<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fingerprint attendance system for students and academic staff</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Suela Maxhelaku</string-name>
          <email>suela.maxhelaku@fshn.edu.al</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Endri Hoxha</string-name>
          <email>endri.hoxha@fshnstudent.info</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alda Kika</string-name>
          <email>alda.kika@fshn.edu.al</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fingerprint Recognition,</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Dept.</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Identification</institution>
          ,
          <addr-line>Verification.</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Monitoring the participation of students and academic staff in the auditors of higher education institutions is still realized through traditional techniques which in most cases require time and human resources. Traditional techniques do not allow accurate identification of audience participant and this may be a security problem. The proposal of a system that automates this process would solve the above issues. Fingerprint techniques are widely used for accessing data on mobile devices but can also be used for monitoring issues. This thesis will propose a solution based on the use of biometric techniques through fingerprint recognition and how it can be used for enrollment of the participations in the audience.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>System,</p>
    </sec>
    <sec id="sec-2">
      <title>1 Introduction</title>
      <p>Nowadays in Albania the educational institutions use a
manual system for taking attendance of students. This
process is a long process and non efficient, but can be
solved using an attendance management system using
biometric technology.</p>
      <p>Biometric system begins with the identification of a
particular human trait to make that as a token to be
used for identification and verification of an individual
in a system. Fingerprints are the most popular and most
commonly used biometric model. While Biometric
Attendance is a software which manages the huge data
related to the attendance. [Kir17]
The fingerprint attendance system solves the
attendance issues by the following means: no time
waste as the attendance is taken during lecture without
intervention of teacher, flexibility to use schedules of
college, managing the attendance is automated, no
chance for fake attendance marking, evaluate level of
attendance for students automatically. [Alh15]
In this paper, we propose a system that will use
fingerprint reader to check attendance of students and
academic staff.</p>
    </sec>
    <sec id="sec-3">
      <title>2 Literature overview</title>
      <p>There are a lot of researches that have worked on
attendance systems using fingerprint and other
biometric technologies for registering students and
academic staff.</p>
      <p>Research [Alh17] proposes a system for educational
institutes that allows the guardians of the students to
monitor and follow up on the attendance of their
students via Internet.</p>
      <p>The authors in [Eze13] use a real-time remote
monitoring system interface o manage staff and
students using an integrated Fingerprint Attendance
System. With this system, it took only 2 seconds to
verify and mark attendance per student as opposed to
15seconds for manual process.</p>
      <p>The authors in [Rah18] proposed a system where the
fingerprint scanner read fingerprints with the student
information; the device scans the edge and ridge of the
finger and creates a template. The system searches all
the templates that are stored in the system database and
matches with each saved template. Then the teacher
can take attendance to each class manually or through
fingerprint.</p>
      <p>Other systems [Oye18] connect a SD card to the
computer system. The SD card is connected to the
computer system to enable the uploading of the, txt file
to the window application. The Arduino SD Card
module is a simple solution for transferring data to and
from a standard SD card. When the student places their
finger on the fingerprint module and the attendance is
taken, the student ID number is stored in a.txt file in
H
M
H
M
M
H
M</p>
      <p>L
H
M
M
H
L
L</p>
      <p>A
H
M
M
M
L
H
H</p>
      <p>C2
H
M
M
L
L
H
H
the SD card. After every class, the lecturer or the
administrator needs to connect the SD card to the
window application in order to access the database and
print the attendance list.</p>
      <p>Different authors [Das17] have made a comparison of
commonly used biometric traits according to the table
below:
U- Universality (every person should possess the
biometric trait); D-Distinctiveness (any two persons
should be significantly different in terms of their traits
or characteristics); P1-Permanence (biometric trait
should perform in the same way irrespective of the
matching criterion); C1-Collectability (a biometric trait
is able to be measured quantitatively.);
P2Performance (measured in terms of recognition
accuracy, computational time, error rates etc.);
AAcceptability (which set of users can accept to go for
the biometric sensor in everyday life.);
C2Circumvention (measured in terms of how easy to
bypass the biometric authentication system).</p>
      <p>P1</p>
      <p>C1</p>
      <p>P2</p>
      <sec id="sec-3-1">
        <title>Biometric</title>
      </sec>
      <sec id="sec-3-2">
        <title>Identifier</title>
      </sec>
      <sec id="sec-3-3">
        <title>Face</title>
      </sec>
      <sec id="sec-3-4">
        <title>Fingerprint</title>
      </sec>
      <sec id="sec-3-5">
        <title>Hand</title>
        <p>geometry</p>
      </sec>
      <sec id="sec-3-6">
        <title>Hand/finger vein</title>
      </sec>
      <sec id="sec-3-7">
        <title>Iris</title>
      </sec>
      <sec id="sec-3-8">
        <title>Signature</title>
      </sec>
      <sec id="sec-3-9">
        <title>Voice U H M</title>
        <p>M
M
H
L
M
D
L
H
M
M
H
L
L</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3 System Architecture</title>
      <sec id="sec-4-1">
        <title>3.1 Logical Architecture</title>
        <p>A biometric system is a recognition system that takes
biometric data from individuals (through scanners or
other means), outputs a set of distinct features from
biometric data, known as the template biometric,
compares the template with other templates and makes
a decision depending on the comparison result. A
biometric system generally has four main modules: a
sensor module, a module for quality assurance and to
retrieve the features, a module for comparing features,
and a database module.</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2 Physical Architecture</title>
        <p>The physical architecture will consists of physical
computers set up in each auditorium. Each computer is
connected to a fingerprint reader device that is the
device 'U ARE U 4500' as well as a physical server
located in the faculty, where will be the database. The
aim is to develop a desktop architecture, not a web
application, for two reasons: the most important reason
is security, where this information will not be found on
the Internet, making it more secure against external
attacks and the second reason is to avoid connecting to
the Internet because it is being an application that will
have to work all the time even if the students or the
lectures will have problems with the internet.</p>
      </sec>
      <sec id="sec-4-3">
        <title>3.3 Implemented Architecture</title>
        <p>The application will use the architecture as shown in
figure below.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4 Proposed System</title>
      <p>The system offers a log in panel for students, lectures
and administrator.
The students will record their attendance using
fingerprint from the interface below. The administrator
adds the students and their information.
The system is able to compare the fingerprints with the
templates from the database. For example the system is
able to modify students and also it is able to detect if
the same fingerprints have been stored in the database.
Also using this application can register the attendance
the students and lectures in the auditorium. The
interface for registering the students will give a
positive answer when the student is enrolled. This
result will be displayed after the control over the
existence of another similar sign in the database and if
the students has no previous registration in the
database.
If the students have been enrolled the application will
give a negative answer.
Also, the application it is able to detect if there is on
fingerprint information for that students, or if the
students or the lectures are not part of that course.</p>
    </sec>
    <sec id="sec-6">
      <title>5 Conclusions</title>
      <p>The aim of this work was to provide an effective way
of taking attendance of students and academic staff.
Biometric systems provide a very good opportunity to
improve classical authentication methods. While
passwords can be detected or forgotten, biometric
methods provide a safe and fast way for personal
identification.</p>
      <p>In this paper we built an authentication prototype of
users in a desktop application that manages a real
business situation. The prototype uses JAVA-based
technology and client-server architecture through the
internal network of faculty.</p>
      <p>Students and lecturers can register their presence using
their fingerprints and the application it is able to
compare different templates in database.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>[Alh15] M. Alhothaily</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Alradaey</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Oqbah</surname>
            ,
            <given-names>A. ElKustaban.</given-names>
          </string-name>
          <article-title>Fingerprint Attendance System for Educational Institutes</article-title>
          .
          <source>Journal of Science and Technology</source>
          ,
          <volume>20</volume>
          (
          <issue>1</issue>
          ):
          <fpage>34</fpage>
          -
          <lpage>44</lpage>
          , June 2015
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [Das17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dasgupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Arunava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Nag. Biometric</given-names>
            <surname>Authentication</surname>
          </string-name>
          .
          <source>Advances in User Authentication, Infosys Science Foundation Series</source>
          . Springer:
          <fpage>77</fpage>
          -
          <lpage>78</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [Eze13]
          <string-name>
            <given-names>U.</given-names>
            <surname>Eze</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. C. Joe-Uzuegbu</surname>
            ,
            <given-names>D.K</given-names>
          </string-name>
          <string-name>
            <surname>Opara</surname>
          </string-name>
          .
          <article-title>Biometric-based Attendance System with Remote Real-time Monitoring for Tertiary Institutions in Developing Countries</article-title>
          . IEEE International Conference on Emerging &amp;
          <article-title>Sustainable Technologies for Power &amp; ICT in a Developing Society</article-title>
          . November 2013
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [Harr16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Harries</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Eslambolchilar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Retttie</surname>
          </string-name>
          , Ch. Stride,
          <string-name>
            <given-names>S.</given-names>
            <surname>Walton</surname>
          </string-name>
          , H. C. van Woerden.
          <source>BMC Public Health</source>
          ,
          <volume>16</volume>
          (
          <issue>1</issue>
          ):
          <fpage>925</fpage>
          ,
          <year>September 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Kir17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kirmani</surname>
          </string-name>
          .
          <source>Impact of Biometric Attendance System on Secondary and Higher Secondary Educational Institutions Across J&amp;K. Oriental Journal of Computer Science and Technology</source>
          ,
          <volume>10</volume>
          (
          <issue>2</issue>
          ):
          <fpage>291</fpage>
          -
          <lpage>297</lpage>
          , June 2017
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [Oye18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Oyebola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Olabisi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Adewale</surname>
          </string-name>
          . Bassil.
          <article-title>Fingerprint for Personal Identification: A Developed System for Students Attendance Information Management</article-title>
          .
          <source>American Journal of Embedded Systems and Applications</source>
          ,
          <volume>6</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Rah18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rahman</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Science</surname>
          </string-name>
          and Technology,
          <volume>2</volume>
          :
          <fpage>90</fpage>
          -
          <lpage>94</lpage>
          , January
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>