Development of An Examination Authentication Embedded System Based on Fingerprint Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 1
Abstract
Security is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a student for an examination has an obvious problem such as presentation of fake clearance card, impersonation and so on and the unethical manner associated with the examination is a grim issue that requires the stakeholders in academic area to seek for alternative means of authenticating student for examination, because the manual paper-based clearance process is fundamentally flawed. Sequel to that, a dependable and effective system is designed to tackle the issues of the convectional technique. The system will verify the understudy using fingerprint biometrics technique and generate a report which can serve as an attendance.
Authors and Affiliations
Oyediran Mayowa Oyedepo (Member IAENG), Wahab Wajeed Bolanle, Elegbede Adedayo Wasiat, Enegbe Toye Jolie
Performance Evaluation of Image Enhancement Techniques in Spatial and Wavelet Domains
Denoising is one of the important tasks in image processing. Despite the significant research conducted on this topic, the development of efficient denoising methods is still a compelling challenge. In this paper, spatia...
A REVIEW OF ELEMENTS FOR ASSESSMENT OFE-LEARNING READINESS IN LIBYA UNIVERSITIES
The e-learning is developing rapidly in the world nowadays, where technology has replaced the traditional educational approach in many universities around the world. This is because e-learning can save time and cost in e...
Conceptual Overlapping Clustering for Effective Selection of Parental Rice Varieties
The process of rice breeding involves producing new rice varieties as a cross of parental rice varieties followed by rigorous testing and examination phase for purity, productivity and resistivity to regional climatic co...
Enhancing Cloud Computing Security by Using Pixel Key Pattern
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...
Research on Application of Brand building of Chiang Ma Yuan Recreational Farm Area
In modern society, people face expedited information communication, fast-paced life, and high-pressure work. People are eager for the natural environment of relaxation. The government in Taiwan has paid special attention...