An Efficient Automatic Attendance System using Fingerprint Verification Technique
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
Abstract— The main aim of this paper is to develop an accurate, fast and very efficient automatic attendance system using fingerprint verification technique. We propose a system in which fingerprint verification is done by using extraction of minutiae technique and the system that automates the whole process of taking attendance, Manually which is a laborious and troublesome work and waste a lot of time, with its managing and maintaining the records for a period of time is also a burdensome task. For this purpose we use fingerprint verification system using extraction of minutiae techniques. The experimental result shows that our proposed system is highly efficient in verification of user fingerprint.
Authors and Affiliations
Chitresh Saraswat , Amit Kumar
ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH
(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall prov...
Segmentation of Telugu Touching Conjunct Consonants Using Overlapping Bounding Boxes
Telugu is an ancient historic language. It is spoken by about 84.6 million people of Andhra Pradesh. The script has circular orthography with few horizontal and slant strokes. Huge literature exists for this language in...
An Analysis of the Performance of Artificial Neural Network Technique for Stock Market Forecasting
In this paper, we showed a method to forecast the daily stock rice using neural networks and the result of the Neural Network forecast is compared with the Statistical forecasting result. tock price prediction is one of...
Investigating the performance improvement by sampling techniques in EEG data
In this paper the performance of oversampling methods such as SMOTE (Synthetic Minority Over-sampling Technique) and PCA (Principal Component Analysis) which are used for preprocessing are applied for the Brain computer...
A Novel Approach for Social Network Analysis & Web Mining for Counter Terrorism
Terrorists and extremists are increasingly utilizing Internet technology as an effective mode to enhance their ability to influence the outside world. Lack of multilingual and multimedia terrorist/extremist collections a...