Android Class Attendance Management System
Chapter One
OBJECTIVE OF THE STUDY
- Eliminate duplicate data entry and errors in time and attendance entries.
- Eliminate paperwork and save time.
- Automatic calculation of attendance.
- To increase student academy performance.
CHAPTER TWO
LITERATURE REVIEW
What is Android?
Android is a Linux-based operating system developed for smart phones or tablet computers. It is a stack of software that includes operating system, middleware and libraries and APIs written in C. It was developed by Google and Open Handset Alliance in July, 2005. Android is an open source and Google releases the source code under Apache license. This open source and free license allow the manufacturers and the enthusiastic developers to freely develop and modify their applications in Java-like language that utilizes Google-developed Java libraries.
The Android applications are developed using the Android software development kit(SDK). The SDK includes a comprehensive set of development tools which includesa debugger, software libraries, a handset based emulator which is based on QEMU(Quick EMUlator) and tutorials. The integrated development environment (IDE)which is officially supported for Android apps development is Eclipse which uses theAndroid Development Tools (ADT) plugin. The following are the several features which help in the development of Android applications:
Features of Android
Application Framework
Android application framework is supported by number of open source libraries likeOpenSSL, SQLite, and Libc. The application framework is also supported by theAndroid core libraries. The framework is based on UNIX file system permissionswhich ensures security as the applications can have only those abilities that mobilephone owner give at the time of installation. The application framework enables thereuse and replacement of components.[1]
CHAPTER THREE
METHODOLOGY AND ANALYSIS OF THE EXISTING
GENERAL DESCRIPTION OF THE EXISTING SYSTEM
The existing system of class attendance is manual in nature. Tools used are a paper and pen. The course representative or the course lecturer takes out and paper and pen to collect attendance information from students. The attendance sheet is usually passed round for students to write down their names and sign their signatures, or a roll call format is used by the lecturer/course representative.
CHAPTER FOUR
THE SYSTEM SOFTWARE
The system hardware as designed cannot function without a software program. The software covers the control instructions needed by the atmega 328P-PU to control its peripherals and a range of other activities. The developmentof the software is a cyclic process which demands a systematic and sequential approach. The waterfall model approach of software development was employed. Thismodel helped to decompose the software development into phases. The diagrammatic illustration of the waterfall model is shown in figure 4.1
CHAPTER FIVE
CONSTRUCTION, TESTS, RESULTS, CONCLUSION AND RECOMMENDATION
IMPLEMENTATION
The implementation of this project involved several stages which are;
1) Simulation
2) Software development
4) Testing
SIMULATION
The designed Application was simulated using Android Studio so as to determine whether the application would work in the desired manner if bread boarded and subsequently soldered.
SOFTWARE DEVELOPMENT
After soldering, the software was developed using Android Studio and MySQLite. A communication port was created for interfacing the software with hardware.
TESTS
The physical realization of the system is very vital. This is where the fantasy of the whole idea meets reality. The designer will see his or her work not just on paper but also as a finished hardware. After carrying out all the paper design and analysis, the project was implemented and tested to ensure its working ability, and was finally constructed to meet desired specifications.
All sections of the system were tested starting with the administrative part of the attendance. The test results shows that the system is effective and it has a fast response. There was no false identification of students, few cases of false reject which was later accepted and only pre-registered students were authenticated. The matric of the identified students were enrolled for attendance automatically.
The system was tested using the bio-data and fingerprints collected from eighty (20) students. In the test, there was no false acceptance i.e. a person that was not pre-registered was not falsely enrolled for attendance. There were a few false rejections during the test in which the system failed to identify some pre-registered users. The false rejects could be attributed to improper placement of the finger on the scanner and fingers that have been slightly scarred due to injuries. The test of the 20 students was carried out 8 times in groups of 10 and a success rate of over 94% was obtained from the tests carried out. The results of the test are shown below in the chart.
REFERENCES
- BERRY, J.. 1994. The history and development of fingerprintingin Advances in Fingerprint Technology. In: H.C. LEE and R.E. GAENSSLEN, Florida: CRC Press, pp. 1-38.
- BHARGAV-SPANTZEL. A.. SQIJICCIARINI. A. and BERTINO. E.. 2010. Biometrics-Based Identifiers for Digital Identity Management. . pp. 84-97.
- BOATWRIGHT. M. and LUO, X.. 2007. What Do We Know About Biometrics Authentication?Information Sec,.irirv Curriculum Development Conference. 2 8-29 September 2007 2007. ACM.
- CAVOUKIAN. A.. 2008. Fingerprint Biometrics: Address Privacy Before Deployment. Torento: Information and Privacy Commissioner of Ontario.
- IBG. 2002. Comparative Biometric Testing. New York: International Biometrics Group.
- KLOKOVA. A.. 2010. COMPARISON OF 1ARIOUS BIOMETRIC METHODS. Southampton: Interactive Multimedia Systems, Electronics and Computer Science. LTniversity of Southampton.
- KOTHAVALE. M.. MARKWORTH. R. and SANDHU. P., 2004-last update, Computer Security SS3: Biometric Authentication. Available: http ://www.cs.bham .ac.tik[ mdr/teacbing/modules03/securitv/snidents/SS 3/handout!.
- MALTONL D.. MAJO. D.. K. JAIN.A. and PRABHAKAR. S.. 2009. Handbook of Fingerprint Recognition. Second edn. London: Springer.
- MORDINI. E. and PETRINI, C., 2007. Ethical and social implications of biometric identification technolo. 43(1). pp. 5-11.
- NATIONAL SCIENCE & TECHNOLOGY COUNCIL SUBCOMMITTEE ON BIOMETRICS &IDENTITY MANAGEMENT, 2005-last update. Biometrics info. Available: www.biometrics.gov.
- NEWMAN. R.. 2010. Security and Access Control using Biometrics Technologies. 1st edn. Boston: C language Learning.
- OGORMAN, L., 2002-last update, FINGERPRINT VERIFICATION [Homepage of Michigan State University], [Online]. Available: http ://www.cse.nìsu.eduí—cse89 1/Sect6O 1/textbookl2 .pdf.