FINGERPRINT EMPLOYEE CLOCKING SYSTEM FOR UNIVERSITIES
DOI:
https://doi.org/10.29121/ijetmr.v7.i11.2020.819Keywords:
Fingerprint, Biometric Data, Employee Attendance, Employee Clocking System, Truancy Of EmployeesAbstract
A system that is used for time-clocking, creating an all-inclusive electronic record of the process involved in how employees logs in and out of work on working days are referred to as a clocking system. The system has an additional feature of calculating an accurate payroll system, which in turn, can lead to a precise amount the company spent on labour. In essence, an employee clocking system is a process of monitoring the attendance, presence and truancy of employees in a work environment. In this project, the University of Energy and Natural Resources was used as a case study. The existing method of recording the presence of staff to work is by a manual process where employees record their attendance on a paper. The challenge of the current employee attendance system is the difficulty in tracing old records, safekeeping, lack of confidentiality and the chances of other employees logging in for their truant colleagues. This paper sought to introduce a biometric employee clocking system to help overcome the high level of truancy in workplaces. The results of the experiment we conducted indicate a high accuracy in our system with TAR value of 99.7%. This accuracy rate is much better than the results other researchers obtained. The excellent accuracy implies that employees will have difficulty to check-in or out for their truant colleagues. The high accuracy results will help improved security of attendance, improved employee performance, ensures fast and easy retrieval of data, easy monitoring of staff, and prevent impersonation in the attendance logs.
Downloads
References
Abhilash K. Sharma, (2015). Biometric System – A Review. International Journal of Computer Science and Information Technologies, September, 2015.
Acuity Market Intelligence (2008). Biometrics: high-value workforce management: The critical role of biometric time and attendance to workforce management solutions, White Paper, February 2018.
W. Yang, J. Hu, and S. Wang, "A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement," IEEE Trans. Inf. Forensics Security, vol. 9, no. 7, pp. 1179–1192, Jul. 2017.
Tan, T. N., & Lee, H. (2019). High-secure fingerprint authentication system using ring-LWE cryptography. IEEE Access, 7, 23379-23387. DOI: https://doi.org/10.1109/ACCESS.2019.2899359
Pang, S., Jinchun, Y. E., Xu, H., & Li, H. (2019). U.S. Patent No. 10,496,804. Washington, DC: U.S. Patent and Trademark Office.
Harikrishnan, D., Sunil Kumar, N., Joseph, S., & Nair, K. K. (2019). Towards a fast and secure fingerprint authentication system based on a novel encoding scheme. The International Journal of Electrical Engineering & Education, 0020720919883803. DOI: https://doi.org/10.1177/0020720919883803
Liu, F., Zhao, Q., & Zhang, D. (2020). 3D Fingerprint Authentication. In Advanced Fingerprint Recognition: From 3D Shape to Ridge Detail (pp. 33-57). Springer, Singapore.
Adewole K., Adbulsalam S., Babatunde R., Shittu T. & Olotede M. (2014). Development of finger biometric attendance system for non-academic staff in a tertiary institution. Computer Engineering and Intelligent Systems Review, 5, 2.
Akinduyite C.O, Adetunmbi A.O, Olabode O.O. & Ibidunmoye E.O, (2013) Fingerprint-based attendance management system. Journal of Computer Sciences and Applications, 2013, 1(5), 100-105
Cupido, (2011). The implementation of a time and attendance system at Stellenbosch Municipality – a change management perspective masters project in public administration. University of Stellenbosch.
Danny Thakkar (2019). Biometric System, Biometrics Comparison – biometrics performance metrics can help you select the right biometric solution
Dermatoglyphics.org. (2017). 11 Basic Patterns of Fingerprint. [online] Available at: http://dermatoglyphics.org/11 Basic Patterns of Fingerprint / [Accessed 17 July. 2017].
Krishna Prasad, K. and Aithal, P. S. (2017). A Conceptual Study on User Identification and Verification Process Using Face Recognition Techniques. International Journal of Applied Engineering and Management Letters.
Krishna Prasad, K. and Aithal, P. S. (2017). Literature Review on Fingerprint Level 1 and Level 2 Features Enhancement to Improve Quality of Image. International Journal of Management, Technology and Social Sciences (I.J.M.T.S.), 2(2), 8.19. DOI: https://dx.doi.org/10.5281/zenodo.835608
Kuntal Barua, Samayita Bhattacharya, Kalyani Mali (2015). Fingerprint Identification, April,2015.
Karani, K. P., Aithal, P. S. (2017). A Conceptual Study on Image Enhancement Techniques for Fingerprint Images. International Journal of Applied Engineering and Management Letters (I.J.A.E.M.L.) ,1(1), 63-72. DOI: http://dx.doi.org/10.5281/zenodo.831678
Obansola O. Yemi, Makinde O. Ezekiel, Adeshina A. Henry & Adebayo O. Bunmi (2016) Development of Staff Attendance Management System Using Fingerprint Biometric Identification Technique, November, 2016. DOI: https://doi.org/10.15580/GJSETR.2016.3.101916185
Omobayo, A. (2015). Optimization of bimodal biometrics system for access control authentication in Kenya, School of Computing, College of Science, Engineering and technology, University of South Africa.
Ononiwu G. C.& Okorafor, G. N (2012). Radio frequency identification-based attendance system with automatic door unit. Academic Research International, 2(2), March, 2012.
Appiah, V., Nti, I. K., & Nyarko-Boateng, O. (2017). Investigating Websites and Web Application Vulnerabilities: Web master's Perspective. International Journal of Applied Information Systems (I.J.A.I.S.) – ISSN: 2249-0868 Foundation of Computer Science F.C.S., New York, U.S.A. Volume 12 – No. 3, June 2017. I.J.A.I.S. Publications.
Vincent Appiah, Michael Asante, Isaac Kofi Nti and Owusu Nyarko-Boateng (2018). Survey of Websites and Web Application Security Threats Using Vulnerability Assessment. Journal of Computer Science 2018. Science Publication. 2019, 15 (10): 1341.1354. DOI: 10.3844/jcssp.2019.1341.1354. DOI: https://doi.org/10.3844/jcssp.2019.1341.1354
Nyarko-Boateng, O., Asante, M., & Nti, I. K. (2017). Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization. International Journal of Science and Engineering Applications, volume 6 Issue 3, 2017. p88-94. ISSN-2319-7560. I.J.S.E.R. Publications
Owusu Nyarko-Boateng, Benjamin A. Weyori and Lord Anertei Tetteh (2020). Optimized Authentication Model for Online Transaction Payments. Science publications- Journal of Computer Science. Volume 16, Issue 2. Pages 225-234. DOI: 10.3844/jcssp.2020.225.234 DOI: https://doi.org/10.3844/jcssp.2020.225.234
Owusu Nyarko-Boateng, Alfred Kuranchie and Justice Anning (2017). The Relevance of E-Library Facility to the Delivery of Education at the High School: An Example from Ghana. International Journal of Scientific & Engineering Research. Vol 8, Issue 5, p 910-918. ISSN 2229-5518. I.J.S.E.R. Publications.
Nyarko-Boateng, O., & Adekoya, A. F. (2019). Evaluation and analysis of key performance indicators which affect the QoS of mobile call traffic. International Journal of Computer Networks (I.J.C.N.), 9 (1), 14-30
Published
How to Cite
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section