SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5217
Smart Mobile Attendance System using Bluetooth technology
Ankit B Dubey1, Nitesh Gupta2, Ankit M Dubey3, Nilima Nikam4
1,2,3,4Student,Dept. of Computer Science and Engineering,YTIT college, Karjat, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract—This paper provides an idea for smart attendance
management system using Bluetooth. In the current scenario
of companies and colleges attendance is marked using various
RFID card, biometric systems and in some places, manually.
The proposed system in this paper uses Bluetooth technology
provided in cell-phones an application to mark attendance
and employee tracking in company premises. The system
identifies the potential use of Bluetooth and Database to keep
employee’s and student records and to efficiently store and
retrieve the same for evaluation. An Bluetooth-supported
College M-Attendance system for University Students is
discussed as one potential use of thistechnology. Theproposed
framework replaces manual roll calls and hence, making it
resilient to forgery. Itgivesparentsandprofessorsinformation
about the students' attendance. The marking of attendance is
quick, unsupervised, and makes use of a One Time Password
(OTP) to enhance the security of the system and takes away
the possibility of proxy attendance. Bluetooth as a technology
that is more secure and convenient than the prevalent
technology of biometric, and also elaborates on the proposed
framework of the M-Attendance system that makes use of this
advantage that Bluetooth has over other technologies.
Key words: One Time Password, Attendance, Student,
Bluetooth Smart
I. INTRODUCTION
Bluetooth and one time password (OTP) upheld M-
Attendance structure for little scale association.
Traditionally employee needs to maintain the enrollment
records for participation. This routine requires time and
exertion, compromising on the working time. Expansion to
this, a few employees exploits the benefit of low-security
attendance framework and test the participation of the
representative who is not available in the office [8]. The
proposed M-Attendance framework has been intended to
design to simplify streamlines attendance monitoring. It
replaces the standard attendance checking framework and
makes it faster, more secure and totally advanced.
Bluetooth is an industry wireless specification standard for
use in various devices for short range communications. As a
radio based technology it allows devices to share
information over a maximum range of 10 meters. It has
several applications in Mobile Communications and
transactions. An Bluetooth supported collegeM-Attendance
system for University students is discussed as one potential
use of this technologyand reader into a solitary device. It
permits clients to continuously share content material
among advanced gadgets. A one-time password (OTP) is a
password that is valid for only one login session or
transaction, on any digital device. OTPs avoid a number of
shortcomings that are associated with the traditional
password based authentication systems. [2] The most
important advantage that is addressed by OTPs is that, in
contrast to static passwords, they are not vulnerable to
replay attacks. This means that a potential intruder who
manages to record an OTP that was alreadyusedtologintoa
service or to conduct a transaction will not be able to abuse
it, since it will be no longer valid. A second major advantage
is that a user who uses the same (or similar) password for
multiple systems, is not made vulnerable on all of them, if
the password for one of these is gained by an attacker. OTP
systems also aim to ensure that a session cannot be easily
intercepted or impersonated without knowledge of
unpredictable data createdduringtheprevioussession,thus,
reducing the attack surface further.
A. Abbreviations and Acronyms
TABLE I. ABBREVIATIONS AND DESCRIPTION
II. RELATED WORK
The purpose of SRS report is to list the customer or client
requirement in a systematic way. It characterizes all the
constraints and software requirement that are necessary to
understand the application and documentation.
Functional Requirements
A functional requirement isnothing but whatqualityof work
has been used in our system. Work is described as
arrangement of input, behavior and output. Functional
requirements are supported by non-functional necessities
which force limitation on the plan or execution [7].
In this system we having two applications one is a web
application in our architecture. Another application is
android application which is developed using android SDK
tools. The web application has following applications.
Abbreviation Description
OTP One Time Password
RF Radio Frequency
SMS Short Message Service
RFID Radio-FrequencyIdentification
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5218
1. Admin Application: It is responsible to store the data on
the server using database by providing employee or student
details.
2. Employee’s Application: Authorized employee’s can
login and mark his attendance can add his information in
database.
3. OTP Message Service: If employee is an authenticated
user OTP message will be sent to the user by admin.
Non Functional Requirements
The non-functional requirementsoftheproposedsystemare
as follows:
1. Performance:
The framework will be utilized by many employees
simultaneously. Since the framework will be facilitated on a
solitary web server with a single database server in the
background, Performance turns into a major concern.
2. Scalability:
The framework is sufficiently versatile to include new
functionalities at later stages. There should be a typical
channel, which can accommodate the new functionalities.
3. Reliability:
The proposed framework will be reliable; it will not give
false positive results and the fake user such that one cannot
rely on it.
4. Flexibility:
The proposed system will be flexible to the user with less
complexity and user friendliness.
III. SYSTEM DESIGN
The system design includes various phases of project design
which consist of description of project, algorithmsandsome
high level diagram such as data flow diagram (DFD),
sequence diagram, use case diagram and class diagram.
Fig -1: Architecture Diagram
Description:
The system design is a conceptual model whichdescribes the
structure, behavior of a system. The above 3.1 shows the
system architecture which has the following steps.
Step 1: Admin login by using his Id and Password. Once the
login is successful then he will write the employee details in
the database and now it will contain the details of the
employee.
Step 2: Employee/student uses ID and Password to login
then they make Bluetooth on for attendance purpose. One
time password will be generated for each employee by
admin.
Step 3: Generation of one time password message and
employee /user enters those OTP in the user’s application, if
password matches than user is an authenticated
employee/user .If wrong OTP is entered or password
entered doesn’t match then user is not an authenticated
employee/user.
Step 4: Once verification is successful it sends the time-in or
time-out details to Admin by Professor. Admin gets time-in
or time-out details of an employee. If the verification is not
successful it displays invalid user.
IV. Working Module
A. Bluetooth
a. Writing the details student and professor in database
Once the registration of student is done thenalldataisstored
in database by admin. Student can login whenever they
required and can view their attendance and can mark their
attendance. Same way professor can login and mark the
attendance of the student using mobile device
b. Reading the data from Bluetooth device
Once the student is login to page and then can he search the
device of professor for connection purpose. Once the
connection is established then student wait for professor
response. Professorlogin to page and select thedevicewhich
he want to mark attendance and set the time and date of
lecture.
c. OTP Verification
Once the professor mark the attendance then it goes under
the verification stage where admin send the code via email
which is OTP (mixture of alphabet and numeric caps and
small) to student. Then he enter the OTP and attendance is
confirmed by professor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5219
V. SECURITY FEATURES
The server in this system is the XAMPP server with PHP at
its back-end. XAMPP needs to be configured to port number
80 so that the Apache server is able to receive requests from
the localhost URL. The PHP code along with the SQL DDL
command need to be added inside the htdocs folder. The
exact location is "C:xampphtdocs". Theback-enddatabase
should be intranet because admins located in the premises
should be able to access the database as there is confidential
information at stake. [11] Once the Tag ID is detected when
student enters the class, the server is responsible for
generating a random four digit number as OTP. As this
number is a 4 digit random number, there is no way it could
be guessed. It also generates a different random number
each time ensuring that the OTP or PIN cannot be reused,
memorized or misused. [3] The system sends the OTP as an
SMS to the students registered Mobile Number or through
college Wi-Fi in case there is no network. Once this OTP is
entered by the student, he needs to be connected to college
Wi-Fi to submit the OTP after tapping their tag on the
student device. This extra measure ensures that students
who are at home or outside the class won't be able to verify
the OTP through their Student Application as their devices
need to be connected to the institutions Wi-Fi andTagneeds
to be inside Class. Those who haveverifiedtheOTPhavealso
verified their presence in class as the device is connected to
the Local Wi-Fi Network. The OTP method was proposed in
order to make the system fool proof and prevent proxies.
[12] What makes the system more secure is the OTP
verification that takes place. Consider the student has
swiped his tag against the sensor device and receives his
OTP, there comes a scenario where if a student sends his tag
with a colleague and forwards the SMS he received
containing the OTP from home. Now the colleague can enter
the OTP within the expiry time and the proxy attendance is
marked. Therefore, to counter this, a feature was introduced
which allowed OTP verification only when the Tag is in
proximity of the students own mobilephone. Thisispossible
because each student logs into the app on his/her device
using their own credentials only. Hence, when we bring the
Tag in proximity of the devicetheapplicationrecognizesthat
the tag number and credentials belong to the same person,
hence the dual- verification takesplace.Attendanceislogged
into the database as soon as the lecture ends.
VI. Experimental Results
a. Web Application
This section show the snapshot of web application.
The fig-a shows how the admin login in his server can view
the attendance.
Fig-a Admin page
In this fig admin can view he attendance can verify the
attendance by clicking it and OTP is send tostudent email ID.
Fig-b Attendance List
Android application
This fig .c shows the application view in the mobile device
and that section login of student parents and professor.
Fig-c User login page
This fig-d shows the student login page in mobile device.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5220
Fig-d Student login page
This fig-e shows the professor login pageandwhichhemake
the Bluetooth discoverable for connection purpose.
Fig-e Bluetooth connection page
This fig-f shows the OTP message send to the studentdevice
where he can enter OTP to login page to confirm his
attendance .
Fig-f Verification page
VII. CONCLUSIONS
The traditional attendance system have a tendency to be
insecure due to absence of verification. In the proposed
framework, we are utilizing Bluetooth and one time
password for verification of employee and enlistment of
participation in a systematic andsecuredway.Everystudent
will be utilized along with mobile device which would be
utilized for automating the way of marking attendance.
The mobile device attendance framework can reduce
unnecessary manual work by enabling administrator to get
real time information about attendance of an student. The
advantages for the administrator are that to maintain all the
data about employee attendance and keeping log record for
future reference.
ACKNOWLEDGEMENT
This work was supported in part by Prof. Nilima Nikam,
Mr. Ankit B Dubey, Mr. Ankit M Dubey, Mr. Nitesh Gupta We
gratefully acknowledge the work of Tasgaonkar Institute of
Engineering and Technology.
VIII. REFERENCES
1. Near Field Communication, White paper, ECMA
international, December 2003
2. M. Viju Prakash, P. Alwin Infant, and S. Jeya Shobana,
"Eliminating Vulnerable Attacks Using One-Time Password
and Pass Text - Analytical Study of Blended Schema",
Universal Journal of Computer Science and Engineering
Technology 1 (2), 133-140, ISSN: 2219-2158, November
2010.
3. D. Florencio and C. Herley, "One-TimePasswordAccess to
Any Server without Changing the Server", Springer-Verlag,
pp. 401-420, Berlin, Heidelberg, 2008.
4. Eamonn O’Neill, Peter Thompson, Stavros Garzonis, and
Andrew Warr,” Reach Out and Touch: Using NFC and 2D
Barcodes for Service Discovery and Interaction with Mobile
Devices”, UK, 2007
5. MatijaBumbak,” Analysis of potential RFID security
problems in supply chains and ways to avoid them”, Master
thesis, May 2005
6. K. Preethi, A. Sinha, and Nandini, "Contactless
Communication through Near Field Communication,
International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 2, Issue 4, April
2012, ISSN: 2277 128X
7. .https://en.wikipedia.org/wiki/Software_requirements_
specification
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5221
8. P Elakiyaselvi, "A framework for implementing M-
Attendance system using near field communication in
android OS".
9. K. G. Paterson, and Douglas Stebila, "One-time-password
authenticated key exchange" September 4, 2009.
10. T. Chang-Lung, C. Chun-Jung, and Z. Deng-Jie, "Secure
OTP and Biometric Verification SchemeforMobileBanking",
Third FTRA International Conference onMobile,Ubiquitous,
and Intelligent Computing, IEEE, 2012.
11. T. Saini, "One Time Password Generator System",
International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 4, Issue 3, ISSN:
2277 128X, March 2014.
12. A. A. Khan, "Preventing PhishingAttacksusingOneTime
Password and User Machine Identification", International
Journal of Computer Applications (0975 - 8887),Volume68-
No. 3, April 2013.

More Related Content

What's hot

Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Java project titles
Java project titlesJava project titles
Java project titles
Ashly Liza
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
Conference Papers
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET Journal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
IRJET Journal
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
ijsptm
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
IRJET Journal
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Conference Papers
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
eSAT Publishing House
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
IRJET Journal
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET Journal
 
CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1
Mohammed Shafi VV
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
 

What's hot (17)

Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Java project titles
Java project titlesJava project titles
Java project titles
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
 
Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
 
CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1CV_MOHAMMED_SHAFI V.V junior1
CV_MOHAMMED_SHAFI V.V junior1
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 

Similar to IRJET- Smart Mobile Attendance System using Bluetooth Technology

IRJET - Campus Suite
IRJET  -  	  Campus SuiteIRJET  -  	  Campus Suite
IRJET - Campus Suite
IRJET Journal
 
IRJET- Campus Suite
IRJET- Campus SuiteIRJET- Campus Suite
IRJET- Campus Suite
IRJET Journal
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
 
UniConnect: Unleashing theExcitement of University Gathering
UniConnect: Unleashing theExcitement of University GatheringUniConnect: Unleashing theExcitement of University Gathering
UniConnect: Unleashing theExcitement of University Gathering
IRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Webhook Support for Alert Policies
Webhook Support for Alert PoliciesWebhook Support for Alert Policies
Webhook Support for Alert Policies
IRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
IRJET Journal
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
IRJET Journal
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
IRJET Journal
 
Human Resource Management using Phone Gap
Human Resource Management using Phone GapHuman Resource Management using Phone Gap
Human Resource Management using Phone Gap
IRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
IRJET Journal
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
IRJET Journal
 

Similar to IRJET- Smart Mobile Attendance System using Bluetooth Technology (20)

IRJET - Campus Suite
IRJET  -  	  Campus SuiteIRJET  -  	  Campus Suite
IRJET - Campus Suite
 
IRJET- Campus Suite
IRJET- Campus SuiteIRJET- Campus Suite
IRJET- Campus Suite
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
UniConnect: Unleashing theExcitement of University Gathering
UniConnect: Unleashing theExcitement of University GatheringUniConnect: Unleashing theExcitement of University Gathering
UniConnect: Unleashing theExcitement of University Gathering
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Webhook Support for Alert Policies
Webhook Support for Alert PoliciesWebhook Support for Alert Policies
Webhook Support for Alert Policies
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
 
Human Resource Management using Phone Gap
Human Resource Management using Phone GapHuman Resource Management using Phone Gap
Human Resource Management using Phone Gap
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFCAndroid Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 

Recently uploaded (20)

Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 

IRJET- Smart Mobile Attendance System using Bluetooth Technology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5217 Smart Mobile Attendance System using Bluetooth technology Ankit B Dubey1, Nitesh Gupta2, Ankit M Dubey3, Nilima Nikam4 1,2,3,4Student,Dept. of Computer Science and Engineering,YTIT college, Karjat, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract—This paper provides an idea for smart attendance management system using Bluetooth. In the current scenario of companies and colleges attendance is marked using various RFID card, biometric systems and in some places, manually. The proposed system in this paper uses Bluetooth technology provided in cell-phones an application to mark attendance and employee tracking in company premises. The system identifies the potential use of Bluetooth and Database to keep employee’s and student records and to efficiently store and retrieve the same for evaluation. An Bluetooth-supported College M-Attendance system for University Students is discussed as one potential use of thistechnology. Theproposed framework replaces manual roll calls and hence, making it resilient to forgery. Itgivesparentsandprofessorsinformation about the students' attendance. The marking of attendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. Bluetooth as a technology that is more secure and convenient than the prevalent technology of biometric, and also elaborates on the proposed framework of the M-Attendance system that makes use of this advantage that Bluetooth has over other technologies. Key words: One Time Password, Attendance, Student, Bluetooth Smart I. INTRODUCTION Bluetooth and one time password (OTP) upheld M- Attendance structure for little scale association. Traditionally employee needs to maintain the enrollment records for participation. This routine requires time and exertion, compromising on the working time. Expansion to this, a few employees exploits the benefit of low-security attendance framework and test the participation of the representative who is not available in the office [8]. The proposed M-Attendance framework has been intended to design to simplify streamlines attendance monitoring. It replaces the standard attendance checking framework and makes it faster, more secure and totally advanced. Bluetooth is an industry wireless specification standard for use in various devices for short range communications. As a radio based technology it allows devices to share information over a maximum range of 10 meters. It has several applications in Mobile Communications and transactions. An Bluetooth supported collegeM-Attendance system for University students is discussed as one potential use of this technologyand reader into a solitary device. It permits clients to continuously share content material among advanced gadgets. A one-time password (OTP) is a password that is valid for only one login session or transaction, on any digital device. OTPs avoid a number of shortcomings that are associated with the traditional password based authentication systems. [2] The most important advantage that is addressed by OTPs is that, in contrast to static passwords, they are not vulnerable to replay attacks. This means that a potential intruder who manages to record an OTP that was alreadyusedtologintoa service or to conduct a transaction will not be able to abuse it, since it will be no longer valid. A second major advantage is that a user who uses the same (or similar) password for multiple systems, is not made vulnerable on all of them, if the password for one of these is gained by an attacker. OTP systems also aim to ensure that a session cannot be easily intercepted or impersonated without knowledge of unpredictable data createdduringtheprevioussession,thus, reducing the attack surface further. A. Abbreviations and Acronyms TABLE I. ABBREVIATIONS AND DESCRIPTION II. RELATED WORK The purpose of SRS report is to list the customer or client requirement in a systematic way. It characterizes all the constraints and software requirement that are necessary to understand the application and documentation. Functional Requirements A functional requirement isnothing but whatqualityof work has been used in our system. Work is described as arrangement of input, behavior and output. Functional requirements are supported by non-functional necessities which force limitation on the plan or execution [7]. In this system we having two applications one is a web application in our architecture. Another application is android application which is developed using android SDK tools. The web application has following applications. Abbreviation Description OTP One Time Password RF Radio Frequency SMS Short Message Service RFID Radio-FrequencyIdentification
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5218 1. Admin Application: It is responsible to store the data on the server using database by providing employee or student details. 2. Employee’s Application: Authorized employee’s can login and mark his attendance can add his information in database. 3. OTP Message Service: If employee is an authenticated user OTP message will be sent to the user by admin. Non Functional Requirements The non-functional requirementsoftheproposedsystemare as follows: 1. Performance: The framework will be utilized by many employees simultaneously. Since the framework will be facilitated on a solitary web server with a single database server in the background, Performance turns into a major concern. 2. Scalability: The framework is sufficiently versatile to include new functionalities at later stages. There should be a typical channel, which can accommodate the new functionalities. 3. Reliability: The proposed framework will be reliable; it will not give false positive results and the fake user such that one cannot rely on it. 4. Flexibility: The proposed system will be flexible to the user with less complexity and user friendliness. III. SYSTEM DESIGN The system design includes various phases of project design which consist of description of project, algorithmsandsome high level diagram such as data flow diagram (DFD), sequence diagram, use case diagram and class diagram. Fig -1: Architecture Diagram Description: The system design is a conceptual model whichdescribes the structure, behavior of a system. The above 3.1 shows the system architecture which has the following steps. Step 1: Admin login by using his Id and Password. Once the login is successful then he will write the employee details in the database and now it will contain the details of the employee. Step 2: Employee/student uses ID and Password to login then they make Bluetooth on for attendance purpose. One time password will be generated for each employee by admin. Step 3: Generation of one time password message and employee /user enters those OTP in the user’s application, if password matches than user is an authenticated employee/user .If wrong OTP is entered or password entered doesn’t match then user is not an authenticated employee/user. Step 4: Once verification is successful it sends the time-in or time-out details to Admin by Professor. Admin gets time-in or time-out details of an employee. If the verification is not successful it displays invalid user. IV. Working Module A. Bluetooth a. Writing the details student and professor in database Once the registration of student is done thenalldataisstored in database by admin. Student can login whenever they required and can view their attendance and can mark their attendance. Same way professor can login and mark the attendance of the student using mobile device b. Reading the data from Bluetooth device Once the student is login to page and then can he search the device of professor for connection purpose. Once the connection is established then student wait for professor response. Professorlogin to page and select thedevicewhich he want to mark attendance and set the time and date of lecture. c. OTP Verification Once the professor mark the attendance then it goes under the verification stage where admin send the code via email which is OTP (mixture of alphabet and numeric caps and small) to student. Then he enter the OTP and attendance is confirmed by professor.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5219 V. SECURITY FEATURES The server in this system is the XAMPP server with PHP at its back-end. XAMPP needs to be configured to port number 80 so that the Apache server is able to receive requests from the localhost URL. The PHP code along with the SQL DDL command need to be added inside the htdocs folder. The exact location is "C:xampphtdocs". Theback-enddatabase should be intranet because admins located in the premises should be able to access the database as there is confidential information at stake. [11] Once the Tag ID is detected when student enters the class, the server is responsible for generating a random four digit number as OTP. As this number is a 4 digit random number, there is no way it could be guessed. It also generates a different random number each time ensuring that the OTP or PIN cannot be reused, memorized or misused. [3] The system sends the OTP as an SMS to the students registered Mobile Number or through college Wi-Fi in case there is no network. Once this OTP is entered by the student, he needs to be connected to college Wi-Fi to submit the OTP after tapping their tag on the student device. This extra measure ensures that students who are at home or outside the class won't be able to verify the OTP through their Student Application as their devices need to be connected to the institutions Wi-Fi andTagneeds to be inside Class. Those who haveverifiedtheOTPhavealso verified their presence in class as the device is connected to the Local Wi-Fi Network. The OTP method was proposed in order to make the system fool proof and prevent proxies. [12] What makes the system more secure is the OTP verification that takes place. Consider the student has swiped his tag against the sensor device and receives his OTP, there comes a scenario where if a student sends his tag with a colleague and forwards the SMS he received containing the OTP from home. Now the colleague can enter the OTP within the expiry time and the proxy attendance is marked. Therefore, to counter this, a feature was introduced which allowed OTP verification only when the Tag is in proximity of the students own mobilephone. Thisispossible because each student logs into the app on his/her device using their own credentials only. Hence, when we bring the Tag in proximity of the devicetheapplicationrecognizesthat the tag number and credentials belong to the same person, hence the dual- verification takesplace.Attendanceislogged into the database as soon as the lecture ends. VI. Experimental Results a. Web Application This section show the snapshot of web application. The fig-a shows how the admin login in his server can view the attendance. Fig-a Admin page In this fig admin can view he attendance can verify the attendance by clicking it and OTP is send tostudent email ID. Fig-b Attendance List Android application This fig .c shows the application view in the mobile device and that section login of student parents and professor. Fig-c User login page This fig-d shows the student login page in mobile device.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5220 Fig-d Student login page This fig-e shows the professor login pageandwhichhemake the Bluetooth discoverable for connection purpose. Fig-e Bluetooth connection page This fig-f shows the OTP message send to the studentdevice where he can enter OTP to login page to confirm his attendance . Fig-f Verification page VII. CONCLUSIONS The traditional attendance system have a tendency to be insecure due to absence of verification. In the proposed framework, we are utilizing Bluetooth and one time password for verification of employee and enlistment of participation in a systematic andsecuredway.Everystudent will be utilized along with mobile device which would be utilized for automating the way of marking attendance. The mobile device attendance framework can reduce unnecessary manual work by enabling administrator to get real time information about attendance of an student. The advantages for the administrator are that to maintain all the data about employee attendance and keeping log record for future reference. ACKNOWLEDGEMENT This work was supported in part by Prof. Nilima Nikam, Mr. Ankit B Dubey, Mr. Ankit M Dubey, Mr. Nitesh Gupta We gratefully acknowledge the work of Tasgaonkar Institute of Engineering and Technology. VIII. REFERENCES 1. Near Field Communication, White paper, ECMA international, December 2003 2. M. Viju Prakash, P. Alwin Infant, and S. Jeya Shobana, "Eliminating Vulnerable Attacks Using One-Time Password and Pass Text - Analytical Study of Blended Schema", Universal Journal of Computer Science and Engineering Technology 1 (2), 133-140, ISSN: 2219-2158, November 2010. 3. D. Florencio and C. Herley, "One-TimePasswordAccess to Any Server without Changing the Server", Springer-Verlag, pp. 401-420, Berlin, Heidelberg, 2008. 4. Eamonn O’Neill, Peter Thompson, Stavros Garzonis, and Andrew Warr,” Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices”, UK, 2007 5. MatijaBumbak,” Analysis of potential RFID security problems in supply chains and ways to avoid them”, Master thesis, May 2005 6. K. Preethi, A. Sinha, and Nandini, "Contactless Communication through Near Field Communication, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012, ISSN: 2277 128X 7. .https://en.wikipedia.org/wiki/Software_requirements_ specification
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5221 8. P Elakiyaselvi, "A framework for implementing M- Attendance system using near field communication in android OS". 9. K. G. Paterson, and Douglas Stebila, "One-time-password authenticated key exchange" September 4, 2009. 10. T. Chang-Lung, C. Chun-Jung, and Z. Deng-Jie, "Secure OTP and Biometric Verification SchemeforMobileBanking", Third FTRA International Conference onMobile,Ubiquitous, and Intelligent Computing, IEEE, 2012. 11. T. Saini, "One Time Password Generator System", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, ISSN: 2277 128X, March 2014. 12. A. A. Khan, "Preventing PhishingAttacksusingOneTime Password and User Machine Identification", International Journal of Computer Applications (0975 - 8887),Volume68- No. 3, April 2013.