graphical interaction, it is quite intriguing. Due to the multifaceted nature, multinational corporations are using this technology to a wide extent for their various purposes. The primary advantage of the technology is that the computer vision is constantly evolving and it has made possible to view content in 3D. The technology has lot of scope to evolve such that it can be made feasible to the common people. The sole purpose of interaction with 3D holographic projection is to bring life to a virtual image in 3D world.
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
Visualisation application based on Wonderware InTouch is presented in this article. This software is an engineering tool created for visualisation and control of industrial processes, meeting all guidelines of SCADA systems (Supervisory Control and Data Acquisition) and HMI (Human Machine Interface). It is also a part of Wonderware System Platform. This platform is a set of services and applications using ArchestrA technology. The authors showed the options of technical solutions in creating visualisation applications and supervision and control of large and complex control objects.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
1) The document describes a smart security and service android application for apartment complexes that allows house owners, guards, and administrators to manage visitors and service requests.
2) The application allows guards to capture photos of visitors and send requests to house owners for approval. House owners can approve or reject visitors and make service requests to administrators.
3) Administrators have access to house owner, visitor, and service request details to coordinate responses. The application aims to automate security management and service coordination that was previously done manually.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multilevel authentication using gps and otp techniqueseSAT Journals
Abstract Regression Testing is type of testing which is used to cut off the directly price associated with testing of different modules. Generally regression testing performs on test cases so that the resource utilization should be very low. Test cases in it are challenging task to achieve and suitable test cases for regression testing are difficult to judge and process. Optimization of various testing processes is done by optimization algorithms such as Genetic and Ant colony which usually provide solution to the good regression testing. Still these algorithms lack of some features which are required for better optimization of test cases in regression testing. The regression testing is the most expensive phase of the software testing, regression testing reduction eliminates the redundant test cases in the regression testing suite and saves the cost of the regression testing. In our proposed work, we will focus on optimization of regression testing with multi-objective genetic algorithm which will cover parameters like simplicity and complexity for test cases for regression testing. The complexity and simplicity for test cases will be judged and according to a common fitness function threshold we will proceed with optimization of the regression testing phases. Finally the paper evaluates the basic genetic algorithm for optimizing the test cases based on execution time; implement the multi-objective genetic algorithm with simplicity and complexity of the test cases along with execution time for test case prioritization for regression testing. Index Terms: Genetic Algorithm, Regression Testing Reduction, Test Cases, and Fitness Function etc…
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
This document presents a proposed mobile application-based attendance system for educational institutes using speech recognition. The current paper-based manual attendance marking system is prone to errors. The proposed system allows teachers to take attendance using a mobile app that converts student speech responses to text using Android speech libraries. Attendance records can then be uploaded to a server for monitoring. The system provides privileges for students, faculty, heads of departments and administrators. It aims to provide an accurate, automated alternative to traditional attendance systems and remove issues like impersonation.
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
The document presents a transparent developmental biometric-based system to protect user reauthentication using smartphones. It proposes a system called Safeguard that uses on-screen finger movements like sliding dynamics and pressure intensity as behavioral biometrics for accurate and efficient user verification. Safeguard first implements various machine learning approaches and selects support vector machine due to its high accuracy. It analyzes Safeguard's robustness against attacks and validates its efficacy through implementation on off-the-shelf smartphones with practical evaluation under different scenarios.
Employee Monitoring And Management System Using GPS And AndroidIRJET Journal
This document describes a proposed employee monitoring system using Android phones and GPS. The system would allow managers to track employee locations, call logs, SMS messages, and battery levels using a centralized server and admin/employee apps. It is intended to help managers monitor employee behavior and ensure work phones are not being misused. The proposed system architecture includes an employee app that collects phone usage data and sends it to the centralized server via GPS and network connectivity. A manager app would allow viewing this data to track employee locations and usage over time. The system is designed to promote organizational growth by helping managers oversee employee conduct and work phone utilization.
IRJET - Android Application Service Call Management SystemIRJET Journal
This document describes an Android application called the Service Call Management System. The application aims to digitize and streamline the process of managing customer service calls. It allows customers to register issues, technicians to manage assigned, pending, and complete calls, and administrators to oversee the workflow. The application was developed using Android Studio and connects to PostgreSQL and SQLite databases. It features like digital signatures, location tracking, automatic SMS/email, and report generation. The goal is to improve efficiency by handling all call data and updates digitally from the customer site. Diagrams show the user interfaces for customers, technicians, and administrators to access their dashboards and manage service calls through the application.
Implementation of Automatic Attendance Management System Using Harcascade and...IRJET Journal
This document proposes an automatic attendance management system using facial recognition algorithms. It aims to reduce human error and resources required for manual attendance recording. The system uses a camera to capture faces at the entrance and matches them to employee photos stored in a database using Haar cascade detection and local binary pattern recognition. If a match is found, the employee is marked present and their attendance updated in real time to an Excel sheet for administrators to view. The system is intended to help organizations more efficiently track attendance compared to traditional paper-based methods.
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
This document discusses offline context aware computing for providing user-specific results on mobile devices. It defines context awareness and describes how offline context awareness can provide personalized results without internet by analyzing a user's local data, like call logs and app usage. The key aspects covered are:
1. It proposes an architecture for offline context aware applications consisting of four modules: an offline context engine, data collector, reminder database, and user interface.
2. It discusses challenges of offline context awareness like increased processing overhead, potential reduction in accuracy, and impact on battery life.
3. It provides examples of current mobile apps that use context awareness and discusses how offline context awareness can solve privacy and availability issues of internet-based approaches
This document describes a wireless fingerprint attendance system that was designed to automatically record student attendance using fingerprint identification. The system uses a fingerprint sensor module connected to a computer via a Zigbee wireless network. Students register their fingerprints initially. When attending a lecture, they place their finger on the sensor to be identified and have their attendance marked electronically and automatically. The system aims to eliminate the disadvantages of traditional paper-based attendance tracking systems. It provides a low-cost and efficient automatic solution for recording attendance.
Attendance System using Face RecognitionIRJET Journal
This document describes a proposed attendance system that uses face recognition technology. It begins with an introduction to traditional attendance methods and their limitations. It then discusses the proposed system, which would use face detection and recognition algorithms to automatically mark student attendance from webcam images. Specifically, it would use the Haar cascade algorithm for face detection and KNN (k-nearest neighbors) for face recognition. The document outlines the system design, including an enrollment process to store student face data and an attendance marking process to recognize students in real-time. It suggests this system could automate attendance in a more secure, reliable and time-efficient way compared to traditional methods.
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
This document proposes a proximity detection warning system using ray casting and pathfinding algorithms. The system would detect obstacles in an environment beforehand using ray casting to calculate distances between objects. It would then find an optimal shortest path for a user to navigate safely using the A* pathfinding algorithm. The system architecture involves object detection with ray casting, data preprocessing of threats, continuously tracking objects, and calculating a safe route using A*. The goal is to allow autonomous objects like drones to traverse environments without collisions.
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET Journal
This document summarizes a research paper on developing a biometric e-license system using fingerprints for driver identification and vehicle verification. The system aims to digitize driver's licenses and vehicle documents so that individuals do not need to carry physical documents. It involves developing Android and web applications to extract fingerprint minutiae and match them against a database to retrieve a person's driving records and vehicle details. The system architecture, hardware requirements, algorithm used and benefits of increasing efficiency and reducing documentation are discussed in less than 3 sentences.
This document proposes an online voting system for India that uses Aadhaar ID and fingerprint authentication for security. Voters would log in using their Aadhaar number and have their fingerprint scanned and matched to the database. This would allow voters to cast their votes remotely from anywhere in the country in a secure manner. The system aims to improve on existing electronic and paper-based voting methods by making the process more convenient, flexible, and increasing voter turnout by reducing violence. It also outlines the methodology, which involves minutiae-based fingerprint extraction and matching algorithms to authenticate voters against the Aadhaar database.
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
The project based on mobile application which functions on an Android operating system. The objective of this which
enable the user to locate the mobile phone in a silent mode to General mode when it is misplaced as well as if it is lost and wipe the
data from the device. To create an account the user needs to provide his /her mobile number, a password and 4 trustworthy numbers
this completes the registration process. The application, which is still in a deactivation mode, will operate only when the phone is
misplaced and the user sends the set password/ pass code from one of the 4 trustworthy numbers to one’s own mobile number. This
will change the profile of the misplaced phone i.e. switch it from the silent mode to the sound mode. It will also send an
acknowledgement to the trustworthy number from which the user has sent the message. Furthermore, it will also provide the location
with and also if mobile is lost then we can take back up from another mobile by using same application, we can also wipe the data
remotely by sending the message.
This paper helps us to identify the precision of the
forgery article using Machine Learning Algorithm. Here the
documentation is separated into trail data file and instruct
data file and the trail data file is separated into groups of
similar details. Trail data file islater paired with these groups
and precision is found using machine learning algorithm. It
helps in knowing whether a given article is forgery or real.
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
The document describes a method for fish recognition and detection using deep learning and the R-CNN algorithm. A raspberry pi camera is used to capture underwater images of fish as input datasets. These images are preprocessed using techniques like resizing and background removal. The preprocessed datasets are then trained using the R-CNN deep learning model. This trained model can detect and recognize fish in the images with 85% accuracy. The detected results are stored in an IoT cloud for further use. The proposed method provides high accuracy for fish detection with minimal human intervention.
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
PROPOSED SYSTEM FOR MID-AIR HOLOGRAPHY PROJECTION USING CONVERSION OF 2D TO 3...IAEME Publication
Holographic Projections is one of the world’s top trending technologies. As the technology has graphical interaction, it is quite intriguing. Due to the multifaceted nature, multinational corporations are using this technology to a wide extent for their various purposes. The primary advantage of the technology is that the computer vision is constantly evolving and it has made possible to view content in 3D. The technology has lot of scope to evolve such that it can be made feasible to the common people. The sole purpose of interaction with 3D holographic projection is to bring life to a virtual image in 3D world.
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
Visualisation application based on Wonderware InTouch is presented in this article. This software is an engineering tool created for visualisation and control of industrial processes, meeting all guidelines of SCADA systems (Supervisory Control and Data Acquisition) and HMI (Human Machine Interface). It is also a part of Wonderware System Platform. This platform is a set of services and applications using ArchestrA technology. The authors showed the options of technical solutions in creating visualisation applications and supervision and control of large and complex control objects.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
1) The document describes a smart security and service android application for apartment complexes that allows house owners, guards, and administrators to manage visitors and service requests.
2) The application allows guards to capture photos of visitors and send requests to house owners for approval. House owners can approve or reject visitors and make service requests to administrators.
3) Administrators have access to house owner, visitor, and service request details to coordinate responses. The application aims to automate security management and service coordination that was previously done manually.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multilevel authentication using gps and otp techniqueseSAT Journals
Abstract Regression Testing is type of testing which is used to cut off the directly price associated with testing of different modules. Generally regression testing performs on test cases so that the resource utilization should be very low. Test cases in it are challenging task to achieve and suitable test cases for regression testing are difficult to judge and process. Optimization of various testing processes is done by optimization algorithms such as Genetic and Ant colony which usually provide solution to the good regression testing. Still these algorithms lack of some features which are required for better optimization of test cases in regression testing. The regression testing is the most expensive phase of the software testing, regression testing reduction eliminates the redundant test cases in the regression testing suite and saves the cost of the regression testing. In our proposed work, we will focus on optimization of regression testing with multi-objective genetic algorithm which will cover parameters like simplicity and complexity for test cases for regression testing. The complexity and simplicity for test cases will be judged and according to a common fitness function threshold we will proceed with optimization of the regression testing phases. Finally the paper evaluates the basic genetic algorithm for optimizing the test cases based on execution time; implement the multi-objective genetic algorithm with simplicity and complexity of the test cases along with execution time for test case prioritization for regression testing. Index Terms: Genetic Algorithm, Regression Testing Reduction, Test Cases, and Fitness Function etc…
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
This document presents a proposed mobile application-based attendance system for educational institutes using speech recognition. The current paper-based manual attendance marking system is prone to errors. The proposed system allows teachers to take attendance using a mobile app that converts student speech responses to text using Android speech libraries. Attendance records can then be uploaded to a server for monitoring. The system provides privileges for students, faculty, heads of departments and administrators. It aims to provide an accurate, automated alternative to traditional attendance systems and remove issues like impersonation.
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
The document presents a transparent developmental biometric-based system to protect user reauthentication using smartphones. It proposes a system called Safeguard that uses on-screen finger movements like sliding dynamics and pressure intensity as behavioral biometrics for accurate and efficient user verification. Safeguard first implements various machine learning approaches and selects support vector machine due to its high accuracy. It analyzes Safeguard's robustness against attacks and validates its efficacy through implementation on off-the-shelf smartphones with practical evaluation under different scenarios.
Employee Monitoring And Management System Using GPS And AndroidIRJET Journal
This document describes a proposed employee monitoring system using Android phones and GPS. The system would allow managers to track employee locations, call logs, SMS messages, and battery levels using a centralized server and admin/employee apps. It is intended to help managers monitor employee behavior and ensure work phones are not being misused. The proposed system architecture includes an employee app that collects phone usage data and sends it to the centralized server via GPS and network connectivity. A manager app would allow viewing this data to track employee locations and usage over time. The system is designed to promote organizational growth by helping managers oversee employee conduct and work phone utilization.
IRJET - Android Application Service Call Management SystemIRJET Journal
This document describes an Android application called the Service Call Management System. The application aims to digitize and streamline the process of managing customer service calls. It allows customers to register issues, technicians to manage assigned, pending, and complete calls, and administrators to oversee the workflow. The application was developed using Android Studio and connects to PostgreSQL and SQLite databases. It features like digital signatures, location tracking, automatic SMS/email, and report generation. The goal is to improve efficiency by handling all call data and updates digitally from the customer site. Diagrams show the user interfaces for customers, technicians, and administrators to access their dashboards and manage service calls through the application.
Implementation of Automatic Attendance Management System Using Harcascade and...IRJET Journal
This document proposes an automatic attendance management system using facial recognition algorithms. It aims to reduce human error and resources required for manual attendance recording. The system uses a camera to capture faces at the entrance and matches them to employee photos stored in a database using Haar cascade detection and local binary pattern recognition. If a match is found, the employee is marked present and their attendance updated in real time to an Excel sheet for administrators to view. The system is intended to help organizations more efficiently track attendance compared to traditional paper-based methods.
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
This document discusses offline context aware computing for providing user-specific results on mobile devices. It defines context awareness and describes how offline context awareness can provide personalized results without internet by analyzing a user's local data, like call logs and app usage. The key aspects covered are:
1. It proposes an architecture for offline context aware applications consisting of four modules: an offline context engine, data collector, reminder database, and user interface.
2. It discusses challenges of offline context awareness like increased processing overhead, potential reduction in accuracy, and impact on battery life.
3. It provides examples of current mobile apps that use context awareness and discusses how offline context awareness can solve privacy and availability issues of internet-based approaches
This document describes a wireless fingerprint attendance system that was designed to automatically record student attendance using fingerprint identification. The system uses a fingerprint sensor module connected to a computer via a Zigbee wireless network. Students register their fingerprints initially. When attending a lecture, they place their finger on the sensor to be identified and have their attendance marked electronically and automatically. The system aims to eliminate the disadvantages of traditional paper-based attendance tracking systems. It provides a low-cost and efficient automatic solution for recording attendance.
Attendance System using Face RecognitionIRJET Journal
This document describes a proposed attendance system that uses face recognition technology. It begins with an introduction to traditional attendance methods and their limitations. It then discusses the proposed system, which would use face detection and recognition algorithms to automatically mark student attendance from webcam images. Specifically, it would use the Haar cascade algorithm for face detection and KNN (k-nearest neighbors) for face recognition. The document outlines the system design, including an enrollment process to store student face data and an attendance marking process to recognize students in real-time. It suggests this system could automate attendance in a more secure, reliable and time-efficient way compared to traditional methods.
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...IRJET Journal
This document proposes an advanced attendance system using Android smartphones, biometric fingerprint authentication, and wireless networks.
It summarizes the limitations of existing manual and biometric-only systems, then describes a new system where the entire workplace functions as a WiFi hotspot. Employees must connect their Android smartphones to register attendance, and the system tracks how long they remain connected to determine time spent at the workplace. Fingerprint authentication is also used to ensure individual identity.
The system aims to more accurately track employee presence compared to existing solutions, by requiring both biometric login and wireless connection to the workplace network. It could benefit organizations by reducing attendance fraud while streamlining the process.
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMAM Publications,India
The project work is concerned with the implementation of biometric fingerprint authentication system which is an automated method of verifying a match between two human fingerprints for validating identity. The modern computer security is a battle between high security and low friction. Developers want users to use unique, complicated passwords for their apps to increase security. Employee Automation System is designed to ensure that the organization is equipped with the right level of human resource tracking for each separate department of the organization. The main feature of Employee Automation System is time tracking for employees. The system is implemented based on biometric fingerprint features that identifies certain or specific employee. The system can be accessible from remote network. The developed system also includes the employee fingerprint verification, employee attendance, employee tracking, employee leave, and salary payment and promotion modules. The operational activities of the system are accessed or controlled by three users, like Admin, Operator and Employee. The admin can access all the features, whereas the operator panel is designed to run the software in office time and takes fingerprint attendance. The employee panel is accessible by employee that shows profile information, last fingerprint attendance access, leaving/absent status of that month. The system is designed with client-server model and software methodology.
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
Human resource management requires good documentation and good data processing. In workspaces such as offices and factories, employee salaries are determined by calculating attendance at each hour of work. Tracking and collecting attendance data for a large number of employees is a difficult thing to do. We need a secure system to facilitate the process of collecting and tracking presence data. We propose an attendance system that uses random quick response code (QR-codes) as one time password (OTP) to improve security. Employees are required to scan the QR-code within ten seconds before it is changed and randomized each time. The proposed attendance system facilitates data collection using employees’ smartphones and Mac-Address as unique identification numbers. The system is able to track employees’ arrival and departure times. We have implemented the system at the local university to collect lecturer attendance data then analyze its security and statistic in all scanning activities. The average time needed by a user to authenticate their presence in the system is 25.8877 seconds. The steps needed to sign in and out from the system are fewer than other previous researches. Those findings tell us that the approach is straightforward and more uncomplicated than other proposed methods. We conclude that randomized QR-code scanning is a relevant scheme to be applied in a secure attendance system.
This document contains summaries of 26 different projects related to various domains including networking, image processing, healthcare, education, and more. The projects cover a range of modules and functionalities like user registration, file uploading/downloading, password authentication, device control, and more. The technologies used include Java, J2EE, SQL, and various other tools and platforms.
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...IRJET Journal
This document describes a proposed Internet of Things (IoT)-based attendance tracking system that uses fingerprint recognition. The system would use a fingerprint sensor connected to an Arduino board to collect attendance data via fingerprints. The Arduino would send the data via an IoT module to a cloud-based database for secure storage and remote access. A web interface would allow teachers and parents to view attendance records in real-time from any location. The system aims to provide an accurate, convenient and secure way to track attendance digitally while eliminating the need for manual records.
IRJET- Queue Control System using AndroidIRJET Journal
This document describes a queue control system using Android that aims to help people save time spent waiting in queues. The system generates unique token numbers for users and allows them to check their queue status and estimated wait time remotely using a smartphone app. It consists of client and backend database components. The client app allows users to register, get tokens for various services, and check their token status and waiting time. Shop owners can also log in to view the queue and update statuses. The system is designed to reduce the time users spend physically waiting in queues by keeping them informed of their position and wait remotely through the app. It was tested successfully and aims to replace traditional queue systems with a more convenient mobile-based management system.
IRJET- Human Activity Recognition using Smartphone SensorsIRJET Journal
1. The document describes a human activity recognition system developed by researchers that uses smartphone sensors to recognize activities like walking, running, cycling and still.
2. The system was developed as an Android application using machine learning and connects to a database through XAMP server to display the accuracy of recognized user activities.
3. The application collects sensor data from the phone's accelerometer, gyroscope and other sensors to recognize activities without needing additional wearable devices. It aims to improve the accuracy of activity recognition compared to other systems.
Fingerprint Alert System A Solution for Effective Management Systemijtsrd
This document gives a write up about the necessity of a device, one which is the Management System of employees. Nowadays, maintaining punctuality has become a tedious job for employees. We know that the presence of an employee in an office is collected from the fingerprint or biometric system, as per the technical reviews we are clear that it is a time bound machine.. A biometric device is a security identification and authentication device. Such devices use automated methods verifying or recognising the identity of a living person based on a physiological behavioral characteristic. These characteristics include fingerprints, or facial images, iris and voice recognition. In this report we are introducing a solution for this problem, a Fingerprint Alert System. Rafi. P | Thoukheer Ibnu Ali Ashraf. A "Fingerprint Alert System: A Solution for Effective Management System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52414.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/52414/fingerprint-alert-system-a-solution-for-effective-management-system/rafi-p
Smart Surveillance System through Computer VisionIRJET Journal
1. The document describes a smart surveillance system that uses computer vision techniques like object detection, face recognition, and object tracking for security purposes in homes and offices.
2. The system is able to detect objects, track their movement, recognize faces and compare them to a database, and send alerts via SMS if an unknown person is detected.
3. The system was developed using Python with libraries like OpenCV, NumPy, and Twilio for features like real-time object detection using YOLO, face recognition, object tracking, and alert notifications.
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET Journal
This document presents an efficient automation framework for testing intelligent transportation system (ITS) solutions using Selenium. It discusses creating a Selenium framework to automate test cases on ITS web applications. The framework aims to provide maintainability, productivity and easier result analysis. It proposes a data-driven framework using Selenium to test the user management module of an ITS web application. The implementation details creating test data sheets, storing test data in variables, executing test cases, and writing results back to output files are discussed. Algorithms for file handling, providing test data from Excel sheets are presented. The framework automates validation, functional, integration and penetration testing of the ITS web application in an efficient and reusable manner.
Employee record for admin application using android smartphoneIRJET Journal
This document describes an employee monitoring system that uses Android smartphones. The system allows managers to monitor employee phone use, including calls, messages, location via GPS. It stores call logs, messages, and location updates on a centralized server. Managers can log into the server to view employee phone activity details. The system is designed to help managers screen employees and avoid misuse of company phones. It uses Android phones for employees and sends alerts to managers via SMS. The literature review discusses previous research on similar employee monitoring systems using Android phones and GPS tracking of employees.
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
This document summarizes a research project that aims to display smart phone data like call logs, battery status, and SMS information on a desktop computer using Firebase. The project involves developing an Android application to collect device data and send it to a Firebase database. A web application is then created to retrieve the stored data from Firebase and display it on a desktop, allowing users to view their smart phone information from anywhere. The system is designed to address limitations of companies restricting smart phone use at work, enabling users to still access important phone updates from their computer. Firebase is used as the database for its low cost and ability to store mobile data.
Android Application For Decentralized Family LocatorIRJET Journal
This document describes a proposed decentralized Android application for tracking family members' locations in real-time without a central server. The application would use blockchain technology and GPS to allow family members to view each other's locations on a map and send messages. It aims to address privacy and security issues with centralized family locator apps by storing data across a distributed network rather than a single server. The proposed application's design includes user registration and account creation, joining location sharing circles, and an activity diagram to illustrate user interactions and location updating. It also discusses testing the application through unit, integration, system, black-box and white-box methods.
Similar to A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION (20)
The technology uses reclaimed CO₂ as the dyeing medium in a closed loop process. When pressurized, CO₂ becomes supercritical (SC-CO₂). In this state CO₂ has a very high solvent power, allowing the dye to dissolve easily.
Current Ms word generated power point presentation covers major details about the micronuclei test. It's significance and assays to conduct it. It is used to detect the micronuclei formation inside the cells of nearly every multicellular organism. It's formation takes place during chromosomal sepration at metaphase.
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...Sérgio Sacani
Context. With a mass exceeding several 104 M⊙ and a rich and dense population of massive stars, supermassive young star clusters
represent the most massive star-forming environment that is dominated by the feedback from massive stars and gravitational interactions
among stars.
Aims. In this paper we present the Extended Westerlund 1 and 2 Open Clusters Survey (EWOCS) project, which aims to investigate
the influence of the starburst environment on the formation of stars and planets, and on the evolution of both low and high mass stars.
The primary targets of this project are Westerlund 1 and 2, the closest supermassive star clusters to the Sun.
Methods. The project is based primarily on recent observations conducted with the Chandra and JWST observatories. Specifically,
the Chandra survey of Westerlund 1 consists of 36 new ACIS-I observations, nearly co-pointed, for a total exposure time of 1 Msec.
Additionally, we included 8 archival Chandra/ACIS-S observations. This paper presents the resulting catalog of X-ray sources within
and around Westerlund 1. Sources were detected by combining various existing methods, and photon extraction and source validation
were carried out using the ACIS-Extract software.
Results. The EWOCS X-ray catalog comprises 5963 validated sources out of the 9420 initially provided to ACIS-Extract, reaching a
photon flux threshold of approximately 2 × 10−8 photons cm−2
s
−1
. The X-ray sources exhibit a highly concentrated spatial distribution,
with 1075 sources located within the central 1 arcmin. We have successfully detected X-ray emissions from 126 out of the 166 known
massive stars of the cluster, and we have collected over 71 000 photons from the magnetar CXO J164710.20-455217.
When I was asked to give a companion lecture in support of ‘The Philosophy of Science’ (https://shorturl.at/4pUXz) I decided not to walk through the detail of the many methodologies in order of use. Instead, I chose to employ a long standing, and ongoing, scientific development as an exemplar. And so, I chose the ever evolving story of Thermodynamics as a scientific investigation at its best.
Conducted over a period of >200 years, Thermodynamics R&D, and application, benefitted from the highest levels of professionalism, collaboration, and technical thoroughness. New layers of application, methodology, and practice were made possible by the progressive advance of technology. In turn, this has seen measurement and modelling accuracy continually improved at a micro and macro level.
Perhaps most importantly, Thermodynamics rapidly became a primary tool in the advance of applied science/engineering/technology, spanning micro-tech, to aerospace and cosmology. I can think of no better a story to illustrate the breadth of scientific methodologies and applications at their best.
Or: Beyond linear.
Abstract: Equivariant neural networks are neural networks that incorporate symmetries. The nonlinear activation functions in these networks result in interesting nonlinear equivariant maps between simple representations, and motivate the key player of this talk: piecewise linear representation theory.
Disclaimer: No one is perfect, so please mind that there might be mistakes and typos.
dtubbenhauer@gmail.com
Corrected slides: dtubbenhauer.com/talks.html
The debris of the ‘last major merger’ is dynamically youngSérgio Sacani
The Milky Way’s (MW) inner stellar halo contains an [Fe/H]-rich component with highly eccentric orbits, often referred to as the
‘last major merger.’ Hypotheses for the origin of this component include Gaia-Sausage/Enceladus (GSE), where the progenitor
collided with the MW proto-disc 8–11 Gyr ago, and the Virgo Radial Merger (VRM), where the progenitor collided with the
MW disc within the last 3 Gyr. These two scenarios make different predictions about observable structure in local phase space,
because the morphology of debris depends on how long it has had to phase mix. The recently identified phase-space folds in Gaia
DR3 have positive caustic velocities, making them fundamentally different than the phase-mixed chevrons found in simulations
at late times. Roughly 20 per cent of the stars in the prograde local stellar halo are associated with the observed caustics. Based
on a simple phase-mixing model, the observed number of caustics are consistent with a merger that occurred 1–2 Gyr ago.
We also compare the observed phase-space distribution to FIRE-2 Latte simulations of GSE-like mergers, using a quantitative
measurement of phase mixing (2D causticality). The observed local phase-space distribution best matches the simulated data
1–2 Gyr after collision, and certainly not later than 3 Gyr. This is further evidence that the progenitor of the ‘last major merger’
did not collide with the MW proto-disc at early times, as is thought for the GSE, but instead collided with the MW disc within
the last few Gyr, consistent with the body of work surrounding the VRM.
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 5,No.1, February 2015
DOI : 10.5121/ijcseit.2015.5101 1
A SMART, LOCATION BASED TIME AND
ATTENDANCE TRACKING SYSTEM USING ANDROID
APPLICATION
Shermin Sultana1
, Asma Enayet1
and Ishrat Jahan Mouri1
1
Department of Computer Science and Engineering, Stamford University Bangladesh,
Dhaka, Bangladesh
ABSTRACT
Over the years the process of manual attendance has been carried out which is not only time consuming
but also provides erroneous result. Automated time and attendance monitoring system provides many
benefits to organizations. This reduces the need of pen and paper based manual attendance tracking
system. Following this thought, we have proposed a smart location based time and attendance tracking
system which is implemented on android mobile application on smartphone reducing the need of additional
biometric scanner device. The location of an organization has a specific location, which can be determine
by the GPS. Each employee’s location can be determined by the GPS using smartphone. This location is
defined as a key of time and attendance tracking in our paper.
KEYWORDS
Location-based service, GPS, time and attendance system, sending SMS, android applications.
1.INTRODUCTION
Now a day, attendance monitoring and working hour calculation is very essential for almost every
institution or organization. Typically there are two types of attendance system available, i)
Manual and ii) Automated. Manual system involves the use of sheets of paper or books in taking
attendance where employees fill out and managers oversee for accuracy. This method could be
erroneous because sheets could be lost or damaged. Also the extraction of relevant data and the
manual computation of working time is very time consuming. It takes an extra employee to check
for the attendance and timing of other employees which includes cost overhead for the
organization as well [1].
On the other hand, automated time and attendance systems implies the use of electronic tags, bar-
code badges, magnetic stripe cards, biometrics (hand, fingerprint, or facial), and touch screens [2]
in place of paper sheets. In these aforementioned techniques, employees touch or swipe in order
to provide their identification and also the entering and leaving time to calculate working hours.
The provided information are recorded and automatically transferred to a computer for
processing. Using an automated system for time and attendance monitoring reduces the errors of
manual system and conserve optimal amount of time. But these automated systems require
heterogeneous devices need to be located in the organization which is costly.
In this paper, considering the wide popularity of smartphones, we introduce the use of
smartphone for this time and attendance tracking purpose. We have proposed a location based
smart time and attendance tracking system based on the concept of web services which is
2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 5,No.1, February 2015
2
implemented as an Android mobile application that communicates with the remote server in
which the database is located. Internet connectivity (Wi-Fi/3G) is needed for connecting to
database residing in the remote server. Our proposed smart system does not require any kind of
peripheral device other than smartphone which will reduce computational time and cost of
placing an extra device. Any employee crossing the area border with a smartphone and the
running application will be tracked automatically.
2.RELATED WORKS
Several techniques and methods have been carried out effectively to monitor employee
attendance. Lawson et al. [3] proposed a cost effective computer based embedded attendance
management system by which authority electrically monitors the attendance for verification using
an improvised electronic card. These cards contain necessary information of an individual. These
are inserted in an electronic machine which will record the time and other information to a server
system. Password based authentication and verification of attendance monitoring system of any
individuals has also been carried out in the literature. A system that applies user id and password
of a person for authentication was designed and implemented by Cheng et al. [4].
However, an issue with these electronic cards or password based system allows for imposture
since cards or passwords can be shared or someone can ask other person to insert his/her card or
password. This problem can be addressed by using biometric recognition system which includes
finger print or iris recognition.
A system was proposed and implemented by authors in [5] fingerprints to identify and calculate
the attendance and generate the reports after a fixed time duration. Individuals simply put their
fingerprints on the fingerprint reader which scans the finger print and verifies that person. M.
Smaili et al [6] solved the problem by proposing a wireless attendance management system where
iris of an individual is used for authentication. It is also like fingerprint where no two people can
have the same eyes. A scanner will scan the eyes and automatically log the person in. Unlike
fingerprint, iris is more preserved from the external environment. But both the fingerprint and iris
recognition based approach needs some extra devices or scanner which can be connected to the
server computation system.
In our work, we addressed the problem utilizing smartphones internet connectivity for monitoring
the presence or attendance of an individual. Smartphone based monitoring system reduces the
surplus cost of additional scanning device because now a days almost each employee possess a
smartphone of his own. An area is fixed for every employee when an employee enters or exits
that area, that time stamp is saved and the time duration of any particular employee residing
within its area is calculated by the system.
3.PROPOSED ATTENDANCE TRACKING SYSTEM OVERVIEW AND DESIGN
3.1.System Overview:
The proposed system provides a solution to manual attendance taking problem. This system is a
location based smart time and attendance tracking system based on the concept of web services
which is implemented as an android mobile application. The employee has to install the
respective APK files developed for them on their android devices. At first it is important to save
the office coordinates by entering the latitude, longitude and radius of area. Employee has to save
the IP (internet protocol) address of the office internet. At the same time one employee can save
their information through the info menus of the App.
3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 5,No.1, February 2015
3
This location based time and attendance tracking system locates your position and logs your login
and logout time. As the employee enters his workplace area, the system connects to the office
internet and sends the employee id and local time to the server. Then the server gets the local time
and stores the information in a database. Again when employee leaves the office area, the system
notifies the office server that the employee is leaving. To run the whole system accurately it is
important that both the employee device and office server is in the same internet connection (Wi-
Fi/3G).
3.2.System Design:
The smart, location based time and attendance tracking system is a client-server approach and
follows specific hardware and software architecture. Integrating the hardware and software is the
main challenge here and the hardware and software works together.
The whole system has been divided into two major categories 1) App for mobile 2) App for pc
3.2.1. Software Architecture
The software architecture consists of: the database, the application program and the server.
• Database: The database consists of a number of tables, which stores records. We used
apache derby database which is easy, fast and efficient and can store a large number of
records and requires a little configuration.
• Application Program: The application program is developed with Android programming
language using Eclipse framework. The application program provides user interface to
both the employees and office server. Programming in Android is simple, user friendly
and android offers an excellent data connectivity.
• Server: The server is deployed on the personal computer using apache-Tomcat7. Tomcat7
is free, robust and easy to deploy.
3.2.2. Hardware Architecture
The basic requirement of the location base time and attendance tracking system is an android
device, which will run the application, with the help of which the employees will mark their
attendance and take their login, logout time automatically without any hassle. The other
requirement is a personal computer on the server side, which will store the database.
4.METHODOLOGY
User authentication is one of the major factors in the proposed system. Every employee is
authenticated based on his/her unique user identification number. This unique identification
number is the number which is given by the office. The identification number along with other
information is also saved in the employee device.
At first employee has to install the required system APK files into their android device. Mobile
location service has to be on when the system was running. If mobile location service is off then
the whole process will not go further. Mobile location service helps to trace the employee
location. When the employee enters the office area, android device of the employee is
automatically connected to the office internet and a message is sent to the office sever with the
employee id and local time of the device which is counted as login time of that employee. When
employee leaves the office area, a message is sent to the office server with employee id and local
time which is counted as logout time. Figure 1 depicts the overall methodology of our proposed
system.
4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 5,No.1, February 2015
4
Figure 1. Flow of operation for the proposed system
5.CONCLUSION
This paper introduce a smart, location based time and attendance tracking system using android
application which use location as the core component of attendance tracking using smartphone.
The area is set for tracking using GPS and employee coordinate inside the area border depicts that
employee is present in the organization. We developed this system for android platform, but we
are focusing on developing this system for iOS platform as well in neat future.
ACKNOWLEDGEMENTS
The authors would like to thank everyone, just everyone!
5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 5,No.1, February 2015
5
REFERENCES
[1] Kumbhar, A. A., Wanjara, K. S., Trivedi, D. H., Khairatkar, A. U., & Sharma, D. (2014). “Automated
Attendance Monitoring System using Android Platform.”, International Journal of Current
Engineering and Technology, Vol. 4, No. 2, pp1096-1099.
[2] Pankanti, S., Prabhakar, S., & Jain, A. K. (2002). “On the individuality of fingerprints”, Pattern
Analysis and Machine Intelligence, IEEE Transactions on, 24(8), 1010-1025.
[3] Shoewu, O. O. M. Olaniyi, and Lawson (2011), “Embedded Computer-Based Lecture Attendance
Management System”, African Journal of Computing and ICT (Journal of IEEE Nigeria Computer
Section), 4(3):27 – 36.
[4] Cheng, K., L. Xiang, T. Hirota, and K. Ushijimaa (2005), “Effective Teaching for Large Classes with
Rental PCs by Web System WTS”, Pro. Data Engineering Workshop (DEWS2005), 1D – d3 (in
Japanese).
[5] Shoewu, O. and O.A. Idowu (2012), “Development of Attendance Management System using
Biometrics”, Pacific Journal of Science and Technology, 13(1):300-307.
[6] Kadry, S., & Smaili, M. (2013). ”Wireless attendance management system based on iris recognition”,
Scientific Research and essays, 5(12), 1428-1435.
[7] Android Developer Guide: http://developer.android.com/guide/index.html accessed at 18th January.
[8] Android API: http://developer.android.com/reference/packages.html accessed at 20th January.
[9] Android Developers blog: http://android-developers.blogspot.com/ accessed at 15th January.
Authors
Asma Enayet is a lecturer in the Department of Computer Science and Engineering,
Stamford University Bangladesh, Dhaka, Bangladesh. She received her B.Sc in
Computer Science and Engineering from University of Dhaka, Bangladesh in 2012.
She passed her Higher Secondary Certificate (H.S.C) and Secondary School Certificate
(S.S.C) form Holy Cross College, Dhaka, Bangladesh in 2008 and Holy Cross Girls’
High School, Dhaka, Bangladesh in 2006. She published several journal and
international conference paper from her research work. Her research interest includes
web service composition, semantic web service, knowledge representation, mobile
apps, etc.
Shermin Sultana is a lecturer in the Department of Computer Science and Engineering,
Stamford University Bangladesh, Dhaka, Bangladesh. She received her B.Sc in
Computer Science and Engineering from Ahsanullah University of Science and
Technology, Dhaka, Bangladesh in 2012. She passed her Higher Secondary Certificate
(H.S.C) and Secondary School Certificate (S.S.C) from Ideal School and College,
Motijheel, Dhaka, Bangladesh in 2008 and Kamrunnesa Govt Girls High School, Dhaka,
Bangladesh in 2006. Her research interest includes Artificial Intelligence, Mobile Apps
and Neural Network etc.
Israt Jahan Mouri is a lecturer in the Department of Computer Science and
Engineering, Stamford University Bangladesh, Dhaka, Bangladesh. She received her
B.Sc in Computer Science and Engineering from Military Institute of Science &
Technology (MIST), Dhaka, Bangladesh in 2014. She passed her Higher Secondary
Certificate (H.S.C) and Secondary School Certificate (S.S.C) from Rajuk Uttara Model
College, Dhaka, Bangladesh in 2009 and The Buds Residential Model College, Sylhet,
Bangladesh in 2007. Her research interest includes Pattern Recognition, Mobile Apps
and Neural Network etc.