StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Based Attendance System for School of Technology and Management - Research Paper Example

Cite this document
Summary
The paper "Biometric Based Attendance System for School of Technology and Management" zeros on findings of biometric devices which mainly read fingerprints, their advantages, and disadvantages, which are indeed meant to better understand the devices an s there are many kinds…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful

Extract of sample "Biometric Based Attendance System for School of Technology and Management"

A Research Paper on Biometric Based Attendance System for School Of Technology and Management at Different Campuses. Name: Instructor: Course: Date: Introduction: This research paper presents a detailed project plan for developing biometric based attendance system for the school of technology and management at different campuses. The devices decided on are thirty five (35) wall mountable finger print scanner terminals for each of the classrooms that can accommodate 150 students at all campuses. The paper in particular zeros on findings about biometric devices which mainly read finger prints, their advantages and disadvantages, which are indeed meant to better understand the devices an s there are many kinds. The paper still provides; a spreadsheet showing the type of staff, number of hours they are allocated, total cost and material cost. It furthermore identifies the major tasks to be carried out in developing the entire system, the order of the tasks, and major risks that could affect the deliver of the project or cause to exceed the project budget, time scale or increase the required resource. Also included is the labour costs and a work break down structure (WBS) containing these costs, a WBS for the tasks which have tangible outcomes and a process breakdown structure (PBS) for the tasks that are process oriented. To crown it all, the WBS and PBS are linked so that one project manager can be able to manage the project. A project plan using project 2000, an organizational breakdown structure (OBS); a critical path analysis demonstrating the beginning to the end of the project, and a responsibility matrix are as well included. Biometric Devices, Types and Their Advantages and Disadvantages: A biometric device refers to a tool that can identify a person basing on his/her distinguishing physiological and/or behavioural characteristics (PB works 2007). The devices are more reliable as each and every person has got his/her own distinctive features. Generally, the devices consist of three basic elements that comprise of; Enrolment, which is the process of biometric sample collection from for example the students; Template, which refers to the data representing the students; and Matching, which is the process of comparing a line biometric sample against one or many templates in the systems. These devices are expensive security solutions which have their own merits and demerits. The different types include; DNA recognition, Iris recognition, Retinal Scan devices, facial recognition, Voice recognition, Hand geometry recognition, Finger print recognition and signature recognition (PB works 2007). All these vary in prices, availability, devices required, accuracy and social acceptability, as shown in table 1 below. Source: PBworks 2007 Table 1: Comparison of various biometric systems basing on accuracy, cost, and devices required and social responsibility. The advantages and disadvantages of each particular biometric device are as below; The advantages of Facial Recognition are that, it is non-invasive, and it’s cheap. While its disadvantages are that; two dimensional recognition is influenced by alterations in lighting, the individual’s hair, age, as well as if the individual is wearing glasses; and it needs camera gear for the user identification; hence, it’s not liable unless standard equipment is installed. The advantages of Voice Recognition are that, it is non-invasive, high social acceptability; certification time is about 5 seconds; and it’s cheap. While its disadvantages are that; an individual’s voice can be simply recorded and used by an unlawful individual. Also its accuracy is low, and an illness for example flu can alter an individual’s voice, thus making unconditional identification difficult. The advantages of Signature Recognition are that; it is non-invasive, less time of verification, and it’s cheap. Meanwhile its disadvantages are that; it’s intended to authenticate area under discussions based on the characteristics of their distinctive signature. Hence person’s who don’t sign their names in a reliable way may have difficulty enrolling as well as verifying in this system. Also the error rate is one to fifty. The advantages of DNA Recognition are that; its accuracy is very high, thus it is impossible that the system can make mistakes, and it’s homogeneous. Meanwhile its disadvantages are that; it’s exceptionally invasive and very costly. The advantages of Retinal scanning are that; its accuracy is very high, there is no acknowledged way to duplicate a retina, and the eye from a dead individual would deteriorate very fast to be functional. Meanwhile its disadvantages are that; its very invasive, has the stigma of user’s opinion that it’s potentially damaging to the eye, evaluations of template records may take ten seconds depending on database size and it’s very costly. The advantages of Iris recognition are that; its accuracy is very high; authentication instance is normally less than five seconds. Meanwhile its disadvantages are that; it is intrusive, the database has to be of high memory since a lot of data has to be stored, and it is very expensive. The advantages of Finger print recognition are that; its accuracy is very high; it’s the most inexpensive biometric PC client verification method, it is most developed, easy to use, requires a minute storage space, and it is standardized. Meanwhile its disadvantages are that; to various individuals it is very intrusive because it is related to criminal identification, it may make mistakes with dryness and/or the dirtiness of the fingers. The advantages of Hand Geometry are that; although it needs particular hardware to utilize, its integration into other devices is easy, has no public attitude woes, and amount of data needed to identify a user is the minute by far. Meanwhile its disadvantages are that; it’s very costly, it’s sizeable, and it’s not applicable to individuals with arthritis as they can’t put their hands on the scanner. From table 1 above and the various advantages and disadvantages it’s well evident that finger print biometric verification is the most satisfactory method. Spreadsheet Showing Type of Staff, Number of Hours Allocated, Total Cost and Material Cost: Type of Staff Number of Hours Allocated Total Cost Project Manager 819 200 Network Contractor 112 100 Electrical Contractor 112 100 Network engineer 600 200 Software engineer 700 400 Sub Total 1000 Material Cost: Item Unit Unit price Cost Shatter proof boxes 35 100 350 Bio-Time Clock Finger Print Central Server Software for 1299 User (For Central Database) 1 401 401 Bio-Time Clock Sub Server Package for 150 Students (Each Class Package) Includes: 1. Bio-Time Clock Server Software for 150 Students 2. Bio-Time Clock Client PC Software                                3. 2 Unit M2-EasyScan Finger Print Scanner 8 347 2776 Back Up Finger Print Scanner – M2-EasyScan 8 61 488 Bio-Plug-in Server USB Smart Lock 17 5 85 Sub Total 10859 Major Tasks to Be Carried Out: The major tasks involved in the project do comprise of; the whole project planning, which involves establishment of the cost and schedule management, contracting of the electrical, software and network engineers, and procurement management. Other tasks include; technical planning, supervision and building of the network infrastructure (cabling), software unit detailed design, software unit coding, instillation of the central server, the 35 biometric terminals, backups and the bio-time clock finger print central server software, M-2 Easy scan finger prints scanner, installation of the shatter proof boxes, and all these shall be crowned with acceptance testing, defect classification, tracking and metrics, monitoring, and user communication as well as training. Order of the Tasks: The order of the tasks shall be: project planning; contracting of the electrical, software and network engineers; procurement of the software and hardware; technical planning, supervision and building of the network infrastructure (cabling); instillation of the central server, the 35 biometric terminals, backups and the bio-time clock finger print central server software, M-2 Easy scan finger prints scanner; installation of the shatter proof boxes; software unit detailed design, software unit coding; acceptance testing, defect classification, tracking and metrics, monitoring, and user communication as well as training. The work-package in appendix 1 further illustrates the break down of the major tasks to the lower levels. Major Risks and Risk Assessment Table: The major risks that could affect the deliver of the project or cause to exceed the project budget, time scale or increase the required resource include: Inaccurate time assessment which may occur as some activities may have outside dependencies’ such as student consents as well as subcontractors furthermore a hold-up in a critical path activity has a surge consequence on the whole project, and accordingly an incorrect project plan; Inappropriate resource distribution; Under-utilization of resources; Unanticipated expansion of project scope; Misunderstanding of project complexities can occur for instance when various improvement teams work on different facets of the software and come across into problems especially during system/integration testing; Cost over-runs because of under-utilization of resources; Break down in communication; Inconsistent priorities; With the intention of balancing for undue budget over-runs in addition to schedule over-runs, the project could lessen the functionality of the software; Software testing is a downstream phase in the software development lifecycle and as the project may fall behind schedule, the downstream activity may be shrunk in order to meet delivery dates which could result into inadequate software testing. Other risks include: Changes in the school of technology management policies; and Obsolescence of software owing to new technology from an opponent company. Table 2 below shows the risk assessment table. The risk The consequence of an event happening Likelihood rating (1-5) Consequence rating (H,M,L) Under utilization of resources Cost overruns 2 Medium (M) Inaccurate time assessment Affecting the delivery of the project 1 Low (L) An unanticipated expansion project scope Budget increase 3 High (H) Misunderstanding of project complexity Failure in the system/integration testing 1 Low (L) Breakdown in communication Project failure/delay 1 Low (L) Inconsistent priorities Failure of system function 3 high Balancing of undue budget overruns Lessening of the functionality of the software 2 Medium Falling behind schedule Inadequate software testing 4 high Table 2: Risk assessment table Work Break-down Structure and Process Break-down Structure: Appendix 2 does illustrate the work break-down structure (WBS) for those tasks which have tangible outcomes. The figure below illustrates the process break-down structure for those tasks which are process oriented. PROCESS-ORIENTED System design Styling Component Design Both the WBS and PBS can be linked so that one project manager can manage the whole project as illustrated in the figure below, PRODUCT-ORIENTED PROCESS-ORIENTED System design Styling Component Design Critical Path Analysis: The below critical path analysis demonstrates the beginning to the end of the project. Responsibility Matrix: Legend L = Lead Role S = supporting Role Project M’gr HR Mgr Maintenance Purchasing/ materials Engineering Production (supervisors) Finance Employees Communicate importance of project management L S Coordinate auditing efforts S S Track/analyze new regulations and maintain library Obtain permits and develop compliance plans S Prepare reports required by regulations Coordinate communications with interested parties L Train employees L Communicate with contractors L Comply with applicable regulatory requirement L S S S S S S S Monitor key processes L Coordinate emergency response efforts L Develop budget for project management L L Maintain audit reports for the entire project L Coordinate the project delivery process S Since the above table shows only proposed details of staff and materials needed, and as its hourly rate, hence tending to follow Parkinson’s Law, then I would make sure that the project toes strictly the line of the planning and that no resources are under-utilized so that everything sticks to the norm. List of References: PB works 2007. Advantages and disadvantages of biometric technology. Retrieved from http://biometrics.pbworks.com/w/page/14811349/Adavantages-and-disadvantages-of-technology. [09 November 2010]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Biometric Based Attendance System for School Of Technology and Managem Research Paper, n.d.)
Biometric Based Attendance System for School Of Technology and Managem Research Paper. https://studentshare.org/technology/2045376-to-develop-biometric-based-attendance-system-for-stmcollege-at-different-campuses-based-in-central
(Biometric Based Attendance System for School Of Technology and Managem Research Paper)
Biometric Based Attendance System for School Of Technology and Managem Research Paper. https://studentshare.org/technology/2045376-to-develop-biometric-based-attendance-system-for-stmcollege-at-different-campuses-based-in-central.
“Biometric Based Attendance System for School Of Technology and Managem Research Paper”. https://studentshare.org/technology/2045376-to-develop-biometric-based-attendance-system-for-stmcollege-at-different-campuses-based-in-central.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Based Attendance System for School of Technology and Management

The Security of Access Management Systems

Security is one of the most important aspects of an access management system since the login credentials of the users need to be safeguarded with effective security measures.... Modes of Authentication The security of access management systems are mainly based on three aspects [2], [12], [13]; Ownership-based factors (Something a user has) Knowledge-based factors (Something a user knows) Inherence-based factors (Something a person is) In other words, the different forms of security have been categorized into the above mentioned divisions....
46 Pages (11500 words) Dissertation

Workplace Privacy

With the advent and rapid proliferation of technology, the world has become a smaller place where accelerated communication and networking has nearly removed the personal boundaries in all aspects of life.... hellip; With the advent and rapid proliferation of technology, the world has become a smaller place where accelerated communication and networking has nearly removed the personal boundaries in all aspects of life.... It is inferred that employers and government should collectively fill the gaps between law and emerging technology related privacy issues for better workplace....
48 Pages (12000 words) Thesis

Biometric Security System

hellip; management has decided to use a Biometric-based smart card system with either Fingerprint or Vein Recognition systems.... This paper ''Biometric Security system '' tells that Dynamic Air Parts plc has a large manufacturing complex within a square kilometer area.... As the senior managers have planned to improve the company's security system.... Physiological and /or behavioral characteristics are two bases of a biometric recognition system....
11 Pages (2750 words) Essay

Biometrics: Unseen Aspects

This uniqueness of the biometric characteristic helps to make it an ideal candidate authenticating technology.... In the traditional method of token system, the user ID and the password may be easily replicated, which is not possible at all in the biometric authenticating technology.... Disadvantages In the same way, there are several arguments against the introduction of the particular technological advancement—biometric authentication technology....
4 Pages (1000 words) Assignment

Biometric Authentication

Role-based admission management is a fundamental concept with two limits: simple and complex extremes.... The “Flat Role-Based Access Control” comes first and exemplifies the basic role-based access management aspects.... “Hierarchical Role-Based management Control” (HRBMC) comes second in the sequence.... DBS is thus an effective technology offering optimal solutions towards the safety of responsive areas, thereby meeting the demands of the clients for high security whilst maintaining litheness (Nanavati et al 2002)....
7 Pages (1750 words) Essay

Emergency Preparation and Response in the World of Corporate Security

The role of corporate security for emergency preparedness and management of… sk situations is determined through a study of existing norms, corporate security providing companies, security departments within companies, threat and risk assessment.... The Corporate Security department in collaboration with senior management of a company must create policies which make the work environment a safer place for employees, executives, contractors, corporate guests and dignitaries....
15 Pages (3750 words) Essay

How has Identification Technology evolved in society through Biometrics

This characteristics are believed to varying in… In physiological analysis people have different body structure from another therefore biometrics helps in analyzing this differences by use of technology.... This scientific analysis was first identified in China when different merchants applied this technology in distinguishing the differences in different children using fingerprints.... It is through this practice that biometrics technology has been developed (Lockie 2006)....
20 Pages (5000 words) Research Paper

The Application of Biometric Technology and the Convenience

This essay "The Application of Biometric technology and the Convenience" analyzes public applications as well as commercial applications of biometric technology.... Biometric technology faces many challenges especially due to the slow development and issues.... hellip; Biometric technology has been used in offering better security and convenience when controlling access to facilities as well as other tangible resources.... The main reason propelling the use of biometric technology for tighter border control is that the conventional security approaches never offer adequate level of security....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us