Site Logo E-PROJECTTOPICS

DESIGN AND IMPLEMENTATION OF STUDENT ATTENDANCE RECORD USING FINGERPRINT BIOMETRIC SYSTEM


Presented To


Computer Science Department

📄 Pages: 70       🧠 Words: 6698       📚 Chapters: 5 🗂️️ For: PROJECT

👁️‍🗨️️️ Views: 43      

⬇️ Download (Complete Report) Now!

📥 Instant Access: Download the fully developed, tested, and ready-to-use software that matches this project topic. Save weeks of effort and get the complete working solution immediately. Trusted by students & professionals, with fast delivery guaranteed.

Get Developed Software

👨‍💻 Hire a Software Developer: Work with an experienced software engineer who can customize, improve, or build your project from scratch. Get professional coding, tailored features, and expert guidance to make your project stand out. 100% reliable service, with proven results and client satisfaction.

Hire a Software Developer
ABSTRACT
This preliminary document covers the arrangement phase of a final year BSc (Hons)
computer science project aiming to develop a fingerprint recognition application to
allow logging of student attendance at lectures. The introduction offers some
background to the project and establishes the aims and objectives of the project
overall. Following on from the introduction, the literature review presents an account
of research material that provides the basis for the project.  This material includes a
number of texts, journals and research papers as well as additional information
sourced from the Web.  As drawn from the literature, the subject areas covered
include; history and background to modern biometrics; technological, social,
organizational and environmental influences; key technologies in the market today;
design issues, including security, performance and testing.
In chapter 3, attention turns to requirements analysis for the development of a
fingerprint recognition system.  The process follows a requirements engineering
approach to development by formally establishing user requirements and allowing
continuous requirements assessment throughout the project life-cycle.  The design
approach and methodology used to model the problem are also addressed in chapter
4, in this chapter (4) we also deals with high level design issues such as requirements
engineering in the solution domain; assessment and selection of technology options;
project management, implementation strategy and evaluation of user requirements.
TABLE OF CONTENTS
DECLARATION  -    -    -    -    -    -    -   -   - - . i
CERTIFICATION  -    -    -    -    -    -    -   -   ii
DEDICATION  -    -    -    -    -    -    -   -   -  . iii
ACKNOWLEDGEMENT  -    -    -    -    -    -   -   - - . iv
ABSTRACT -    -    -    -    -    -    -   . vi
TABLE OF CONTENTS -    -    -    -    -    -   -   -   vii
CHAPTER ONE  -    -    -    -    -    -    -   -   - - . 1
1.0 Introduction  -    -    -    -    -    -    -  -  1
1.1 Statement of the problems -    -    -    -    -    -   -   -  . 2
1.2 Aim and objectives  -    -    -    -    -    -    -   2
1.3 Scope and limitation of the study  -    -    -    -    -    - - . 3
CHAPTER TWO  -    -    -    -    -    -    -   -   - -  4
LITERATURE REVIEW  -    -    -    -    -    -   -   -  . 4
2.0 Introduction  -    -    -    -    -    -    -    -   4
2.1 Historical background of the study area  -    -    -    -    -   -  . 5
2.2 The concept of modern biometric system -    -    -    -    -   - -  5
2.3 Evolution of modern biometrics  -    -    -    -    -    -  . 7
2.4 Technical development  -    -    -    -    -    -   . 10
2.4.0 Classification of biometric -    -    -    -    -    -   - -  10
2.4.1 Wayman classifications of biometric  -    -    -    -    -  . 12
2.4.2 Key technologies of biometric  -    -    -    -    -  - . 14
2.5 Industry standards  -    -    -    -    -    -    -   -   22
2.6 Biometric concerns  -    -    -    -    -    -    -   - - . 23
2.6.0 Informational privacy concerns  -    -    -    -    -   -   -  . 24
2.6.1 Physical privacy concern  -    -    -    -    -    -   -   25
2.6.2 Religious concerns  -    -    -    -    -    -   . 25
2.7 Performance of biometric  -    -    -    -    -    -   -   -  . 25
CHAPTER THREE  -    -    -    -    -    -    -   28
METHODOLOGY AND SYSTEM ANALYSIS  -    -    -    -   - -  28
3.0 Introduction  -    -    -    -    -    -    -    - -  28
3.1 Research methodology  -    -    -    -    -    -   . 28
3.2 Modelling and requirements engineering  -    -    -    -    -   31
3.2.0 Mapping GRAPPLE and Requirements Engineering  -    -    -  - . 32
3.2.1 Requirements Management using DOORS  -    -    -    -   -   -   35
3.2.2 Defining the Problem Domain  -    -    -    -    -  - . 35
3.3 Requirements engineering in the problem domain  -    -    -    -  . 36
3.3.0 Fingerprint Authentication: Statement of Needs  -    -    -    - -  36
3.4 Requirements gathering in the problem domain  -    -    -    -   -  . 37
3.4.0 Develop Stakeholder Requirements  -    -    -    -    -   - -  37
3.4 Analysis of System Requirements  -    -    -    -    -   . 38
3.4.0 System functional Requirements  -    -    -    -    -   -   - - . 38
3.4.1 Non-Functional Requirements  -    -    -    -    -  - . 39
CHAPTER FOUR -    -    -    -    -    -    -   - - . 40
SYSTEM DESIGN, IMPLEMENTATION AND TESTING  -    -    -   40
4.0 Introduction  -    -    -    -    -    -    -    - -  40
4.1 System design  -    -    -    -    -    -    -  - . 40
4.2 System requirements  -    -    -    -    -    -    -   42
4.2.0 Hardware Requirement  -    -    -    -    -    -   -  . 42
4.2.1 Software Requirement  -    -    -    -    -    -   -   - - . 42
4.3 User interface design  -    -    -    -    -    -    -   42
4.4 Database design  -    -    -    -    -    -    -   -   -   43
4.5 System operational procedure  -    -    -    -    -    -  . 44
4.6 System implementation  -    -    -    -    -    -    48
4.7 Software testing and validation  -    -    -    -    -    -   48
4.8 System testing  -    -    -    -    -    -    -  - . 49
CHAPTER FIVE  -    -    -    -    -    -    -   -   50
SUMMARY CONCLUSION AND RECOMMENDATION  -    -    -   50
5.0 Summary  -    -    -    -    -    -    -    -   - - . 50
5.1 Conclusion -    -    -    -    -    -    -    -  . 50
5.2 Recommendation -    -    -    -    -    -    -   -   - -  51
REFERENCES  -    -    -    -    -    -    -   -   - - . 52
Appendix A  -    -    -    -    -    -    -   . 57
Operational screenshots  -    -    -    -    -    -    -  . 57

📄 Pages: 70       🧠 Words: 6698       📚 Chapters: 5 🗂️️ For: PROJECT

👁️‍🗨️️️ Views: 43      

⬇️ Download (Complete Report) Now!

📥 Instant Access: Download the fully developed, tested, and ready-to-use software that matches this project topic. Save weeks of effort and get the complete working solution immediately. Trusted by students & professionals, with fast delivery guaranteed.

Get Developed Software

👨‍💻 Hire a Software Developer: Work with an experienced software engineer who can customize, improve, or build your project from scratch. Get professional coding, tailored features, and expert guidance to make your project stand out. 100% reliable service, with proven results and client satisfaction.

Hire a Software Developer

click on whatsapp