Josh Final Report
Josh Final Report
This Project report is submitted in partial fulfilment of the academic requirements for the
Approval of the degree of Bachelor Technology in Electrical and Electronic Engineering.
I declare that this work has not been previously submitted and approved for the award of a
bachelor’s degree by this or any other University. To the best of my knowledge and belief, the
work contains no material previously published or written by another person except where due
reference is made in the work itself.
Student’s signature:
………………………………….………….. [Signature]
………………………………….………….. [Date]
Approval
Supervisor’s signature:
………………………………….………….. [Signature]
………………………………….………….. [Date]
ii
ABSTRACT
Class attendance is a very crucial factor if a student wants to succeed. When a student attends
class, they are able to engage in a form of learning known as active learning which is a type of
learning where students engage with course materials, discussions etc. The Technical University
of Mombasa (TUM) is a renowned institution that is associated with offering high quality
education. However, it has had challenges in recording class attendance using the manual signing
sheets where students sign against their name after which the lecturer physically keys in the
attendance into the system.
This method proves to be a challenge as students are able to sign for each other that leads to
dismal academic performance. The aim of this project is to develop a fully functional fingerprint-
based system where student’s attendance is captured accurately and signing for each other is
avoided by the use of a biometric fingerprint scanner. The system methodology that will be used
is incremental development. This is because there is great interaction between end users and the
server. There is also high customer satisfaction and high product methodology. Functionality and
usability of the system will be tested to help establish whether the system user needs are
adequately realized. Through the use of a fingerprint-based system, which uses a biometric
fingerprint scanner data, accuracy will be enhanced as well as solving the problem of students
signing for each other.
iii
DEDICATION
This work is dedicated to God Almighty for His Faithfulness and Mercies, my respective family
and lecturers who have taken the initiative to support me from the beginning to seeing this
project a success in the end.
iv
TABLE OF CONTENT
DECLARATION AND APPROVAL.............................................................................................ii
ABSTRACT...................................................................................................................................iii
DEDICATION................................................................................................................................iv
LIST OF FIGURES........................................................................................................................vi
List of Abbreviations.....................................................................................................................vii
CHAPTER 1....................................................................................................................................1
1.1 Introduction.......................................................................................................................1
1.2 Problem Statement.................................................................................................................1
1.3 Objective of the study............................................................................................................2
1.4 Specific Objectives................................................................................................................3
1.5 Justification............................................................................................................................3
1.6 Motivation of study................................................................................................................3
CHAPTER 2....................................................................................................................................4
2. Literature Review....................................................................................................................4
2.1 Introduction............................................................................................................................4
2.2 Review of Automated Class Attendance Capturing Systems................................................6
2.2.1 Attendance Monitoring System Using Face Recognition and Face Detection...............6
2.2.2 Attendance System Using RFID Technology Radio Frequency Identification
Technology (RFID).................................................................................................................7
2.2.3 Smart Attendance System Using QR Code....................................................................8
2.2.4 Attendance Management Using Biometrics with SMS Alert.........................................9
2.3 Gaps in Existing Technologies............................................................................................10
2.3.1 RFID Technology.........................................................................................................10
2.3.2 QR Codes Technology..................................................................................................10
2.4 How the Proposed System will solve the Gaps in Existing Technologies..........................10
2.7 Conceptual Framework........................................................................................................11
2.8 Interpretive Summary of the Literature Review..................................................................12
CHAPTER 3..................................................................................................................................14
3.0 Research Methodology........................................................................................................14
3.1 Introduction..........................................................................................................................14
3.2 System design......................................................................................................................14
3.2.1 Understanding the circuit DESIGN operation..............................................................15
3.2.1 Software description.....................................................................................................27
v
3.2.3 Circuit Simulation.........................................................................................................28
3.3 System Development...........................................................................................................30
3.4 Flowchart System................................................................................................................30
3.5 System Testing and Results.................................................................................................31
CHAPTER 4..................................................................................................................................32
RESULTS AND DISCUSSION................................................................................................32
4.1.1 Component Integration.................................................................................................32
4.1.2 Pin Configuration..........................................................................................................32
5.0 CONCLUSIONS AND RECOMMENDATIONS..................................................................36
5.1 Conclusion...........................................................................................................................36
5.2 RECOMMENDATIONS.................................................................................................36
References..................................................................................................................................37
APPENDIX....................................................................................................................................38
LIST OF FIGURES
Figure 2.1: correlation between class attendance and student performance graphical
representation...................................................................................................................................4
Figure 2.2: A Block Diagram Showing the Attendance System Using Face Detection And
Recognition (Kowsalya et al., 2019)...............................................................................................5
Figure 2.3: A Block Diagram of the Attendance System Using RFID Technology (D. et al.,
2018)................................................................................................................................................6
Figure 2.4: A Block Diagram of the Attendance System Using QR Code (Patel et al., 2019).......6
vi
Figure2.5 : A Block Diagram of the Attendance System Using Biometrics with SMS Alert
(Desai, 2018.....................................................................................................................................7
Figure 2.6: Block diagram of the system.........................................................................................8
Figure 2.7 Minutiae.........................................................................................................................9
Figure2.8: Other Fingerprint Characteristics.................................................................................10
Figure 2.9: A typical automated fingerprint recognition system...................................................10
List of Abbreviations
ID- Identification
vii
LCD- Liquid Crystal Display
viii
CHAPTER 1
1.1 INTRODUCTION
Biometric technology uniquely identifies an individual based on certain characteristics which can
be physiological or behavioural. These techniques use data that is unique to the individual and
remains so throughout one’s lifetime. Fingerprints are emerging as the most popular biometrics
technology due to its uniqueness, stability, permanence and ease of acquisition.
Biometrics technology can solve these problems and the proposed fingerprint-based attendance
system would be ideal for implementation in universities for identification and also by
organizations for attendance monitoring of their employees. Proposed system is designed using
Arduino UNO and optical fingerprint acquisition module. Finger prints are unique in nature, it
gives attendance for only those who gave a fingerprint access while attendance time. Wi-Fi
module is used for immediate data transfer to the backend server. A data, which is the student ID
is sent to the microcontroller will be decoded using Wi-Fi Module to the access point. The
attendance data in the database is used to create many types of reports like specific day
attendance, current day attendance, monthly attendance, weekly attendance, complete attendance
and real time
1
the signing sheet. The attendance list is then handed to students during class who then physically
sign against their name. The attendance is then keyed in by the lecturers into the attendance
platform.
However, this method has proved to be inefficient because students can be able to sign for each
other when their classmates have not attended class. When students miss class, they miss out on
important information that a lecturer is teaching which results in dismal academic performance.
Reviews from the article by (Lukkarinen et al., 2016) showed that there are students who miss
class because of compelling reasons and those with no reason. The students who miss class
because of compelling reasons end up studying independently and passing their examinations but
those with no reason usually have a significant drop in their academic performance. In addition
to students lagging behind on academics, students who do not attend class are likely to get in
trouble with the law.
A study by Rodel Community Scholars at Arizona University who tracked students from
kindergarten, through high school and university found drop out patterns that were linked with
the attendance. Another challenge caused by the current method is that it consumes a lot of
resources, which the university caters for such as printing paper.
A study by Richard (2011) stated that manual systems usually take up more effort, resources as
well as physical space. Lastly, when students sign for those who are not in class, the lecturer is
unable to gage their progress as well as help them build their skills. Therefore, there was a need
for a comprehensive fingerprint-based system that will be able to capture students’ attendance
accurately and also prevent signing for each other through the use of biometrics.
2
1.4 SPECIFIC OBJECTIVES
Identify the problems that the lecturers experience when taking attendance using the
manual signing sheets.
Review platforms/technologies that are used in the recording of student attendance in
universities.
Develop a fingerprint-based system that will be able to capture students’ attendance
accurately and also prevent students signing for each other through the use of a biometric
fingerprint scanner.
Test the developed information system using black box testing.
1.5 JUSTIFICATION
In order to avoid dispute on attendance, the system will provide a more accurate and valid
account of attendance. This is because the system will be able to authenticate the attendance of
the students through the use of a fingerprint scanner and students will not be able to sign for each
other.
In addition, the risk of errors and data inaccuracy will be eradicated by the use of this system.
Lastly by use of this system, the University will be able to save up a lot of money, which is used
in resources such as printing paper.
3
CHAPTER 2
2. LITERATURE REVIEW
2.1 INTRODUCTION
This chapter aims to review the class attendance system that is used in The Technical University
of Mombasa. We study the correlation between class attendance and student performance.
Lastly, we also study other class attendance systems that exist and challenges faced with these
attendance systems.
Using exceptional writings that are made by researchers, one is able to acquire information from
them and draw conclusions based on what one has read.
4
In addition, this mode of capturing class attendance has no means of corroboration as it then
results in the outcome of students signing on behalf of other students who may have failed to
attend class. This leads to incorrect and flawed representation of the actual numbers of students
who attend class.
Another challenge encountered by lecturers using the manual signing sheets is that when
students miss classes, the lecturer is unable to gage their progress as well as build their skills.
The student misses out on important information that is relayed in class as well as key pointers
and guidelines that are given on how to tackle a particular topic or examination.
Lastly, when students do not attend class it affects their performance in examinations. A study by
(Bai et al., 2018) showed that students who attended class regularly gained additional knowledge
and other in-class support and resources. They were well organized, motivated and performed
better in their examinations. In addition, they expected that students who missed classes would
check the website more regularly to catch up on what they had missed. However, it was the
opposite as the students ended up performing poorly in the examinations. This shows that there is
a positive correlation between class attendance and student performance.
A study was conducted by (Crede et al, 2010), where they investigated the relationship between
class attendance and performance in the university. They used data from a course in a certain
university that was not mandatory to attend classes. The methods that they used were cluster
analysis and regression analysis. In addition, they used three distinct groups, students who drop
out before final examination, those who attend classes as well as the examination and those who
study on their own but miss classes due to compelling reasons. The results were that those
5
students who attended classes passed their examinations and those who missed classes due to
compelling reasons also passed their examinations. However, the students who missed classes
without compelling reasons failed the examinations. This shows that there is a correlation
between class attendance and student performance. Figure 2.1 below shows the correlation
between class attendance and student performance.
Figure 2.1: correlation between class attendance and student performance graphical representation
Figure 2.1: correlation between class attendance and student performance graphical
representation
2.2.1 Attendance Monitoring System Using Face Recognition and Face Detection
According to the article by (Kowsalya et al., 2019) attendance monitoring is very important in
almost all organizations and institutions. They were able to come up with an automated process
of capturing class attendance in school. The system could not only be used for class attendance
but also monitoring employees. In the working of the system, the students marked their
attendance in class using face recognition, the system would recognise the face of the students,
which is then updated in MySQL database.
6
A biometric method was used for eyeball detection where an eyeball sensor is used and the
image of the eyeball is then stored in the database. Student faces were already pre-stored in the
database. In addition, a student was required to carry a phone that had a GPS system. The
advantage of this system was that it saved on time and effort needed to record the attendance
manually. Figure 2.2 below shows the block diagram of the attendance system using face
recognition and detection
Figure 2.2: A Block Diagram Showing the Attendance System Using Face Detection And Recognition (Kowsalya et al., 2019)
RFID is a technology that transmits data using radio waves from an RFID tag attached to an
object by the reader for tracking and identifying objects which consists of the reader and the tags.
Reviews from the article by (D. et al., 2018) show that RFID technology has grown rapidly in
decades along with the demand from modern industry where data accuracy and consistency is
required.
The RFID technology has been applied in class attendance monitoring system according to this
article the student has an RFID tag and puts it near an RFID reader. The ID results from the
RFID reader would be sent to the microcontroller, which would then be compared to the student
data stored in the memory. If the data ID is a lecture participant, then the students name would be
displayed using LCD display and by use of a Wi-Fi module controller, the student’s attendance
data is sent to a cloud database. By use of this technology, data implementation took place faster
7
than the manual way of using signing sheets. Figure 2.3 below shows the block diagram of how
the attendance system using RFID worked.
Figure 2.3: A Block Diagram of the Attendance System Using RFID Technology (D. et al., 2018)
QR codes have a wide array of applications in this evolving technology world. One of the ways
in which it can be used is in a student class attendance system. Reviews from the article by (Patel
et al., 2019) showed how it was implemented in monitoring class attendance.
They decided to use QR code because it is used to store massive information in a smaller space.
In addition, they were also able to secure authentication by using data-hiding algorithms with
embedded QR codes. Students were required to have smartphones so they can scan the QR code,
which would be displayed by the teacher. Once the student scanned the QR code, automatically
the attendance would be marked accordingly to the User ID. Figure 2.4 below shows the block
diagram of how the smart attendance system using QR code worked.
8
Figure 2.4: A Block Diagram of the Attendance System Using QR Code (Patel et al., 2019)
This system is able to take students’ attendance successfully by using fingerprints as well as
sending a notification to parents. Attendance data is stored in a database along with the updated
date and time. Additionally, an SMS notification is successfully sent to parent’s mobile using
GSM. Stored data of attendance is then used for calculating defaulters.
Figure 2.5 below shows the block diagram of how the attendance system using biometrics and
SMS alert works.
Figure2.5 : A Block Diagram of the Attendance System Using Biometrics with SMS Alert (Desai, 2018
9
2.3 GAPS IN EXISTING TECHNOLOGIES
There are a number of challenges associated with using RFID technology. According to
(Edusys, n.d.), The system is expensive because a lot of technology goes into making the system.
Secondly, in case of a large number of students, purchasing tags for everyone becomes rather
costly. Lastly, replacing the microchip, radio transceiver, antenna and battery in the system is
tiresome and costly.
QR Codes pose a number of challenges. Firstly, attackers can be able to encode malicious links.
Furthermore, a study by expert Ravi Borgaonkar demonstrated how Man-Machine-Interface
(MMI) codes was used to run different attacks against Samsung devices. Attackers were able to
encode the MMI code into a QR code to trigger the execution of the MMI code, which erases all
data from the mobile devices.
This study proves that QR codes are not as secure as attackers can use them.
2.4 HOW THE PROPOSED SYSTEM WILL SOLVE THE GAPS IN EXISTING
TECHNOLOGIES
The proposed system is to capture attendance using a fingerprint scanner. The proposed system
has a number of advantages. Fingerprint attendance systems waste no time in capturing
attendance, managing the attendance is automated meaning there is no chance for fake
attendance marking and the system is also easy to use.
In addition, biometrics eliminates the problems when an ID card is lost which is an advantage
over using RFID tags with the student IDs. Use of biometrics, security level is enhanced which is
another advantage over QR codes as the codes can be cracked. With the proposed system, data
accuracy and efficiency will be enhanced. There will be no falsification of records which occurs
when students sign for each other.
10
.
2.7 CONCEPTUAL FRAMEWORK
This is a conceptual diagram that shows how the proposed system will function. In the proposed
system, the administrator logs in to the system using their credentials. After that, the
administrator is able to add a new user, view users that already exist, mark attendance, and check
out their profile, which will consist of their name, their respective subject and other details.
Lastly, the administrator will also be able to view the attendance report. The application will
take information about the user such as the user’s name, contact details, user’s fingerprint then
the user’s finger print will be matched with a database on the server which will retrieve the date
and time. The fingerprint module is used to scan fingerprint of students. When a student scans
their fingerprint, their information is displayed on the screen of their phone. Later on, data gets
updates on the server automatically and an attendance report is generated. With the proposed
system, the use of a finger print scanner will be able to curb the problem of students signing for
each other when they are not in class. Additionally, data accuracy will be improved as it takes
the date and time of the attendance in real time.
11
Figure 2.94: Conceptual Diagram of The Proposed System
With this knowledge, academic institutions and researchers have been able to come up with
different solutions of improving the attendance system. In addition, previous studies have also
been carried out in regards to the development of class attendance systems, which put a lot of
emphasis on using automated systems such as the use of biometrics. Biometric systems provide
accurate identification and verification.
However, in some of the systems such as us of QR codes, there is insecurity as hackers can
crack the codes and in the case of using RFID technology, it is also costly to purchase the tags
for a large number of students. The case is different when it comes to use of a fingerprint scanner
to capture attendance, as it is cost-effective because small hand-held scanners are easy to set up
12
and benefit from a high level of accuracy. In addition, it is also easy to use, as it just requires
your fingerprints. Lastly, fingerprints are not transferrable which rules out sharing of passwords
and improves data accuracy. This in turn makes it possible to use this technology to capture
attendance of students.
13
CHAPTER 3
3.1 INTRODUCTION
This section basically highlights the objectives, as well as the factors and considerations that
were properly taken into account. In addition, the specifications for the design were also outlined
and these determined the choice of suitable materials and components that were purchased and
used in the design.
Generally, this section will briefly discuss the composite methodology under the following in
details:
System design
System construction
Design specification.
System testing and results
The first stage is that students will register by filling out the form, after which the
operator will enter the form data to the computer along with recording the fingerprint of
the student through the Fingerprint module onto the sheet of details. The operator will
send the data to the server to save to the database.
The second stage is carried out when students attend class, the first thing done before
officially starting a lecture is the students signing in by the system designed in the Class
Node supervised by lecturers who teach the subject. Then all student attendance data will
be sent from the Class Node through an SMS to the appropriate number and then the
presence attendance.
14
3.2.1 Understanding the circuit DESIGN operation
Today live fingerprint readers based on optical, thermal, silicon and ultrasonic approach are
used instead of old method of ink to capture the fingerprint. Fingerprint identification is based on
minutiae or location and direction of the ridge endings and bifurcations (splits) along a ridge
path.
The two commonly used Fingerprint matching techniques are minutiae-based matching and
pattern matching. Pattern matching just compares two images for checking similarity. Minutiae
matching relies on minutiae points i.e. location and direction of each point. Experimental results
15
show that fingerprint-based systems have very low FRR (False Rejection Rate) of 3 to 7% and
0.001 to 0.01% of FAR (False Acceptance Rate).
The pre-requisite to match the fingerprint is classification. The classification is treated as course
level matching. The fingerprint can be classified as whorl, right loop, arch, tented arch. In order
to ensure the performance of fingerprint identification, enhancement algorithms are needed to
improve clarity of input fingerprint images.
A fingerprint usually appears as a series of dark lines that represent the high, peaking portion of
the friction ridge skin, while the valleys between these ridges appears as white space and are the
low shallow portion of the friction ridge skin.
The images below present examples of fingerprint features and the mathematical model involved
Figure 2.6 shows two types of minutiae while figure 2.7 shows examples of other detailed
characteristics sometimes used during the automatic classification and minutiae extraction
processes. The types of information that can be collected from a fingerprint’s friction ridge
impression include the flow of the friction ridges (Level 1 Detail), the presence or absence of
features along the individual friction ridge paths and their sequence (Level 2 Detail), and the
intricate detail of a single ridge (Level 3 Detail).
16
Figure 2.7 Minutiae
17
How Fingerprint Recognition Works
Fingerprint images (FI) identification is realized on the basis of the templates, containing the
pattern features. Their basis is minutiae description in the form of beginnings and endings,
junctions and bifurcation of lines [5-7]. They can be detected by gray image, though in the
process of template creation they are guided by the lines skeleton [1, 5].
18
Image mathematical model should depend on necessary and sufficient quantity of features.
Minutiae and ridge count between minutiae are reputed as informative in dactyloscopy. However
they do not exhaust all the great number of mathematical models, used in Biometrics for
automatic proof of pattern individuality. Each of such models is focused to increase the
identification accuracy, but any better, free from defect model is not known. For example,
classical ridge count, which should be counted along the straight line due to сriminalistics, does
not stand up to criticism in the area of considerable curvature of pattern lines and in the area of
loops, deltas and whorls.
IMAGE TEMPLATE
The templates as a set of FI features are varied at different software producers. Some templates
formats are limited in minutiae quantity. Some features of templates are irrelevant but it is
possible to indicate their common property: the templates have features, being some metrics for
minutiae. These are ridge count between minutiae and topological vector for minutiae [5-7]. In
paper an image template is synthesized in the form of :
19
Definition 1. The skeleton of the line is simple circuit u,v with nodes u and v in 8- adjacency,
which is near geometrical center of the line, at that there are two adjacent nodes p2 and p3 for
each node p u,v 1 ∈ , at that the nodes 2 p and 3 p non-adjacent.
Definition 2. Ending is such node 1p of the skeleton, that there is one adjacent node 2 p for the
node 1p.
Definition 3. Bifurcation is such node p1 of the skeleton, that there are three adjacent nodes p2 ,
p3 and p4 for the node p1 , at that any two nodes from the multitude { , , } p2 p3 p4 are non-
adjacent in pairs. Elements of both topological vector and ridge count vector for line are
determined with endings and bifurcations, which are read from the skeleton nodes as nodes of
graph. These vectors are derivative from minutiae. However, all these vectors characterize not
the area of separately selected point, but common properties of point’s multitude or line segment.
In spite of the fact that the lists Ll and Lr characterize FI differently, they are alike in that they
represent description for all pattern lines, but not for all the lines points, which can be much
more in number. This interesting peculiarity allows synthesizing compact templates.
Features of the fingerprint sensors to be used
20
that it supports quad-band GSM/GPRS network, meaning it works pretty much anywhere in the
world.
At the heart of the module is a SIM800L GSM cellular chip from Simcom.
The operating voltage of the chip ranges from 3.4V to 4.4V, making it an ideal candidate for
direct LiPo battery supply. This makes it an excellent choice for embedding in projects with
limited space.
All the necessary data pins of the SIM800L GSM chip are broken out to a 0.1″ pitch headers,
including the pins required for communication with the microcontroller over the UART. The
module supports baud rates ranging from 1200 bps to 115200 bps and features automatic baud
rate detection.
The module requires an external antenna in order to connect to the network. So the module
usually comes with a helical antenna that can be soldered to it. The board also has a U.FL
connector If you wish to keep the antenna at a distance from the board.
Even though this module is incredibly small—only 1 square inch—it contains a surprising
number of features. Some of them are as follows:
21
Connect onto any global GSM network with any 2G SIM
Make and receive voice calls using an external 8Ω speaker & electret microphone
Transmit Power:
The SIM800L module has an LED that indicates the status of your cellular network. It will blink
at different rates depending on the state it is in.
Blink every 1s
The chip is running but hasn’t made a connection to the cellular network yet.
22
Blink every 2s
Blink every 3s
The module has made contact with the cellular network and can send/receive voice and SMS.
Choosing an Antenna
The SIM800L module requires an external antenna in order to connect to the network, so
choosing the right antenna is very important. There are two options available.
The first is a helical antenna that comes with the module and can be soldered directly to the PCB.
This antenna is very useful for space-constrained projects. However, difficulties may occur
establishing a connection, particularly if the project is indoors.
23
The GSM 800L module, like other GSM modules, requires a substantial and stable power supply
to function correctly. One of the critical components to ensure this stability is a large capacitor.
The need for this capacitor stems from the module's power consumption characteristics.
When the GSM module is in operation, particularly when it is transmitting data, it experiences
rapid and significant fluctuations in power demand. These spikes can be as high as 2A in short
bursts. If the power supply cannot accommodate these sudden changes, the voltage can drop
momentarily, leading to unreliable operation, resets, or complete failure of the module to
function.
A large capacitor helps to smooth out these fluctuations by acting as a reservoir of charge. When
the module draws a sudden spike of current, the capacitor discharges some of its stored energy to
supplement the power supply, thereby maintaining a steady voltage level. This ensures that the
GSM module continues to operate reliably even during high current demands.
Without this capacitor, the power supply might not respond quickly enough to the transient
spikes, resulting in voltage dips that can disrupt the module's operation. Thus, incorporating a
large capacitor into the circuit design is crucial for maintaining the GSM 800L module's
performance and reliability, particularly in applications where a stable communication link is
essential.
24
For the GSM 800L module, it is recommended to use capacitors with the following values to
ensure stable operation:
25
Figure 2.92 Arduino Uno board
26
Features
1. The operating voltage of this LCD is 4.7V-5.3V
2. It includes two rows where each row can produce 16-characters.
3. The utilization of current is 1mA with no backlight
4. Every character can be built with a 5×8 pixel box
5. The alphanumeric LCDs alphabets & numbers
27
3.2.1 Software description
In this system, Arduino IDE, Microsoft Access Database and Visual Basic are used. Microsoft
Access is a database management system (DBMS). Microsoft Access stores data in its own
format based on the Access Jet Database Engine. Microsoft Visual Basic is a free development
tool that can help in designing and programming simple or complex applications. It has a nice,
good interface to be desired and is optimized to work quickly. Codes easily added either by
directly writing or by using a GUI.
Code
The Biometric attendance system coding is developed as a stand-alone system. The programs for
software implementation written in C++ language were developed to decode the information
from the fingerprint sensor, to the LCD display and through the GSM to manipulate the state of
each instant operation on the system at a given time using the Arduino integrated development
environment as shown in the figure 2.9.3 below. Find the code used for the Arduino uno and the
GSM at the appendix section.
FIG 3.1
28
3.2.3 Circuit Simulation
After designing the circuit, a test or simulation is carried out to visualize what the expected, fully
working of the project and satisfactory result analysis is done before proceeding to the final stage
of making the project prototype.
During the simulation of the fingerprint sensor project in Proteus, various components interact to
mimic the real-world functionality of the system. The Arduino Uno and the GSM
microcontroller serve as the central hubs, orchestrating the operations of the entire system. The
Arduino Uno is responsible for receiving data from the fingerprint sensor, while the GSM
handles wireless communication and data transmission.
When the simulation begins, the Arduino Uno initializes both the fingerprint sensor and the LCD
display. The fingerprint sensor, which is connected to the Arduino via serial communication
pins, awaits input. The LCD display, connected to the Arduino through digital pins, provides
visual feedback to the user.
As the user interacts with the simulation, they are prompted to place their finger on the
fingerprint sensor. The sensor captures the fingerprint image and processes it to create a unique
template. This template is then sent to the Arduino, which stores it in its memory. The Arduino
manages and compares these templates to identify matches.
The LCD display plays a crucial role by providing real-time status updates to the user. It might
display messages such as "Place finger on sensor," "Fingerprint captured," "Matching...," and
FIG 3.2
29
"Match found" or "No match," depending on the outcome of the comparison. This feedback loop
ensures that the user is informed of the system’s status and actions at all times.
The GSM, connected to the Arduino, enables wireless communication. It can send data from the
Arduino to a remote server or receive commands from a remote device. This feature allows the
fingerprint data or system status to be monitored and controlled remotely, enhancing the
functionality and flexibility of the system.
Connecting wires ensure proper communication and power supply between the components. The
5V power supply stabilizes the voltage necessary for the Arduino and the fingerprint sensor to
operate correctly. The seamless interaction between the Arduino Uno, GSM, sensor, display, and
power components within the Proteus environment illustrates the practical functioning of the
fingerprint recognition system.
In summary, the Proteus simulation demonstrates how the Arduino Uno manages the fingerprint
sensor data, communicates results via the LCD display, and collaborates with the GSM for
wireless capabilities, showcasing the integrated functionality of hardware and software in a
controlled virtual environment.
30
successful, students will be present at the lecture, then the data will be sent via the GSM module
to data storage system. After that, the lecture system is closed.
The process of running this research begins with modelling the Internet of Things and
Fingerprint which is used for the implementation of fingerprint sensitization. The work system of
this modelling begins with scanning the finger of the student, then fingerprint automatically
detects the student's fingerprint when doing the presence, then the results of the scanning process
are automatically stored in a backend server.
31
stage, the data will be saved in the fingerprint scanner and the verification system takes place by
comparing the captured fingerprint characteristic with the previously enrolled data. LCD displays
the status and details of each student during the enrolment and attendance marking process.
32
CHAPTER 4
The design and implementation of the Fingerprint-Based Class Attendance System were divided
into several stages. The microcontroller used for this project was the Arduino UNO, chosen for
its simplicity and ease of use. This chapter details the integration of the system’s components and
presents the test results.
Fingerprint Module: The fingerprint module captures and verifies fingerprints, which are unique
to each student.
Arduino UNO: The Arduino UNO processes the fingerprint data received from the fingerprint
module.
GSM Module: The GSM module sends the processed attendance data to the backend server for
storage and analysis.
LCD Display: The LCD display provides real-time feedback on the fingerprint scan status.
Power Supply: A stable power supply ensures consistent operation of all system components.
The tables below show the pin configurations used to connect the various components to the
Arduino UNO.
33
Table 4.1: Arduino UNO to Fingerprint Module
34
fingerprint module’s memory. The system ensures the fingerprint is unique and securely
saved.
3. Attendance Recording: When a student places their finger on the fingerprint sensor, the
system verifies the fingerprint against the stored data. If the fingerprint matches, the
attendance is recorded, and the data is sent to the backend server via the GSM module.
The LCD display shows a confirmation message.
4. Data Transmission: The GSM module ensures that the recorded attendance data is
promptly sent to the backend server(Mobile phone) for storage and further analysis. This
enables real-time attendance tracking and reporting.
5. Real-Time Feedback: The LCD display provides real-time feedback on the status of the
fingerprint scan, including success, failure, or if the fingerprint is not recognized.
35
4.5 Operation Pictures
Below are the operation pictures of the completed system design and implementation:
36
5.0 CONCLUSIONS AND RECOMMENDATIONS.
5.1 CONCLUSION
The recent method used by different institutions including the technical university of Mombasa
to capture student attendance has proved to be quite inefficient due to factors such as students
signing for each other, students missing classes which results in dismal performance and also
lecturers are unable to gage progress of students when they miss classes. Therefore, the need for
an efficient information system is vital so that student attendance can be captured accurately and
efficiently.
The fingerprint-based student attendance system with a biometric fingerprint scanner will
therefore be of great significance, as student attendance will be captured accurately. From the
analysis taken in regards to the project variables, which include time, cost, and scope, the
methodology used in developing the system is incremental methodology. The methodology
involves minimal planning unlike other methodologies which takes planning as a phase and also
incremental methodology which allows incorporation of changes within the development process
which in turn makes iteration process possible in all phases. With all these factors combined, the
developed system will be able to address the challenges that institutions face when capturing
student attendance.
5.2 RECOMMENDATIONS
Based on the development and testing of the Fingerprint-Based Class Attendance System,
several areas for future improvement and expansion have been identified. The following
recommendations are suggested to enhance the system’s functionality and applicability:
Integration with Existing School Management Systems
37
Future work should focus on integrating the attendance system with existing school management
systems. This would enable seamless data synchronization, allowing for real-time updates and
comprehensive attendance reporting. An API could be developed to facilitate this integration.
REFERENCES
1] NarraDhanalakshmi and SaketiGoutham Kumar, ―Aadhaar Based Biometric Attendance System Using
Wireless ngerprint Terminals‖, 2017 IEEE 7th International Advance Computing Conference, DOI
10.1109/IACC.2017.128 978- 1-5090-1560-3/17 $31.00 © 2017 IEEE
38
[2] Omar Abdul RhmanSalim, RashidahFunkeOlanrewaju, Wasiu Adebayo Balogun―Class Attendance
Management System Using Face Recognition, Motion Sensor and Android with Gesture based Controls
―2018 7th International Conference on Computer and Communication Engineering (ICCCE) Volume 8,
978-1- 5386-6992-1/18/$31.00 ©2018 IEEE.
[3] Sri MadhuB.M,KavyaKanagotagi ―IoTbased Automatic Attendance Management
System‖International Conference on Current Trends in Computer, Electrical, Electronics and
Communication (ICCTCEEC-2017), Vol. 6 978-1-5386-3243-7/17/$31.00 ©2017 IEEE.
[4] K.LakshmiSudha, ShirishShinde, Titus Thomas, ArisAbdugani, ―Barcode based Student Attendance
System,‖International Journal of Computer Applications (0975–8887),Volume 119–No.2, June 2015.
[5] KarthikKrishnamurthi, S. Irudaya Mary, B. N. Sumalatha,Adler Pereira, ―Fingerprint based attendance
system,‖International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4,
Issue 3, March 2015.
[6] SeemaRao, Prof.K.J.Satoa, ―An attendance monitoring system using biometrics authentication,‖
International.
Desai, V. (2018). Attendance Management using Biometrics with SMS Alerts. International Journal for
Research in Applied Science and Engineering Technology, 6, 3468–3471.
https://doi.org/10.22214/ijraset.2018.1483
39
APPENDIX
40
lcd.clear();
lcd.setCursor(0, 0);
lcd.print("No space");
lcd.setCursor(0, 1);
lcd.print("Del templates");
delay(1500);
} else {
enrollUser();
}
delay(1500);
} else if (key == 2) { // Scan user
scanUser();
delay(1000);
}
}
void initializeEEPROM() {
for (int i = 1; i <= 160; i++) {
if (EEPROM.read(i) != 0 && EEPROM.read(i) != 1) {
EEPROM.write(i, 0);
}
}
}
void showMenu() {
lcd.clear();
lcd.setCursor(0, 0);
lcd.print("1:Enroll 2:Scan");
}
int getKey() {
if (digitalRead(buttonPin8) == LOW) {
delay(50); // Debounce delay
if (digitalRead(buttonPin8) == LOW) {
return 1;
}
} else if (digitalRead(buttonPin9) == LOW) {
delay(50); // Debounce delay
if (digitalRead(buttonPin9) == LOW) {
return 2;
}
} else if (digitalRead(buttonPin10) == LOW) {
41
delay(50); // Debounce delay
if (digitalRead(buttonPin10) == LOW) {
return 3;
}
} else if (digitalRead(buttonPin11) == LOW) {
delay(50); // Debounce delay
if (digitalRead(buttonPin11) == LOW) {
return 4;
}
} return 0;
}
int getId() {
for (id = 1; id <= 160; id++) {
if (EEPROM.read(id) == 0) {
return id;
}
}
return 0;
}
void reserveId(int id) {
EEPROM.write(id, 1);
}
void enrollUser() {
lcd.clear();
lcd.setCursor(0, 0);
lcd.print("Enrolling User");
lcd.setCursor(0, 1);
lcd.print("ID: ");
lcd.print(id);
reserveId(id);
delay(2000);
}
void scanUser() {
lcd.clear();
lcd.setCursor(0, 0);
lcd.print("Scanning User");
delay(2000);
lcd.setCursor(0, 1);
42
int scannedId = random(1, 161); // Simulating a scanned ID
lcd.print("ID: ");
lcd.print(scannedId);
if (EEPROM.read(scannedId) == 1) {
lcd.setCursor(0, 1);
lcd.print("Welcome, ID ");
lcd.print(scannedId);
} else {
lcd.setCursor(0, 1);
lcd.print("Not recognized");
}
delay(2000);
}
43
if (Serial.available()) {
// Read data from the serial monitor and send it to the GSM module
mySerial.write(Serial.read());
}
if (mySerial.available()) {
// Read data from the GSM module and send it to the serial monitor
Serial.write(mySerial.read());
}
// Function to send a message
sendSMS("RecipientPhoneNumber", "This is a test message from Arduino GSM module.");
// Prevent flooding the GSM network with messages
delay(60000); // Send a message every 60 seconds
}
void sendSMS(String number, String message) {
mySerial.println("AT+CMGF=1"); // Set SMS to text mode
delay(1000);
mySerial.println("AT+CMGS=\"" + number + "\""); // Specify the recipient's phone number
delay(1000);
mySerial.println(message); // Send the SMS message
delay(1000);
mySerial.write(26); // ASCII code of CTRL+Z to indicate the end of the message
delay(1000);
Serial.println("Message sent.");
}
44